default search action
Te-En Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c20]Boryau Hsupeng, Kun-Wei Lee, Te-En Wei, Shih-Hao Wang:
Explainable Malware Detection Using Predefined Network Flow. ICACT 2022: 27-33
2010 – 2019
- 2019
- [j1]Te-En Wei, Hahn-Ming Lee, Albert B. Jeng, Hemank Lamba, Christos Faloutsos:
WebHound: a data-driven intrusion detection from real-world web access logs. Soft Comput. 23(22): 11947-11965 (2019) - [c19]Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network. ICACT 2019: 533-538 - 2018
- [c18]Chi-Kuan Chiu, Hsiao-Hsien Chang, Ching-Hao Mao, Te-En Wei:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance. DSC 2018: 1-2 - 2016
- [c17]Jain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. Trustcom/BigDataSE/ISPA 2016: 1867-1874 - 2015
- [c16]Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei:
Smartphone continuous authentication based on keystroke and gesture profiling. ICCST 2015: 191-197 - [c15]Ru Ko, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking. ICITCS 2015: 1-7 - [c14]Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. TrustCom/BigDataSE/ISPA (1) 2015: 1014-1021 - 2014
- [c13]Pei-Chi Chen, Hahn-Ming Lee, Hsiao-Rong Tyan, Jain-Shing Wu, Te-En Wei:
Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation. TAAI 2014: 56-65 - 2013
- [c12]Ke-Wei Su, Kuo-Ping Wu, Hahn-Ming Lee, Te-En Wei:
Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis. AsiaJCIS 2013: 77-84 - [c11]Horng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee:
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison. COMPSAC 2013: 349-358 - [c10]Quan-Bin Ye, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, Kuo-Ping Wu:
DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks. TAAI 2013: 158-163 - 2012
- [c9]Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu:
DroidMat: Android Malware Detection through Manifest and API Calls Tracing. AsiaJCIS 2012: 62-69 - [c8]Szu-Yu Lin, Te-En Wei, Hahn-Ming Lee, Albert B. Jeng, Chien-Tsung Liu:
A novel approach for re-authentication protocol using personalized information. ICMLC 2012: 1826-1829 - [c7]Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, Chih-How Chen, Chin-Wei Tien:
Android privacy. ICMLC 2012: 1830-1837 - [c6]Te-En Wei, Albert B. Jeng, Hahn-Ming Lee:
GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack. IPCCC 2012: 392-399 - [c5]Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu:
Android Malware Detection via a Latent Network Behavior Analysis. TrustCom 2012: 1251-1258 - [c4]Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen:
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. TrustCom 2012: 1370-1375 - 2011
- [c3]Albert B. Jeng, Li-Chung Chang, Hahn-Ming Lee, Te-En Wei, Szu-Yu Lin:
How to solve collision and authentication issues using RFID protocol technology. ICMLC 2011: 454-460 - [c2]Te-En Wei, Zhi-Wei Chen, Chin-Wei Tien, Jain-Shing Wu, Hahn-Ming Lee, Albert B. Jeng:
RePEF - A system for Restoring Packed Executable File for malware analysis. ICMLC 2011: 519-527 - 2010
- [c1]Albert B. Jeng, Li-Chung Chang, Te-En Wei, Hong-Zhe Li:
The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting. ICMLC 2010: 2681-2686
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint