default search action
Shou-Hsuan Stephen Huang
Person information
- affiliation: University of Houston, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Yang Lu, Jordan Yu, Shou-Hsuan Stephen Huang:
Illuminating the Black Box: A Psychometric Investigation into the Multifaceted Nature of Large Language Models. CoRR abs/2312.14202 (2023) - 2020
- [j20]Shou-Hsuan Stephen Huang, Zechun Cao:
Detecting Malicious Users Behind Circuit-Based Anonymity Networks. IEEE Access 8: 208610-208622 (2020) - [j19]Abraham Báez-Suárez, Nolan Shah, Juan Arturo Nolazco-Flores, Shou-Hsuan Stephen Huang, Omprakash Gnawali, Weidong Shi:
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting. ACM Trans. Multim. Comput. Commun. Appl. 16(2): 43:1-43:23 (2020)
2010 – 2019
- 2019
- [c48]Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon:
Detecting Intruders by User File Access Patterns. NSS 2019: 320-335 - 2018
- [c47]Zechun Cao, Shou-Hsuan Stephen Huang:
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. TrustCom/BigDataSE 2018: 475-480 - 2017
- [c46]Xi Lu, Shou-Hsuan Stephen Huang:
Malicious Apps May Explore a Smartphone's Vulnerability to Detect One's Activities. AINA 2017: 787-794 - 2016
- [c45]Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay:
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. AINA 2016: 1043-1050 - [c44]Shou-Hsuan Stephen Huang, Ming-Chih Shih, Youli Zu:
A Multi-Objective Flow Cytometry Profiling for B-Cell Lymphoma Diagnosis. BCB 2016: 23-31 - 2015
- [c43]Andrew Springall, Christopher DeVito, Shou-Hsuan Stephen Huang:
Per Connection Server-Side Identification of Connections via Tor. AINA 2015: 727-734 - 2013
- [c42]Wei Ding, Khoa Le, Shou-Hsuan Stephen Huang:
Detecting stepping-stones under the influence of packet jittering. IAS 2013: 31-36 - 2012
- [c41]Ming-Chih Shih, Shou-Hsuan Stephen Huang, Youli Zu, Rachel Donohue, Chung-Che Jeff Chang:
Automatic B cell lymphoma detection using flow cytometry data. ICCABS 2012: 1-6 - 2011
- [j18]Han-Ching Wu, Shou-Hsuan Stephen Huang:
Packet-based algorithms for stepping-stone detection with chaff perturbation. Secur. Commun. Networks 4(4): 436-446 (2011) - [c40]Wei Ding, Shou-Hsuan Stephen Huang:
Detecting Intruders Using a Long Connection Chain to Connect to a Host. AINA 2011: 121-128 - [c39]Shou-Hsuan Stephen Huang, Ying-Wei Kuo:
Detecting Chaff Perturbation on Stepping-Stone Connection. ICPADS 2011: 660-667 - 2010
- [j17]Han-Ching Wu, Shou-Hsuan Stephen Huang:
Neural networks-based detection of stepping-stone intrusion. Expert Syst. Appl. 37(2): 1431-1437 (2010) - [c38]Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill:
Detect multi-hop stepping-stone pairs with clock skew. IAS 2010: 74-79 - [c37]Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang:
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. AINA 2010: 198-205
2000 – 2009
- 2009
- [c36]Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
Detecting Stepping-Stone Connection Using Association Rule Mining. ARES 2009: 90-97 - [c35]Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle:
Detecting Stepping-Stone Intruders with Long Connection Chains. IAS 2009: 665-669 - [c34]Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang:
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. AINA 2009: 546-551 - [c33]Han-Ching Wu, Shou-Hsuan Stephen Huang:
Masquerade Detection Using Command Prediction and Association Rules Mining. AINA 2009: 552-559 - [c32]Ming-Chih Shih, Shou-Hsuan Stephen Huang, Chung-Che Jeff Chang:
A Multidimensional Flow Cytometry Data Classification. BIBE 2009: 356-359 - 2008
- [c31]Ming Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang:
Detecting Masqueraders Using High Frequency Commands as Signatures. AINA Workshops 2008: 596-601 - [c30]Han-Ching Wu, Shou-Hsuan Stephen Huang:
Performance of Neural Networks in Stepping-Stone Intrusion Detection. ICNSC 2008: 608-613 - [c29]Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. ICPADS 2008: 485-492 - [c28]Han-Ching Wu, Shou-Hsuan Stephen Huang:
User Behavior Analysis in Masquerade Detection Using Principal Component Analysis. ISDA (1) 2008: 201-206 - [c27]Delin Tan, Shou-Hsuan Stephen Huang:
Integrating Direct3D Programming into Computer Science Curriculum. ITNG 2008: 534-538 - 2007
- [j16]Jianhua Yang, Shou-Hsuan Stephen Huang:
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. Comput. Secur. 26(2): 137-144 (2007) - [j15]Jianhua Yang, Shou-Hsuan Stephen Huang:
Mining TCP/IP packets to detect stepping-stone intrusion. Comput. Secur. 26(7-8): 479-484 (2007) - [c26]Han-Ching Wu, Shou-Hsuan Stephen Huang:
Detecting Stepping-Stone with Chaff Perturbations. AINA Workshops (1) 2007: 85-90 - [c25]Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang:
Stepping-Stone Detection Via Request-Response Traffic Analysis. ATC 2007: 276-285 - [c24]Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
Stepping-stone detection algorithm based on order preserving mapping. ICPADS 2007: 1-8 - 2006
- [c23]Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan:
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. AINA (1) 2006: 231-236 - [c22]Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang:
Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. AINA (1) 2006: 255-262 - [c21]Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang:
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ISC 2006: 383-397 - [c20]Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang:
A Dynamic Mobility Management Scheme for VoIP Services. ITNG 2006: 340-345 - 2005
- [c19]Jianhua Yang, Shou-Hsuan Stephen Huang:
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. AINA 2005: 1005-1010 - [c18]Jianhua Yang, Shou-Hsuan Stephen Huang:
Improved Thumbprint and Its Application for Intrusion Detection. ICCNMC 2005: 433-442 - 2004
- [c17]Jianhua Yang, Shou-Hsuan Stephen Huang:
A real-time algorithm to detect long connection chains of interactive terminal sessions. InfoSecu 2004: 198-203 - [c16]Shou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada:
Exploring Similarity among Web Pages Using the Hyperlink Structure. ITCC (1) 2004: 344-348 - 2003
- [c15]Jesús Ubaldo Quevedo-Torrero, Shou-Hsuan Stephen Huang:
Similarity Among Web pages Based on their Link Structure. IKE 2003: 232-238 - 2002
- [c14]Jesús Ubaldo Quevedo-Torrero, Shou-Hsuan Stephen Huang, Günter R. Hagedorn M.:
R2H: A Framework to Transform Relations into Hypertext. International Conference on Internet Computing 2002: 471-476 - [c13]James Sablatura, Shou-Hsuan Stephen Huang:
Multi-User Interactive 3D Presentation System via the Internet. ICDCS Workshops 2002: 279-284 - 2001
- [c12]Jesús Ubaldo Quevedo-Torrero, Shou-Hsuan Stephen Huang:
WebLQM : A Web Community Examiner. WWW Posters 2001
1990 – 1999
- 1999
- [c11]Wei-Min Jeng, Shou-Hsuan Stephen Huang:
