dblp.uni-trier.dewww.uni-trier.de

Andrew H. Sung

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
56EEQingzhong Liu, Andrew H. Sung, Mengyu Qiao: Detecting information-hiding in WAV audios. ICPR 2008: 1-4
55EERita Ferreira, Bernardete Ribeiro, Catarina Silva, Qingzhong Liu, Andrew H. Sung: Building resilient classifiers for LSB matching steganography. IJCNN 2008: 1562-1567
54EEQingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Rita Ferreira: Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. IJCNN 2008: 3352-3357
53EERam B. Basnet, Srinivas Mukkamala, Andrew H. Sung: Detection of Phishing Attacks: A Machine Learning Approach. Soft Computing Applications in Industry 2008: 373-383
52EEQingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178(1): 21-36 (2008)
51EEAnthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung: SQL infections through RFID. Journal in Computer Virology 4(4): 347-356 (2008)
50EEQingzhong Liu, Andrew H. Sung, Zhongxue Chen, Jianyun Xu: Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition 41(1): 56-66 (2008)
2007
49 Mislav Grgic, Andrew H. Sung, Guoyin Wang: International Conference on High Performance Computing, Networking and Communication Systems, HPCNCS-07, Orlando, Florida, USA, July 9-12 2007 ISRST 2007
48EESrinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung: Detecting Coordinated Distributed Multiple Attacks. AINA Workshops (1) 2007: 557-562
47EECatarina Silva, Bernardete Ribeiro, Andrew H. Sung: Boosting RVM Classifiers for Large Data Sets. ICANNGA (2) 2007: 228-237
46EERajani Goteti, A. Tamilarasan, R. S. Balch, Srinivas Mukkamala, Andrew H. Sung: Estimating Monthly Production of Oil Wells. IFSA (2) 2007: 393-403
45 Ram B. Basnet, Krishna Yendrapalli, Tenzin, Srinivas Mukkamala, Andrew H. Sung: Knowledge Based Discovery of Phishing Attacks. IICAI 2007: 731-742
44EEQingzhong Liu, Andrew H. Sung: Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. IJCAI 2007: 2808-2813
43 Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung: Gene Selection for Tumor Classification Using Microarray Gene Expression Data. World Congress on Engineering 2007: 290-295
42 Krishna Yendrapalli, Srinivas Mukkamala, Andrew H. Sung, Bernardete Ribeiro: Biased Support Vector Machines and Kernel Methods for Intrusion Detection. World Congress on Engineering 2007: 321-325
41EESrinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Hybrid multi-agent framework for detection of stealthy probes. Appl. Soft Comput. 7(3): 631-641 (2007)
40EEMingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather: Predicting injection profiles using ANFIS. Inf. Sci. 177(20): 4445-4461 (2007)
2006
39EEPatrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung: Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). AINA (2) 2006: 10-14
38EESrinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung: Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. ICAISC 2006: 951-961
37EEJianyun Xu, Andrew H. Sung, Qingzhong Liu: Tree Based Behavior Monitoring for Adaptive Fraud Detection. ICPR (1) 2006: 1208-1211
36EEQingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro: Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. ICPR (2) 2006: 267-270
35EESrinivas Mukkamala, Dennis Xu, Andrew H. Sung: Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. IEA/AIE 2006: 619-628
34EEQingzhong Liu, Andrew H. Sung: Recursive Feature Addition for Gene Selection. IJCNN 2006: 1360-1367
33EEA. Tamilarasan, Srinivas Mukkamala, Andrew H. Sung, Krishna Yendrapalli: Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. IJCNN 2006: 4754-4761
32EEMingzhen Wei, Andrew H. Sung, Martha E. Cather: Improving database quality through eliminating duplicate records. Data Science Journal 5: 127-142 (2006)
2005
31 Mingzhen Wei, Andrew H. Sung, Martha E. Cather: A New Domain-Independent Field Matching Algorithm for Large Databases. DMIN 2005: 126-131
30 Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala: Fraud Detection System Based on Behavior Mining and Anomaly Detection. IICAI 2005: 3487-3501
29EEAnthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung: Disassembled code analyzer for malware (DCAM). IRI 2005: 398-403
28 Jianyun Xu, Andrew H. Sung, Qingzhong Liu: Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370
27EESrinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Intrusion detection using an ensemble of intelligent paradigms. J. Network and Computer Applications 28(2): 167-182 (2005)
2004
26EEAndrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala: Static Analyzer of Vicious Executables (SAVE). ACSAC 2004: 326-334
25EEAndrew H. Sung, Srinivas Mukkamala: The Feature Selection and Intrusion Detection Problems. ASIAN 2004: 468-482
24 Jianyun Xu, Andrew H. Sung, Qingzhong Liu: Detecting Hidden Information in the Wavelet Domain. CISST 2004: 571-577
23EEJianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala: Polymorphic Malicious Executable Scanner by API Sequence Analysis. HIS 2004: 378-383
22EEPatrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung: Website Visitor Classification Using Machine Learning. HIS 2004: 384-389
21 Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos: Intrusion Detection Systems Using Adaptive Regression Splines. ICEIS (3) 2004: 26-33
20EESrinivas Mukkamala, Andrew H. Sung: Computational Intelligent Techniques for Detecting Denial of Service Attacks. IEA/AIE 2004: 616-624
19EESrinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. IEA/AIE 2004: 633-642
18 Mingzhen Wei, Andrew H. Sung, Martha E. Cather: Detecting Spatial Outliers Using Bipartite Outlier Detection Methods. IKE 2004: 236-244
17EEAndrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala: Defeating the Current Steganalysis Techniques (Robust Steganography). ITCC (1) 2004: 440-444
16EEJianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu: JPEG Compression Immune Steganography Using Wavelet Transform. ITCC (2) 2004: 704-708
15EESrinivas Mukkamala, Andrew H. Sung: A framework for countering denial of service attacks. SMC (4) 2004: 3273-3278
14EESrinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos: Intrusion Detection Systems Using Adaptive Regression Splines CoRR cs.AI/0405016: (2004)
2003
13 Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. HIS 2003: 779-788
12EESrinivas Mukkamala, Andrew H. Sung: A Comparative Study of Techniques for Intrusion Detection. ICTAI 2003: 570-
11 Srinivas Mukkamala, Andrew H. Sung: A Distributed Agent Based IDS for Stealthy Probe Detection. IICAI 2003: 413-422
10EEAndrew H. Sung, Srinivas Mukkamala: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. SAINT 2003: 209-217
9EESrinivas Mukkamala, Andrew H. Sung: Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. IJDE 1(4): (2003)
2002
8 Srinivas Mukkamala, Andrew H. Sung: Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. HIS 2002: 351-364
7 Andrew H. Sung: Role of Soft Computing in Internet Security. HIS 2002: 8
2001
6 Srinivas Mukkamala, Guadalupe I. Janoski, Andrew H. Sung: Monitoring System Security Using Neural Networks and Support Vector Machines. HIS 2001: 121-137
5EEGuadalupe I. Janoski, Andrew H. Sung: Alternate Methods in Reservoir Simulation. International Conference on Computational Science (2) 2001: 253-262
2000
4EEHujun Li, Fangsheng Li, Andrew H. Sung, William W. Weiss: A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation. IEA/AIE 2000: 290-295
3EEGuadalupe I. Janoski, Fansheng Li, Mateusz Pietrzyk, Andrew H. Sung, Shih-Hsien Chang, Reid B. Grigg: Advances Reservoir Simulation Using Soft Computing. IEA/AIE 2000: 623-628
1994
2 Willie Chang, Hamdy S. Soliman, Andrew H. Sung: Fingerprint Image Compression by a Natural Clustering Neural Network. ICIP (2) 1994: 341-345
1EEWillie Chang, Hamdy S. Soliman, Andrew H. Sung: Fingerprint Image Compression by a Clustering Learning Network. IEA/AIE 1994: 51-56

