Cited by
Cited by
Referential kNN Regression for Financial Time Series Forecasting
T Ban, R Zhang, S Pang, A Sarrafzadeh, D Inoue
Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013
Implementing multi-class classifiers by one-class classification methods
T Ban, S Abe
The 2006 IEEE International Joint Conference on Neural Network Proceedings …, 2006
A privacy-preserving federated learning system for android malware detection based on edge computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering
I Škrjanc, S Ozawa, T Ban, D Dovžan
Applied Soft Computing 62, 592-601, 2018
Combat security alert fatigue with ai-assisted techniques
T Ban, N Samuel, T Takahashi, D Inoue
Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 9-16, 2021
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis
ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue
IEEE Access 8, 217977-217986, 2020
Machine learning framework to analyze iot malware using elf and opcode features
CW Tien, SW Chen, T Ban, SY Kuo
Digital Threats: Research and Practice 1 (1), 1-19, 2020
Personalized mode transductive spanning SVM classification tree
S Pang, T Ban, Y Kadobayashi, N Kasabov
Information Sciences 181 (11), 2071-2085, 2011
A provably secure two-party attribute-based key agreement protocol
H Wang, Q Xu, T Ban
2009 fifth international conference on intelligent information hiding and …, 2009
A study on association rule mining of darknet big data
T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang
2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015
A study of IoT malware activities using association rule learning for darknet sensor data
S Ozawa, T Ban, N Hashimoto, J Nakazato, J Shimamura
International Journal of Information Security 19, 83-92, 2020
A neural network model for detecting DDoS attacks using darknet traffic features
SHA Ali, S Ozawa, T Ban, J Nakazato, J Shimamura
2016 International joint conference on neural networks (IJCNN), 2979-2985, 2016
Detection of DDoS backscatter based on traffic features of darknet TCP packets
N Furutani, T Ban, J Nakazato, J Shimamura, J Kitazono, S Ozawa
2014 Ninth Asia Joint conference on information security, 39-43, 2014
Cross platform IoT-malware family classification based on printable strings
YT Lee, T Ban, TL Wan, SM Cheng, R Isawa, T Takahashi, D Inoue
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
Integration of multi-modal features for android malware detection using linear SVM
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
Dynamic class imbalance learning for incremental LPSVM
S Pang, L Zhu, G Chen, A Sarrafzadeh, T Ban, D Inoue
Neural Networks 44, 87-100, 2013
Spatially chunking support vector clustering algorithm
T Ban, S Abe
2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No …, 2004
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files
TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue
IEEE Open Journal of the Computer Society 1, 262-275, 2020
G-means: a clustering algorithm for intrusion detection
Z Zhao, S Guo, Q Xu, T Ban
International Conference on Neural Information Processing, 563-570, 2008
Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines?
T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ...
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20