Skip to main content

Showing 1–5 of 5 results for author: Huang, T H

Searching in archive cs. Search in all archives.
.
  1. arXiv:1811.11136  [pdf, other

    cs.CL cs.SI

    SOC: hunting the underground inside story of the ethereum Social-network Opinion and Comment

    Authors: TonTon Hsien-De Huang, Po-Wei Hong, Ying-Tse Lee, Yi-Lun Wang, Chi-Leong Lok, Hung-Yu Kao

    Abstract: The cryptocurrency is attracting more and more attention because of the blockchain technology. Ethereum is gaining a significant popularity in blockchain community, mainly due to the fact that it is designed in a way that enables developers to write smart contracts and decentralized applications (Dapps). There are many kinds of cryptocurrency information on the social network. The risks and fraud… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Draft

  2. arXiv:1807.01868  [pdf, other

    cs.CR cs.LG

    Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks

    Authors: TonTon Hsien-De Huang

    Abstract: Blockchain and Cryptocurrencies are gaining unprecedented popularity and understanding. Meanwhile, Ethereum is gaining a significant popularity in the blockchain community, mainly due to the fact that it is designed in a way that enables developers to write smart contract and decentralized applications (Dapps). This new paradigm of applications opens the door to many possibilities and opportunitie… ▽ More

    Submitted 5 July, 2018; originally announced July 2018.

    Comments: 2018/07/04 Draft Version

  3. arXiv:1803.00458  [pdf, ps, other

    cs.CY cs.HC cs.IR

    C-3PO: Click-sequence-aware DeeP Neural Network (DNN)-based Pop-uPs RecOmmendation

    Authors: TonTon Hsien-De Huang, Hung-Yu Kao

    Abstract: With the emergence of mobile and wearable devices, push notification becomes a powerful tool to connect and maintain the relationship with App users, but sending inappropriate or too many messages at the wrong time may result in the App being removed by the users. In order to maintain the retention rate and the delivery rate of advertisement, we adopt Deep Neural Network (DNN) to develop a pop-up… ▽ More

    Submitted 20 December, 2018; v1 submitted 28 February, 2018; originally announced March 2018.

    Comments: 2018/12/20

  4. arXiv:1710.05305  [pdf, other

    cs.CR cs.CY

    Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao

    Abstract: The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake a… ▽ More

    Submitted 15 October, 2017; originally announced October 2017.

    Comments: 6 pages, TAAI 2017 version

  5. arXiv:1705.04448  [pdf, other

    cs.CR cs.AI

    R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

    Authors: TonTon Hsien-De Huang, Hung-Yu Kao

    Abstract: The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid iteration of Android malware. The traditional solution for detecting Android malware requires continuous learning through pre-extracted features to main… ▽ More

    Submitted 15 November, 2018; v1 submitted 12 May, 2017; originally announced May 2017.

    Comments: Verison 2018/11/15, IEEE BigData 2018, Seattle, WA, USA, Dec 10-13, 2018. (Accepted)