2008 | ||
---|---|---|
56 | EE | Qingzhong Liu, Andrew H. Sung, Mengyu Qiao: Detecting information-hiding in WAV audios. ICPR 2008: 1-4 |
55 | EE | Rita Ferreira, Bernardete Ribeiro, Catarina Silva, Qingzhong Liu, Andrew H. Sung: Building resilient classifiers for LSB matching steganography. IJCNN 2008: 1562-1567 |
54 | EE | Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Rita Ferreira: Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. IJCNN 2008: 3352-3357 |
53 | EE | Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung: Detection of Phishing Attacks: A Machine Learning Approach. Soft Computing Applications in Industry 2008: 373-383 |
52 | EE | Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178(1): 21-36 (2008) |
51 | EE | Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung: SQL infections through RFID. Journal in Computer Virology 4(4): 347-356 (2008) |
50 | EE | Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Jianyun Xu: Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition 41(1): 56-66 (2008) |
2007 | ||
49 | Mislav Grgic, Andrew H. Sung, Guoyin Wang: International Conference on High Performance Computing, Networking and Communication Systems, HPCNCS-07, Orlando, Florida, USA, July 9-12 2007 ISRST 2007 | |
48 | EE | Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung: Detecting Coordinated Distributed Multiple Attacks. AINA Workshops (1) 2007: 557-562 |
47 | EE | Catarina Silva, Bernardete Ribeiro, Andrew H. Sung: Boosting RVM Classifiers for Large Data Sets. ICANNGA (2) 2007: 228-237 |
46 | EE | Rajani Goteti, A. Tamilarasan, R. S. Balch, Srinivas Mukkamala, Andrew H. Sung: Estimating Monthly Production of Oil Wells. IFSA (2) 2007: 393-403 |
45 | Ram B. Basnet, Krishna Yendrapalli, Tenzin, Srinivas Mukkamala, Andrew H. Sung: Knowledge Based Discovery of Phishing Attacks. IICAI 2007: 731-742 | |
44 | EE | Qingzhong Liu, Andrew H. Sung: Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. IJCAI 2007: 2808-2813 |
43 | Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung: Gene Selection for Tumor Classification Using Microarray Gene Expression Data. World Congress on Engineering 2007: 290-295 | |
42 | Krishna Yendrapalli, Srinivas Mukkamala, Andrew H. Sung, Bernardete Ribeiro: Biased Support Vector Machines and Kernel Methods for Intrusion Detection. World Congress on Engineering 2007: 321-325 | |
41 | EE | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Hybrid multi-agent framework for detection of stealthy probes. Appl. Soft Comput. 7(3): 631-641 (2007) |
40 | EE | Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather: Predicting injection profiles using ANFIS. Inf. Sci. 177(20): 4445-4461 (2007) |
2006 | ||
39 | EE | Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung: Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). AINA (2) 2006: 10-14 |
38 | EE | Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung: Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. ICAISC 2006: 951-961 |
37 | EE | Jianyun Xu, Andrew H. Sung, Qingzhong Liu: Tree Based Behavior Monitoring for Adaptive Fraud Detection. ICPR (1) 2006: 1208-1211 |
36 | EE | Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro: Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. ICPR (2) 2006: 267-270 |
35 | EE | Srinivas Mukkamala, Dennis Xu, Andrew H. Sung: Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. IEA/AIE 2006: 619-628 |
34 | EE | Qingzhong Liu, Andrew H. Sung: Recursive Feature Addition for Gene Selection. IJCNN 2006: 1360-1367 |
33 | EE | A. Tamilarasan, Srinivas Mukkamala, Andrew H. Sung, Krishna Yendrapalli: Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. IJCNN 2006: 4754-4761 |
32 | EE | Mingzhen Wei, Andrew H. Sung, Martha E. Cather: Improving database quality through eliminating duplicate records. Data Science Journal 5: 127-142 (2006) |
2005 | ||
31 | Mingzhen Wei, Andrew H. Sung, Martha E. Cather: A New Domain-Independent Field Matching Algorithm for Large Databases. DMIN 2005: 126-131 | |
30 | Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala: Fraud Detection System Based on Behavior Mining and Anomaly Detection. IICAI 2005: 3487-3501 | |
29 | EE | Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung: Disassembled code analyzer for malware (DCAM). IRI 2005: 398-403 |
28 | Jianyun Xu, Andrew H. Sung, Qingzhong Liu: Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370 | |
27 | EE | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Intrusion detection using an ensemble of intelligent paradigms. J. Network and Computer Applications 28(2): 167-182 (2005) |
2004 | ||
26 | EE | Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala: Static Analyzer of Vicious Executables (SAVE). ACSAC 2004: 326-334 |
25 | EE | Andrew H. Sung, Srinivas Mukkamala: The Feature Selection and Intrusion Detection Problems. ASIAN 2004: 468-482 |
24 | Jianyun Xu, Andrew H. Sung, Qingzhong Liu: Detecting Hidden Information in the Wavelet Domain. CISST 2004: 571-577 | |
23 | EE | Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala: Polymorphic Malicious Executable Scanner by API Sequence Analysis. HIS 2004: 378-383 |
22 | EE | Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung: Website Visitor Classification Using Machine Learning. HIS 2004: 384-389 |
21 | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos: Intrusion Detection Systems Using Adaptive Regression Splines. ICEIS (3) 2004: 26-33 | |
20 | EE | Srinivas Mukkamala, Andrew H. Sung: Computational Intelligent Techniques for Detecting Denial of Service Attacks. IEA/AIE 2004: 616-624 |
19 | EE | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. IEA/AIE 2004: 633-642 |
18 | Mingzhen Wei, Andrew H. Sung, Martha E. Cather: Detecting Spatial Outliers Using Bipartite Outlier Detection Methods. IKE 2004: 236-244 | |
17 | EE | Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala: Defeating the Current Steganalysis Techniques (Robust Steganography). ITCC (1) 2004: 440-444 |
16 | EE | Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu: JPEG Compression Immune Steganography Using Wavelet Transform. ITCC (2) 2004: 704-708 |
15 | EE | Srinivas Mukkamala, Andrew H. Sung: A framework for countering denial of service attacks. SMC (4) 2004: 3273-3278 |
14 | EE | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos: Intrusion Detection Systems Using Adaptive Regression Splines CoRR cs.AI/0405016: (2004) |
2003 | ||
13 | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham: Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. HIS 2003: 779-788 | |
12 | EE | Srinivas Mukkamala, Andrew H. Sung: A Comparative Study of Techniques for Intrusion Detection. ICTAI 2003: 570- |
11 | Srinivas Mukkamala, Andrew H. Sung: A Distributed Agent Based IDS for Stealthy Probe Detection. IICAI 2003: 413-422 | |
10 | EE | Andrew H. Sung, Srinivas Mukkamala: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. SAINT 2003: 209-217 |
9 | EE | Srinivas Mukkamala, Andrew H. Sung: Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. IJDE 1(4): (2003) |
2002 | ||
8 | Srinivas Mukkamala, Andrew H. Sung: Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. HIS 2002: 351-364 | |
7 | Andrew H. Sung: Role of Soft Computing in Internet Security. HIS 2002: 8 | |
2001 | ||
6 | Srinivas Mukkamala, Guadalupe I. Janoski, Andrew H. Sung: Monitoring System Security Using Neural Networks and Support Vector Machines. HIS 2001: 121-137 | |
5 | EE | Guadalupe I. Janoski, Andrew H. Sung: Alternate Methods in Reservoir Simulation. International Conference on Computational Science (2) 2001: 253-262 |
2000 | ||
4 | EE | Hujun Li, Fangsheng Li, Andrew H. Sung, William W. Weiss: A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation. IEA/AIE 2000: 290-295 |
3 | EE | Guadalupe I. Janoski, Fansheng Li, Mateusz Pietrzyk, Andrew H. Sung, Shih-Hsien Chang, Reid B. Grigg: Advances Reservoir Simulation Using Soft Computing. IEA/AIE 2000: 623-628 |
1994 | ||
2 | Willie Chang, Hamdy S. Soliman, Andrew H. Sung: Fingerprint Image Compression by a Natural Clustering Neural Network. ICIP (2) 1994: 341-345 | |
1 | EE | Willie Chang, Hamdy S. Soliman, Andrew H. Sung: Fingerprint Image Compression by a Clustering Learning Network. IEA/AIE 1994: 51-56 |