An Efficient Sparse Matrix Based Parallel Image Reconstruction Algorithm for PET on SP2. CBMS 1999: 171-176 - [c10]Wei-Min Jeng, Shou-Hsuan Stephen Huang:
An Efficient Parallel EM Algorithm: A Sparse Matrix Compaction Technique. PDPTA 1999: 2954-2960 - 1998
- [c9]Wei-Min Jeng, Shou-Hsuan Stephen Huang, David J. Yang:
A Portable PET Image Reconstruction System for Parallel Machines. CBMS 1998: 137- - [c8]Wei-Min Jeng, Shou-Hsuan Stephen Huang:
Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers. ICPP 1998: 245-252 - 1997
- [j14]Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma:
On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio. Inf. Process. Lett. 63(3): 123-129 (1997) - 1996
- [j13]Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma:
A New Combinatorial Approach to Optimal Embeddings of Rectangles. Algorithmica 16(2): 161-180 (1996) - [c7]Chien-Chi Lin, Xin Ma, Shou-Hsuan Stephen Huang:
Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three. ICPP, Vol. 2 1996: 62-69 - 1995
- [c6]Yuan Cai, Shou-Hsuan Stephen Huang, Chien-Chi Lin:
Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 5. ICPP (3) 1995: 105-112 - 1994
- [j12]Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan:
Parallel Dynamic Programming. IEEE Trans. Parallel Distributed Syst. 5(3): 326-328 (1994) - [c5]Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma:
A New Combinatorial Approach to Optimal Embeddings of Rectangles. IPPS 1994: 715-722 - 1993
- [c4]Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma:
On Embeddings of Rectangles into Optimal Squares. ICPP (3) 1993: 73-76 - 1992
- [j11]Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan:
A Sublinear Parallel Algorithm for Some Dynamic Programming Problems. Theor. Comput. Sci. 106(2): 361-371 (1992) - 1991
- [c3]Steve Szu-Yu Hu, Shou-Hsuan Stephen Huang, Barry E. Jacobs:
DAVID Universal Books Management System. DASFAA 1991: 430-438 - 1990
- [j10]Shou-Hsuan Stephen Huang, Venkatraman Viswanathan:
On the Construction of Weighted Time-Optimal B-Trees. BIT 30(2): 207-215 (1990) - [c2]Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan:
A Sub-linear Parallel Algorithm for Some Dynamic Programming Problems. ICPP (3) 1990: 261-264 - [c1]Venkatraman Viswanathan, Shou-Hsuan Stephen Huang, Hongfei Liu:
Parallel dynamic programming. SPDP 1990: 497-500
1980 – 1989
- 1988
- [j9]Shou-Hsuan Stephen Huang:
A VLSI Partition Algorithm. BIT 28(2): 215-226 (1988) - 1987
- [j8]Shou-Hsuan Stephen Huang:
Optimal Multiway Split Trees. J. Algorithms 8(1): 146-156 (1987) - 1986
- [j7]Shou-Hsuan Stephen Huang:
Ordered Priority Queues. BIT 26(4): 442-450 (1986) - 1985
- [j6]Shou-Hsuan Stephen Huang:
Multidimensional extendible hashing for partial-match queries. Int. J. Parallel Program. 14(2): 73-82 (1985) - [j5]Shou-Hsuan Stephen Huang:
Height-Balanced Trees of Order (beta,gamma,delta). ACM Trans. Database Syst. 10(2): 261-284 (1985) - 1984
- [j4]Shou-Hsuan Stephen Huang, C. K. Wong:
Generalized Binary Split Trees. Acta Informatica 21: 113-123 (1984) - [j3]Shou-Hsuan Stephen Huang, C. K. Wong:
Optimal Binary Split Trees. J. Algorithms 5(1): 69-79 (1984) - 1983
- [j2]Shou-Hsuan Stephen Huang, C. K. Wong:
Binary Search Trees with Limited Rotation. BIT 23(4): 436-455 (1983) - 1981
- [j1]James R. Bitner, Shou-Hsuan Stephen Huang:
Key Comparison Optimal 2-3 Trees with Maximum Utilization. SIAM J. Comput. 10(3): 558-570 (1981)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint