default search action
Shin-Ying Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Hsin-Yu Lee, Chia-Nan Huang, Chih-Yu Tsai, Shin-Ying Huang, Yueh-Min Huang:
Enhancing Mathematics Learning Outcomes through a Flipped Classroom Grouping Mechanism Informed by Self-study Habits: Utilizing iPad Screen Time Data. ICITL 2023: 295-303 - 2020
- [j5]Chun-Jung Wu, Shin-Ying Huang, Katsunari Yoshioka, Tsutomu Matsumoto:
IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information. IEICE Trans. Commun. 103-B(1): 32-42 (2020) - [c22]Shin-Ying Huang, Yiju Wu:
POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis. AsiaCCS 2020: 892-894 - [c21]Shin-Ying Huang, Tao Ban:
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. TrustCom 2020: 1771-1776
2010 – 2019
- 2019
- [j4]Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices. IEICE Trans. Inf. Syst. 102-D(9): 1683-1685 (2019) - [c20]Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. ASONAM 2019: 691-695 - [c19]Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Malicious URL Linkage Analysis and Common Pattern Discovery. IEEE BigData 2019: 3172-3179 - [c18]Shin-Ying Huang, Tao Ban:
A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration. TrustCom/BigDataSE 2019: 208-215 - 2018
- [c17]Chia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee:
Detection of DNS Tunneling by Feature-Free Mechanism. DSC 2018: 1-2 - [c16]Rua-Huan Tsaih, Shin-Ying Huang, Mao-Ci Lian, Yennun Huang
:
ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment. DSC 2018: 1-6 - [c15]Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. PST 2018: 1-2 - 2017
- [c14]Shin-Ying Huang, Ya-Yun Peng, Fang Yu:
A Parallel Majority Learning Algorithm for Anomaly Detection. DASC/PiCom/DataCom/CyberSciTech 2017: 1310-1313 - [c13]Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee:
Ziffersystem: A novel malware distribution detection system. DSC 2017: 509-515 - 2016
- [c12]Shin-Ying Huang, Jhe-Wei Lin, Rua-Huan Tsaih
:
Outlier detection in the concept drifting environment. IJCNN 2016: 31-37 - [c11]Shin-Ying Huang, Hsinchun Chen:
Exploring the online underground marketplaces through topic-based social network and clustering. ISI 2016: 145-150 - [c10]Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang:
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. ISI 2016: 175-180 - 2015
- [c9]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih
, Yennun Huang
:
Network-traffic anomaly detection with incremental majority learning. IJCNN 2015: 1-8 - 2014
- [j3]Shin-Ying Huang, Rua-Huan Tsaih
, Fang Yu
:
Topological pattern discovery and feature extraction for fraudulent financial reporting. Expert Syst. Appl. 41(9): 4360-4372 (2014) - [j2]Chun-Lung Chen, Shin-Ying Huang, Yeu-Ruey Tzeng, Chuen-Lung Chen:
A revised discrete particle swarm optimization algorithm for permutation flow-shop scheduling problem. Soft Comput. 18(11): 2271-2282 (2014) - [c8]Shin-Ying Huang, Yennun Huang
, Neeraj Suri
:
Event Pattern Discovery on IDS Traces of Cloud Services. BDCloud 2014: 25-32 - [c7]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih
, Yennun Huang
:
Resistant learning on the envelope bulk for identifying anomalous patterns. IJCNN 2014: 3303-3310 - 2013
- [c6]Shin-Ying Huang, Yennun Huang
:
Network traffic anomaly detection based on growing hierarchical SOM. DSN 2013: 1-2 - [c5]Shin-Ying Huang, Yennun Huang
:
Network Forensic Analysis Using Growing Hierarchical SOM. ICDM Workshops 2013: 536-543 - [c4]Fang Yu, Shin-Ying Huang, Li-ching Chiou, Rua-Huan Tsaih
:
Clustering iOS executable using self-organizing maps. IJCNN 2013: 1-8 - 2012
- [j1]Shin-Ying Huang, Rua-Huan Tsaih
, Wanying Lin
:
Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting. Ind. Manag. Data Syst. 112(2): 224-244 (2012) - [c3]Shin-Ying Huang, Rua-Huan Tsaih:
The prediction approach with Growing Hierarchical Self-Organizing Map. IJCNN 2012: 1-7
2000 – 2009
- 2009
- [c2]Rua-Huan Tsaih
, Wanying Lin
, Shin-Ying Huang:
Exploring Fraudulent Financial Reporting with GHSOM. PAISI 2009: 31-41 - 2008
- [c1]Rua-Huan Tsaih
, Yat-wah Wan, Shin-Ying Huang:
The rule-extraction through the preimage analysis. IJCNN 2008: 1488-1494
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint