Search Results for author: Wesley Joon-Wie Tann

Found 3 papers, 1 papers with code

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

no code implementations12 Dec 2020 Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang

We also introduce a machine learning optimization problem that aims to sift out the attacks using ${\mathcal N}$ and ${\mathcal M}$.

Anomaly Detection Transfer Learning

SHADOWCAST: Controllable Graph Generation

no code implementations6 Jun 2020 Wesley Joon-Wie Tann, Ee-Chien Chang, Bryan Hooi

Given an observed graph and some user-specified Markov model parameters, ${\rm S{\small HADOW}C{\small AST}}$ controls the conditions to generate desired graphs.

Graph Generation

Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Vulnerabilities

1 code implementation16 Nov 2018 Wesley Joon-Wie Tann, Xing Jie Han, Sourav Sen Gupta, Yew-Soon Ong

In particular, we propose a novel approach of sequential learning of smart contract vulnerabilities using machine learning --- long-short term memory (LSTM) --- that perpetually learns from an increasing number of contracts handled over time, leading to safer smart contracts.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.