Search For:

Displaying 1-26 out of 26 total
Mining Publication Records on Personal Publication Web Pages Based on Conditional Random Fields
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Jen-Ming Chung,Ya-Huei Lin,Hahn-Ming Lee,Jan-Ming Ho
Issue Date:December 2012
pp. 319-326
A publication record denotes a list of semi-structured citation string of publications of a research institute or an individual researcher. Publication records are integrated into a digital library to become an important knowledge base which in turn enable...
 
Using Web-Mining for Academic Measurement and Scholar Recommendation in Expert Finding System
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Chi-Jen Wu,Jen-Ming Chung,Cheng-Yu Lu,Hahn-Ming Lee,Jan-Ming Ho
Issue Date:August 2011
pp. 288-291
Scholars usually spend great deal of time on searching and reading papers of key researchers. However, to objectively determine key researcher of a topic relies on several measurements, such as publication, citation, recent academic activities. In this pap...
 
Mining Fuzzy Domain Ontology Based on Concept Vector from Wikipedia Category Network
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Cheng-Yu Lu,Shou-Wei Ho,Jen-Ming Chung,Fu-Yuan Hsu,Hahn-Ming Lee,Jan-Ming Ho
Issue Date:August 2011
pp. 249-252
Ontology is essential in the formalization of domain knowledge for effective human-computer interactions (i.e., expert-finding). Many researchers have proposed approaches to measure the similarity between concepts by accessing fuzzy domain ontology. Howeve...
 
Associating Expertized Information to Alleviate Sparsity Problem in Personalization
Found in: E-Business Engineering, IEEE International Conference on
By Ming-Yu Lee, Chiung-Wei Huang, Hahn-Ming Lee
Issue Date:October 2006
pp. 479-482
Personalization is an important technique in E-Commerce. In this paper, we propose an approach to alleviate the sparsity and cold-start problems in the recommendation system for personalization. The expertized hierarchical classification information in Lib...
 
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Ismail Adel AL-Taharwa,Hahn-Ming Lee,Albert B. Jeng,Kuo-Ping Wu,Ching-Hao Mao,Te-En Wei,Shyi-Ming Chen
Issue Date:June 2012
pp. 1370-1375
JavaScript allows Web-developers to hide intention behind their code inside different looking scripts known as Obfuscated code. Automatic detection of obfuscated code is generally tackled from readability perspective. However, recently obfuscation exhibits...
 
Novelty Paper Recommendation Using Citation Authority Diffusion
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Chun-Han Chen,Sushilata Devi Mayanglambam,Fu-Yuan Hsu,Cheng-Yu Lu,Hahn-Ming Lee,Jan-Ming Ho
Issue Date:November 2011
pp. 126-131
Survey of academic literature or papers should be considered with both relevance and importance of references. Authors cite related references by considering integrity and novelty. However, the state-of-art publicly academic search engines and services can...
 
A Reviewer Recommendation System Based on Collaborative Intelligence
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Kai-Hsiang Yang, Tai-Liang Kuo, Hahn-Ming Lee, Jan-Ming Ho
Issue Date:September 2009
pp. 564-567
In this paper, expert-finding problem is transformed to a classification issue. We build a knowledge database to represent the expertise characteristic of domain from web information constructed by collaborative intelligence, and an incremental learning me...
 
Mining Translations of Chinese Names from Web Corpora Using a Query Expansion Technique and Support Vector Machine
Found in: Web Intelligence and Intelligent Agent Technology, International Conference on
By Kai-Hsiang Yang, Wei-Da Chen, Hahn-Ming Lee, Jan-Ming Ho
Issue Date:November 2007
pp. 530-533
Chinese name translation is a special case of theproblem of named entity translation. It is a verychallenging problem because there exist many kinds ofRomanization systems and some people like to addadditional words into their English names. Translatinga s...
 
