Steve T.K. Jan
Steve T.K. Jan
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Crowdsourcing cybersecurity: Cyber attack detection using social media
RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
502017
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
482018
The next domino to fall: Empirical analysis of user passwords across online services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
382018
Connecting the digital and physical world: Improving the robustness of adversarial attacks
STK Jan, J Messou, YC Lin, JB Huang, G Wang
Proceedings of the AAAI Conference on Artificial Intelligence 33, 962-969, 2019
202019
A simple methodology for soft cost-sensitive classification
TK Jan, DW Wang, CH Lin, HT Lin
Proceedings of the 18th ACM SIGKDD international conference on Knowledge …, 2012
182012
Pay-per-question: towards targeted Q&A with payments
STK Jan, C Wang, Q Zhang, G Wang
Proceedings of the 2018 ACM Conference on Supporting Groupwork, 1-11, 2018
92018
Cost-sensitive classification on pathogen species of bacterial meningitis by surface enhanced Raman scattering
TK Jan, HT Lin, HP Chen, TC Chern, CY Huang, BC Wen, CW Chung, ...
2011 IEEE International Conference on Bioinformatics and Biomedicine, 390-393, 2011
62011
Towards monetary incentives in social Q&A services
STK Jan, C Wang, Q Zhang, G Wang
arXiv preprint arXiv:1703.01333, 2017
52017
AI Trust in business processes: The need for process-aware explanations
STK Jan, V Ishakian, V Muthusamy
arXiv preprint arXiv:2001.07537, 2020
42020
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
The 41st IEEE Symposium on Security and Privacy (IEEE SP), 2020
42020
Empirical analysis of password reuse and modification across online service
C Wang, STK Jan, H Hu, G Wang
arXiv preprint arXiv:1706.01939, 2017
42017
MeiKe: Influence-based Communities in Networks
Y Zhang, B Adhikari, STK Jan, BA Prakash
Proceedings of the 2017 SIAM International Conference on Data Mining, 318-326, 2017
32017
Data selection techniques for large-scale rank SVM
KY Lin, TK Jan, HT Lin
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
22013
A comparison of methods for cost-sensitive support vector machines
TK Jan
Master's thesis, National Taiwan University, 2010
22010
Analyzing Payment-Driven Targeted Q8A Systems
STK Jan, C Wang, Q Zhang, G Wang
ACM Transactions on Social Computing 1 (3), 1-21, 2018
12018
Unstable Communities in Network Ensembles
A Rahman, STK Jan, H Kim, BA Prakash, TM Murali
Proceedings of the 2016 SIAM International Conference on Data Mining, 504-512, 2016
12016
Mining Unstable Communities from Network Ensembles
A Rahman, S Jan, H Kim, BA Prakash, TM Murali
2015 IEEE International Conference on Data Mining Workshop (ICDMW), 508-515, 2015
12015
Data selection techniques for large-scale rankSVM
KY Lin, TK Jan, HT Lin
Master’s thesis, Department of Computer Science and Information Engineering …, 2010
12010
Robustifying Machine Learning based Security Applications
STK Jan
Virginia Tech, 2020
2020
Soft Methodology for Cost-and-error Sensitive Classification
TK Jan, DW Wang, CH Lin, HT Lin
arXiv preprint arXiv:1710.09515, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20