Coauthor Index

1Ajith Abraham [13] [14] [19] [21] [27] [41]
2Baojun Bai [40]
3R. S. Balch [46]
4Ram B. Basnet [43] [45] [48] [53]
5Martha E. Cather [18] [31] [32] [40]
6Shih-Hsien Chang [3]
7Willie Chang [1] [2]
8Patrick Chavez [23] [26]
9Zhongxue Chen [50] [52]
10Patrick Defibaugh-Chavez [22] [39]
11Rita Ferreira [54] [55]
12Rajani Goteti [46]
13Mislav Grgic [49]
14Reid B. Grigg [3]
15Guadalupe I. Janoski [3] [5] [6]
16Fangsheng Li [4]
17Fansheng Li [3]
18Hujun Li [4]
19Qingzhong Liu [16] [24] [28] [30] [34] [36] [37] [38] [40] [44] [50] [52] [54] [55] [56]
20Srinivas Mukkamala [6] [8] [9] [10] [11] [12] [13] [14] [15] [17] [19] [20] [21] [22] [23] [25] [26] [27] [29] [30] [33] [35] [38] [39] [41] [42] [43] [45] [46] [48] [51] [53]
21Mateusz Pietrzyk [3]
22Mengyu Qiao [56]
23K. Ramamoorthy [29]
24Vitorino Ramos [14] [21]
25Bernardete Ribeiro [36] [42] [47] [52] [54] [55]
26Peipei Shi [16]
27Catarina Silva [47] [55]
28Hamdy S. Soliman [1] [2]
29Anthonius Sulaiman [29] [51]
30Gopalakrishna Reddy Tadiparthi [17]
31A. Tamilarasan [33] [46]
32 Tenzin [45]
33Rajeev Veeraghattam [38]
34Guoyin Wang [49]
35Jiachun Wang [40]
36Mingzhen Wei [18] [31] [32] [40] [52]
37William W. Weiss [4]
38Dennis Xu [35]
39Jianyun Xu [16] [23] [24] [26] [28] [30] [36] [37] [50] [52]
40Krishna Yendrapalli [33] [42] [43] [45] [48]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)