Web Appearance Disambiguation of Personal Names Based on Network Motif
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Kai-Hsiang Yang, Kun-Yan Chiou, Hahn-Ming Lee, Jan-Ming Ho
Issue Date:December 2006
pp. 386-389
Searching for information about a particular person is a common activity on search engines. However, current search engines do not provide any special function for search a person. Previous research has solved the problem by using additional background kno...
 
Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting
Found in: E-Business Engineering, IEEE International Conference on
By Ching-Hao Mao, Ta-Wei Hung, Jan-Ming Ho, Hahn-Ming Lee
Issue Date:October 2006
pp. 229-236
The Chinese financial news titles has only few words so that it is hard for measuring the similarity between titles if compare all their keywords only. In this study, we proposed a method of semantic similarity measurement for Chinese financial news titles...
 
Trading Decision Maker: Stock Trading Decision by Price Series Smoothing and Tendency Transition Inference
Found in: e-Technology, e-Commerce, and e-Services, IEEE International Conference on
By Hsin-Tsung Peng, Hahn-Ming Lee, Jan-Ming Ho
Issue Date:April 2005
pp. 359-362
Financial engineering, such as trading decision-making, is a major topic for research and also has commercial applications. The stock price series has a series of change-points, and accurate prediction of its movements is the key to successful trading. How...
 
Real-Time Fast-Flux Identification via Localized Spatial Geolocation Detection
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Horng-Tzer Wang,Ching-Hao Mao,Kuo-Ping Wu,Hahn-Ming Lee
Issue Date:July 2012
pp. 244-252
Fast-flux service networks (FFSNs), broadly used by botnets, are an evasive technique for conducting malicious behavior via rapid activities. FFSN detection easily fails in the case of poor performance and causes a high incidence of false positives due to ...
 
Cloud computing in Taiwan
Found in: Computer
By William Cheng-Chung Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Juei-Nan Chen, Pao-Ann Hsiung, Hahn-Ming Lee
Issue Date:June 2012
pp. 48-56
Cloud computing is changing the computing environment: scalable, virtualized resources are increasingly provided as services over the Internet. Taiwan is also changing, transforming itself from a hardware manufacturing island into a cloud village offering ...
 
System Failure Forewarning Based on Workload Density Cluster Analysis
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Te-Chang Cheng,Kuo-Ping Wu,Hahn-Ming Lee
Issue Date:November 2011
pp. 227-232
Each computer system contains design objectives for long-term usage, so the operator must conduct a continuous and accurate assessment of system performance in order to detect the potential factors that will degrade system performance. Condition indicators...
 
Recognition of Human Actions Using Motion Capture Data and Support Vector Machine
Found in: Software Engineering, World Congress on
By Jung-Ying Wang, Hahn-Ming Lee
Issue Date:May 2009
pp. 234-238
This paper presents a human action recognition system based on motion capture features and support vector machine (SVM). We use 43 optical markers distributing on body and extremities to track the movement of human actions. In our system 21 different types...
 
Automatic Hypertext Table Understanding by using Logical Structure Description Algorithm
Found in: Innovative Computing ,Information and Control, International Conference on
By Chiung-Wei Huang, Chih-Yuan Chien, Chun-Nan Hsu, Hahn-Ming Lee
Issue Date:September 2007
pp. 247
Due to focusing on template matching, conventional approaches bound their capability by complex and varied layout structures. This paper proposes a novel and efficient logical structure description algorithm, named Structure Description Algorithm, to autom...
 
QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement
Found in: e-Technology, e-Commerce, and e-Services, IEEE International Conference on
By Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee
Issue Date:March 2004
pp. 299-304
A novel ranking method named as QueryFind, based on learning from historical query logs, is proposed to predict users? information needs and reduce the seeking time from the search result list. Our method uses not only the users? feedback but also the reco...
 
Android Malware Detection via a Latent Network Behavior Analysis
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Te-En Wei,Ching-Hao Mao,Albert B. Jeng,Hahn-Ming Lee,Horng-Tzer Wang,Dong-Jie Wu
Issue Date:June 2012
pp. 1251-1258
The rapid growth of smartphones has lead to a renaissance for mobile application services. Android and iOS now as the most popular smartphone platforms offer a public marketplace respectively, the Android Market and App Store- but operate with dramatically...
 
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Horng-Tzer Wang,Ching-Hao Mao,Te-En Wei,Hahn-Ming Lee
Issue Date:July 2013
pp. 349-358
Malware (malicious software) is used by attackers to gain access to end-users' computing devices with the aim of performing malicious actions, such as sending spam, downloading malicious files, and stealing private information. Furthermore, malicious actio...
 
Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis
Found in: 2013 Eighth Asia Joint Conference on Information Security (ASIA JCIS)
By Ke-Wei Su,Kuo-Ping Wu,Hahn-Ming Lee,Te-En Wei
Issue Date:July 2013
pp. 77-84
The current malicious URLs detecting techniques based on whole URL information are hard to detect the obfuscated malicious URLs. The most precise way to identify a malicious URL is verifying the corresponding web page contents. However, it costs very much ...
 
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Hsing-Kuo Pao, Ching-Hao Mao, Hahn-Ming Lee, Chi-Dong Chen, Christos Faloutsos
Issue Date:November 2010
pp. 102-109
We propose a graphical signature for intrusion detection given alert sequences. By correlating alerts with their temporal proximity, we build a probabilistic graph-based model to describe a group of alerts that form an attack or normal behavior. Using the ...
 
EigenBot: foiling spamming botnets with matrix algebra
Found in: Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD '12)
By Chang-Cheng Lin, Ching-Hao Mao, Christos Faloutsos, Hahn-Ming Lee, Jia-Yu (Tim) Pan, Kai-Chi Chang
Issue Date:August 2012
pp. 1-8
We present EigenBot, a spamming botnet clustering and tracking mechanism that identifies a botnet-based spamming email campaigns. EigenBot extracts the key concepts among the spam emails, despite the high dimensionality, and the noise in the input. We eval...
     
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Ching-Hao Mao, Hahn-Ming Lee, Si-Yu Huang
Issue Date:April 2010
pp. 101-111
Capturing Fast-Flux Service Networks (FFSNs) by temporal variances is an intuitive way for seeking to identify rapid changes of DNS records. Unfortunately, the features regard to temporal variances would lead to the delay detection (more than one hour) of ...
     
Semi-supervised co-training and active learning based approach for multi-view intrusion detection
Found in: Proceedings of the 2009 ACM symposium on Applied Computing (SAC '09)
By Ching-Hao Mao, Devi Parikh, Hahn-Ming Lee, Si-Yu Huang, Tsuhan Chen
Issue Date:March 2009
pp. 1-5
Although there is immense data available from networks and hosts, a very small proportion of this data is labeled due to the cost of obtaining expert labels. This proves to be a significant bottle-neck for developing supervised intrusion detection systems ...
     
Adaptive e-mail intention finding mechanism based on e-mail words social networks
Found in: Proceedings of the 2007 workshop on Large scale attack defense (LSAD '07)
By Che-Fu Yeh, Ching-Hao Mao, Hahn-Ming Lee, Tsuhan Chen
Issue Date:August 2007
pp. 63-70
Through the rapid evaluation of spam, no fully successful solution for filtering spam has been found. However, the spammers still spread spam by using the same intentions such as advertising and phishing. In this investigation, we propose a mechanism of E-...
     
Fast structural query with application to chinese treebank sentence retrieval
Found in: Proceedings of the 2004 ACM symposium on Document engineering (DocEng '04)
By Chia-Hsin Huang, Hahn-Ming Lee, Tyng-Ruey Chuang
Issue Date:October 2004
pp. 11-20
In natural language processing a huge amount of structured data is constantly used for the extraction and presentation of grammatical structures in sentences. For example the Chinese Treebank corpus developed at the Institute of Information Science Academi...
     
 1