​
Login / Signup
Tao Ban
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 64
Top Topics
Possibilistic Clustering
Linkage Analysis
Malware Detection
E Learning
Top Venues
AsiaJCIS
IEEE Access
IJCNN
TrustCom
</>
Publications
</>
Jiaxing Zhou
,
Tao Ban
,
Tomohiro Morikawa
,
Takeshi Takahashi
,
Daisuke Inoue
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
ISCC
(2023)
Shota Kawanaka
,
Yoshikatsu Kashiwabara
,
Kohei Miyamoto
,
Masazumi Iida
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun'ichi Takeuchi
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
AsiaJCIS
(2023)
Kohei Miyamoto
,
Masazumi Iida
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun'ichi Takeuchi
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access
11 (2023)
Harry Chandra Tanuwidjaja
,
Takeshi Takahashi
,
Tsung-Nan Lin
,
Boyi Lee
,
Tao Ban
Hybrid Explainable Intrusion Detection System: Global vs. Local Approach.
ARTMAN@CCS
(2023)
Muhammad Fakhrur Rozi
,
Tao Ban
,
Seiichi Ozawa
,
Akira Yamada
,
Takeshi Takahashi
,
Sangwook Kim
,
Daisuke Inoue
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access
11 (2023)
Chia-Yi Wu
,
Tao Ban
,
Shin-Ming Cheng
,
Takeshi Takahashi
,
Daisuke Inoue
IoT malware classification based on reinterpreted function-call graphs.
Comput. Secur.
125 (2023)
Samuel Ndichu
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
Machine Learning-Based Security Alert Screening with Focal Loss.
BigData
(2023)
Samuel Ndichu
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
Critical-Threat-Alert Detection using Online Machine Learning.
Big Data
(2022)
Chun-I Fan
,
Cheng-Han Shie
,
Che-Ming Hsu
,
Tao Ban
,
Tomohiro Morikawa
,
Takeshi Takahashi
IoT Botnet Detection Based on the Behaviors of DNS Queries.
DSC
(2022)
Samuel Ndichu
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
AsiaJCIS
(2022)
Kohei Miyamoto
,
Hiroki Goto
,
Ryosuke Ishibashi
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun'ichi Takeuchi
Malicious Packet Classification Based on Neural Network Using Kitsune Features.
ISPR
(2022)
Ryosuke Ishibashi
,
Kohei Miyamoto
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun'ichi Takeuchi
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access
10 (2022)
Bo Sun
,
Takeshi Takahashi
,
Tao Ban
,
Daisuke Inoue
Detecting Android Malware and Classifying Its Families in Large-scale Datasets.
ACM Trans. Manag. Inf. Syst.
13 (2) (2022)
Ryosuke Ishibashi
,
Hiroki Goto
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun'ichi Takeuchi
Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
AsiaJCIS
(2021)
Akira Fujita
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
On-premises Analysis of Advanced Threat Prevention Appliances.
CSET @ USENIX Security Symposium
(2021)
Masaki Aota
,
Tao Ban
,
Takeshi Takahashi
,
Noboru Murata
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
TrustCom
(2021)
Kohei Masumi
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.
CODASPY
(2021)
Bo Sun
,
Tao Ban
,
Chansu Han
,
Takeshi Takahashi
,
Katsunari Yoshioka
,
Jun'ichi Takeuchi
,
Abdolhossein Sarrafzadeh
,
Meikang Qiu
,
Daisuke Inoue
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access
9 (2021)
Chia-Yi Wu
,
Tao Ban
,
Shin-Ming Cheng
,
Bo Sun
,
Takeshi Takahashi
IoT Malware Detection Using Function-Call-Graph Embedding.
