Остановите войну!
for scientists:
default search action
Tao Ban
Publications
- 2020
- [c71]Shaoning Pang, Tao Ban, Youki Kadobayashi, Jungsuk Song, Kaizhu Huang, Geongsen Poh, Iqbal Gondal, Kitsuchart Pasupa, Fadi A. Aloul:
CDMC'19 - The 10th International Cybersecurity Data Mining Competition. ICONIP (2) 2020: 235-245 - 2018
- [j12]Lei Zhu, Kazushi Ikeda, Shaoning Pang, Tao Ban, Abdolhossein Sarrafzadeh:
Merging weighted SVMs for parallel incremental learning. Neural Networks 100: 25-38 (2018) - [c55]Shaoning Pang, Lei Zhu, Tao Ban, Kazushi Ikeda, Wangfei Zhang, Abdolhossein Sarrafzadeh, Takeshi Takahashi, Daisuke Inoue:
Online Max-flow Learning via Augmenting and De-augmenting Path. IJCNN 2018: 1-8 - 2017
- [j11]Shaoning Pang, Dan Komosny, Lei Zhu, Ruibin Zhang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wirel. Pers. Commun. 96(4): 5335-5353 (2017) - [c52]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet. ICONIP (5) 2017: 442-451 - 2016
- [j10]Lei Zhu, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning. IEEE Trans. Knowl. Data Eng. 28(8): 2115-2127 (2016) - [c42]Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao, Runhe Huang:
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 341-349 - 2015
- [c36]Shaoning Pang, Yiming Peng, Tao Ban, Daisuke Inoue, Abdolhossein Sarrafzadeh:
A federated network online network traffics analysis engine for cybersecurity. IJCNN 2015: 1-8 - 2014
- [j8]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning. Cogn. Comput. 6(3): 304-320 (2014) - 2013
- [j6]Shaoning Pang, Lei Zhu, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Dynamic class imbalance learning for incremental LPSVM. Neural Networks 44: 87-100 (2013) - [c31]Lei Song, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
An incremental learning approach to continuous image change detection. FSKD 2013: 747-752 - [c30]Tao Ban, Ruibin Zhang, Shaoning Pang, Abdolhossein Sarrafzadeh, Daisuke Inoue:
Referential kNN Regression for Financial Time Series Forecasting. ICONIP (1) 2013: 601-608 - [c28]Yiming Peng, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Chunk incremental IDR/QR LDA learning. IJCNN 2013: 1-8 - 2012
- [j4]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration. IEEE Trans. Syst. Man Cybern. Part B 42(2): 552-564 (2012) - [c24]Gang Chen, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
SDE-Driven Service Provision Control. ICONIP (1) 2012: 260-268 - [c23]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer. ICONIP (1) 2012: 375-382 - [c22]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Behavior Analysis of Long-term Cyber Attacks in the Darknet. ICONIP (5) 2012: 620-628 - 2011
- [j3]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Personalized mode transductive spanning SVM classification tree. Inf. Sci. 181(11): 2071-2085 (2011) - 2010
- [c13]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Incremental and decremental LDA learning with applications. IJCNN 2010: 1-8 - 2009
- [j1]Shaoning Pang, Tao Ban:
Guest editorial: Thematic issue on 'Adaptive Soft Computing Techniques and Applications'. Memetic Comput. 1(4): 239-240 (2009) - [c12]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Spanning SVM Tree for Personalized Transductive Learning. ICANN (1) 2009: 913-922 - [c11]Ye Chen, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
Hierarchical Core Vector Machines for Network Intrusion Detection. ICONIP (2) 2009: 520-529 - [c10]Zbynek Michlovský, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
String Kernel Based SVM for Internet Security Implementation. ICONIP (2) 2009: 530-539
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint