Author of the publication

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.

, , , , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 341-349. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Pang, Shaoning
add a person with the name Pang, Shaoning
 

Other publications of authors with the same name

Incremental learning of feature space and classifier for on-line pattern recognition., , and . KES Journal, 10 (1): 57-65 (2006)Chunk incremental IDR/QR LDA learning., , , , , and . IJCNN, page 1-8. IEEE, (2013)Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining., , , and . AINA, page 8-14. IEEE Computer Society, (2012)Incremental and Decremental Max-Flow for Online Semi-Supervised Learning., , , , and . IEEE Trans. Knowl. Data Eng., 28 (8): 2115-2127 (2016)Multiple sequence alignment and artificial neural networks for malicious software detection., , , and . ICNC, page 261-265. IEEE, (2012)Urban air pollution alert service for smart cities., , , , and . IOT, page 9:1-9:8. ACM, (2018)Merging weighted SVMs for parallel incremental learning., , , , and . Neural Networks, (2018)Dynamic class imbalance learning for incremental LPSVM., , , , , and . Neural Networks, (2013)Chunk Incremental LDA Computing on Data Streams., , and . ISNN (2), volume 3497 of Lecture Notes in Computer Science, page 51-56. Springer, (2005)Analysis and Configuration of Boundary Difference Calculations., , , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 333-340. Springer, (2014)