PST
(2021)
Takeshi Takahashi
,
Yuki Umemura
,
Chansu Han
,
Tao Ban
,
Keisuke Furumoto
,
Ohnori Nakamura
,
Katsunari Yoshioka
,
Jun'ichi Takeuchi
,
Noboru Murata
,
Yoshiaki Shiraishi
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
PerCom Workshops
(2021)
Samuel Ndichu
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
IEEE BigData
(2021)
Tao Ban
,
Samuel Ndichu
,
Takeshi Takahashi
,
Daisuke Inoue
Combat Security Alert Fatigue with AI-Assisted Techniques.
CSET @ USENIX Security Symposium
(2021)
Muhammad Fakhrur Rozi
,
Tao Ban
,
Seiichi Ozawa
,
Sangwook Kim
,
Takeshi Takahashi
,
Daisuke Inoue
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
ICONIP (2)
(2021)
Ruei-Hau Hsu
,
Yi-Cheng Wang
,
Chun-I Fan
,
Bo Sun
,
Tao Ban
,
Takeshi Takahashi
,
Ting-Wei Wu
,
Shang-Wei Kao
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
AsiaJCIS
(2020)
Seiichi Ozawa
,
Tao Ban
,
Naoki Hashimoto
,
Junji Nakazato
,
Jumpei Shimamura
A study of IoT malware activities using association rule learning for darknet sensor data.
Int. J. Inf. Sec.
19 (1) (2020)
Tzu-Ling Wan
,
Tao Ban
,
Shin-Ming Cheng
,
Yen-Ting Lee
,
Bo Sun
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc.
1 (2020)
Shaoning Pang
,
Tao Ban
,
Youki Kadobayashi
,
Jungsuk Song
,
Kaizhu Huang
,
Geongsen Poh
,
Iqbal Gondal
,
Kitsuchart Pasupa
,
Fadi A. Aloul
CDMC'19 - The 10th International Cybersecurity Data Mining Competition.
ICONIP (2)
(2020)
Shintaro Ishikawa
,
Seiichi Ozawa
,
Tao Ban
Port-Piece Embedding for Darknet Traffic Features and Clustering of Scan Attacks.
ICONIP (2)
(2020)
Tzu-Ling Wan
,
Tao Ban
,
Yen-Ting Lee
,
Shin-Ming Cheng
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
IoT-Malware Detection Based on Byte Sequences of Executable Files.
AsiaJCIS
(2020)
Shin-Ying Huang
,
Tao Ban
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis.
TrustCom
(2020)
Muhamad Erza Aminanto
,
Tao Ban
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access
8 (2020)
Yen-Ting Lee
,
Tao Ban
,
Tzu-Ling Wan
,
Shin-Ming Cheng
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
Cross Platform IoT- Malware Family Classification based on Printable Strings.
TrustCom
(2020)
Shin-Ming Cheng
,
Tao Ban
,
Jr-Wei Huang
,
Bing-Kai Hong
,
Daisuke Inoue
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
SP Workshops
(2020)
Bing-Kai Hong
,
Jr-Wei Huang
,
Tao Ban
,
Ryoichi Isawa
,
Shin-Ming Cheng
,
Daisuke Inoue
,
Koji Nakao
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
AsiaJCIS
(2019)
Muhamad Erza Aminanto
,
Lei Zhu
,
Tao Ban
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
PST
(2019)
Tao Ban
,
Ryoichi Isawa
,
Shin-Ying Huang
,
Katsunari Yoshioka
,
Daisuke Inoue
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst.
(9) (2019)
Guanbo Jia
,
Paul Miller
,
Xin Hong
,
Harsha K. Kalutarage
,
Tao Ban
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder.
TrustCom/BigDataSE
(2019)
Ryutaro Ushigome
,
Mio Suzuki
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
,
Takeshi Matsuda
,
Michio Sonoda
Establishing Trusted and Timely Information Source using Social Media Services.
CCNC
(2019)
Shin-Ying Huang
,
Tzu-Hsien Chuang
,
Shi-Meng Huang
,
Tao Ban
Malicious URL Linkage Analysis and Common Pattern Discovery.
IEEE BigData
(2019)
Bo Sun
,
Tao Ban
,
Shun-Chieh Chang
,
Yeali S. Sun
,
Takeshi Takahashi
,
Daisuke Inoue
A scalable and accurate feature representation method for identifying malicious mobile applications.
SAC
(2019)
Shin-Ying Huang
,
Tao Ban
A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration.
TrustCom/BigDataSE
(2019)
Muhamad Erza Aminanto
,
Lei Zhu
,
Tao Ban
,
Ryoichi Isawa
,
Takeshi Takahashi
,
Daisuke Inoue
Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
ICONIP (1)
(2019)
Igor Skrjanc
,
Seiichi Ozawa
,
Tao Ban
,
Dejan Dovzan
Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering.
Appl. Soft Comput.
62 (2018)
Shin-Ying Huang
,
Tzu-Hsien Chuang
,
Shi-Meng Huang
,
Tao Ban
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis.
PST
(2018)
Tao Ban
,
Ryoichi Isawa
,
Katsunari Yoshioka
,
Daisuke Inoue
A Cross-Platform Study on IoT Malware.
ICMU
(2018)
Lei Zhu
,
Kazushi Ikeda
,
Shaoning Pang
,
Tao Ban
,
Abdolhossein Sarrafzadeh
Merging weighted SVMs for parallel incremental learning.
Neural Networks
100 (2018)
Ryoichi Isawa
,
Tao Ban
,
Ying Tie
,
Katsunari Yoshioka
,
Daisuke Inoue
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
AsiaJCIS
(2018)
Lei Zhu
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
Employ Decision Values for Soft-Classifier Evaluation with Crispy References.
ICONIP (4)
(2018)
Bo Sun
,
Akinori Fujino
,
Tatsuya Mori
,
Tao Ban
,
Takeshi Takahashi
,
Daisuke Inoue
Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst.
(11) (2018)
Shaoning Pang
,
Lei Zhu
,
Tao Ban
,
Kazushi Ikeda
,
Wangfei Zhang
,
Abdolhossein Sarrafzadeh
,
Takeshi Takahashi
,
Daisuke Inoue
Online Max-flow Learning via Augmenting and De-augmenting Path.
IJCNN
(2018)
Naoki Hashimoto
,
Seiichi Ozawa
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning.
INNS Conference on Big Data
(2018)
Takahiro Konno
,
Runhe Huang
,
Tao Ban
,
Chuanhe Huang
Goods recommendation based on retail knowledge in a Neo4j graph database combined with an inference mechanism implemented in jess.
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
(2017)
Tao Ban
,
Daisuke Inoue
Practical darknet traffic analysis: Methods and case studies.
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
(2017)
Igor Skrjanc
,
Seiichi Ozawa
,
Dejan Dovzan
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring.
SSCI
(2017)
Junjie Tang
,
Xingmin Cui
,
Ziming Zhao
,
Shanqing Guo
,
Xin-Shun Xu
,
Chengyu Hu
,
Tao Ban
,
Bing Mao
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
ICST
(2017)
Tao Ban
,
Lei Zhu
,
Jumpei Shimamura
,
Shaoning Pang
,
Daisuke Inoue
,
Koji Nakao
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet.
ICONIP (5)
(2017)
Shaoning Pang
,
Dan Komosny
,
Lei Zhu
,
Ruibin Zhang
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis.
Wirel. Pers. Commun.
96 (4) (2017)
Tao Ban
,
Shaoning Pang
,
Masashi Eto
,
Daisuke Inoue
,
Koji Nakao
,
Runhe Huang
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld
(2016)
Tao Ban
,
Daisuke Inoue
Feature subset selection by SVM ensemble.
SSCI
(2016)
Siti Hajar Aminah Ali
,
Seiichi Ozawa
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
A neural network model for detecting DDoS attacks using darknet traffic features.
IJCNN
(2016)
Tao Ban
,
Takeshi Takahashi
,
Shanqing Guo
,
Daisuke Inoue
,
Koji Nakao
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
AsiaJCIS
(2016)
Lei Zhu
,
Tao Ban
,
Kazushi Ikeda
,
Paul Pang
,
Abdolhossein Sarrafzadeh
Distributed incremental wLPSVM learning.
SSCI
(2016)
Takeshi Takahashi
,
Tao Ban
,
Chin-Wei Tien
,
Chih-Hung Lin
,
Daisuke Inoue
,
Koji Nakao
The Usability of Metadata for Android Application Analysis.
ICONIP (1)
(2016)
Lei Zhu
,
Shaoning Pang
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning.
IEEE Trans. Knowl. Data Eng.
28 (8) (2016)
Tao Ban
,
Masashi Eto
,
Shanqing Guo
,
Daisuke Inoue
,
Koji Nakao
,
Runhe Huang
A study on association rule mining of darknet big data.
IJCNN
(2015)
Nobuaki Furutani
,
Jun Kitazono
,
Seiichi Ozawa
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
Adaptive DDoS-Event Detection from Big Darknet Traffic Data.
ICONIP (4)
(2015)
Shaoning Pang
,
Yiming Peng
,
Tao Ban
,
Daisuke Inoue
,
Abdolhossein Sarrafzadeh
A federated network online network traffics analysis engine for cybersecurity.
IJCNN
(2015)
Hironori Nishikaze
,
Seiichi Ozawa
,
Jun Kitazono
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features.
INNS Conference on Big Data
(2015)
Siti Hajar Aminah Ali
,
Seiichi Ozawa
,
Junji Nakazato
,
Tao Ban
,
Jumpei Shimamura
An autonomous online malicious spam email detection system using extended RBF network.
IJCNN
(2015)
Jianliang Wu
,
Tingting Cui
,
Tao Ban
,
Shanqing Guo
,
Lizhen Cui
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks
8 (13) (2015)
Kai Ma
,
Mengyang Liu
,
Shanqing Guo
,
Tao Ban
MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications.
ICONIP (3)
(2015)
Takeshi Takahashi
,
Tao Ban
,
Takao Mimura
,
Koji Nakao
Fine-Grained Risk Level Quantication Schemes Based on APK Metadata.
ICONIP (3)
(2015)
Yuli Dai
,
Shunsuke Tada
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
,
Seiichi Ozawa
Detecting Malicious Spam Mails: An Online Machine Learning Approach.
ICONIP (3)
(2014)
Nobuaki Furutani
,
Tao Ban
,
Junji Nakazato
,
Jumpei Shimamura
,
Jun Kitazono
,
Seiichi Ozawa
Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets.
AsiaJCIS
(2014)
Ryoichi Isawa
,
Tao Ban
,
Shanqing Guo
,
Daisuke Inoue
,
Koji Nakao
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2014)
Shaoning Pang
,
Fan Liu
,
Youki Kadobayashi
,
Tao Ban
,
Daisuke Inoue
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
Cogn. Comput.
6 (3) (2014)
Shaoning Pang
,
Lei Zhu
,
Gang Chen
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
Dynamic class imbalance learning for incremental LPSVM.
Neural Networks
44 (2013)
Tao Ban
,
Ryoichi Isawa
,
Shanqing Guo
,
Daisuke Inoue
,
Koji Nakao
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
AsiaJCIS
(2013)
Lei Song
,
Shaoning Pang
,
Gang Chen
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
An incremental learning approach to continuous image change detection.
FSKD
(2013)
Jingwei Wang
,
Neil Y. Yen
,
Bin Guo
,
Runhe Huang
,
Jianhua Ma
,
Tao Ban
,
Hong Zhao
User Travelling Pattern Prediction via Indistinct Cellular Data Mining.
UIC/ATC
(2013)
Yiming Peng
,
Shaoning Pang
,
Gang Chen
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
Chunk incremental IDR/QR LDA learning.
IJCNN
(2013)
Tao Ban
,
Ruibin Zhang
,
Shaoning Pang
,
Abdolhossein Sarrafzadeh
,
Daisuke Inoue
Referential kNN Regression for Financial Time Series Forecasting.
ICONIP (1)
(2013)
Tao Ban
,
Ryoichi Isawa
,
Shanqing Guo
,
Daisuke Inoue
,
Koji Nakao
Application of string kernel based support vector machine for malware packer identification.
IJCNN
(2013)
Gang Chen
,
Shaoning Pang
,
Abdolhossein Sarrafzadeh
,
Tao Ban
,
Daisuke Inoue
SDE-Driven Service Provision Control.
ICONIP (1)
(2012)
Shaoning Pang
,
Fan Liu
,
Youki Kadobayashi
,
Tao Ban
,
Daisuke Inoue
Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer.
ICONIP (1)
(2012)
Xiaoyan Yan
,
Bo Liang
,
Tao Ban
,
Shanqing Guo
,
Liming Wang
TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality.
ICONIP (4)
(2012)
Tao Ban
,
Shanqing Guo
,
Masashi Eto
,
Daisuke Inoue
,
Koji Nakao
A study on cost-effective P2P traffic classification.
IJCNN
(2012)
Shanqing Guo
,
Shuangshuang Li
,
Yan Yu
,
Anlei Hu
,
Tao Ban
A Fine-Grained Classification Approach for the Packed Malicious Code.
ICICS
(2012)
Tao Ban
,
Shanqing Guo
,
Masashi Eto
,
Daisuke Inoue
,
Koji Nakao
Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst.
(12) (2012)
Tao Ban
,
Lei Zhu
,
Jumpei Shimamura
,
Shaoning Pang
,
Daisuke Inoue
,
Koji Nakao
Behavior Analysis of Long-term Cyber Attacks in the Darknet.
ICONIP (5)
(2012)
Shaoning Pang
,
Tao Ban
,
Youki Kadobayashi
,
Nikola K. Kasabov
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
IEEE Trans. Syst. Man Cybern. Part B
42 (2) (2012)
Shaoning Pang
,
Tao Ban
,
Youki Kadobayashi
,
Nikola K. Kasabov
Personalized mode transductive spanning SVM classification tree.
Inf. Sci.
181 (11) (2011)
Tao Ban
,
Shanqing Guo
,
Zonghua Zhang
,
Ruo Ando
,
Youki Kadobayashi
Practical network traffic analysis in P2P environment.
IWCMC
(2011)
Tao Ban
,
Shanqing Guo
,
Masashi Eto
,
Daisuke Inoue
,
Koji Nakao
Entropy Based Discriminators for P2P Teletraffic Characterization.
ICONIP (2)
(2011)
Liangxiong Li
,
Fengyu Wang
,
Tao Ban
,
Shanqing Guo
,
Bin Gong
Network Flow Classification Based on the Rhythm of Packets.
ICONIP (2)
(2011)
Tao Ban
,
Changshui Zhang
,
Shigeo Abe
,
Takeshi Takahashi
,
Youki Kadobayashi
Mining interlacing manifolds in high dimensional spaces.
SAC
(2011)
Shanqing Guo
,
Qixia Yuan
,
Fengbo Lin
,
Fengyu Wang
,
Tao Ban
A Malware Detection Algorithm Based on Multi-view Fusion.
ICONIP (2)
(2010)
Tao Ban
,
Ruo Ando
,
Youki Kadobayashi
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
ICONIP (2)
(2010)
Yongquan Shi
,
Tao Ban
,
Shanqing Guo
,
Qiuliang Xu
,
Youki Kadobayashi
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
ICONIP (2)
(2010)
Shaoning Pang
,
Tao Ban
,
Youki Kadobayashi
,
Nikola K. Kasabov
Incremental and decremental LDA learning with applications.
IJCNN
(2010)