scispace - formally typeset
P

Philip K. Chan

Researcher at Florida Institute of Technology

Publications -  107
Citations -  11394

Philip K. Chan is an academic researcher from Florida Institute of Technology. The author has contributed to research in topics: Anomaly detection & Intrusion detection system. The author has an hindex of 41, co-authored 103 publications receiving 10694 citations. Previous affiliations of Philip K. Chan include Vanderbilt University & Columbia University.

Papers
More filters
Journal ArticleDOI

Toward accurate dynamic time warping in linear time and space

TL;DR: This paper introduces FastDTW, an approximation of DTW that has a linear time and space complexity and shows a large improvement in accuracy over existing methods.
Proceedings ArticleDOI

Determining the number of clusters/segments in hierarchical clustering/segmentation algorithms

TL;DR: This work proposes an efficient algorithm, the L method, that finds the "knee" in a '# of clusters vs. clustering evaluation metric' graph, using the knee is well-known, but is not a particularly well-understood method to determine the number of clusters.
Proceedings Article

AdaCost: Misclassification Cost-Sensitive Boosting

TL;DR: It is formally show that AdaCost reduces the upper bound of cumulative misclassification cost of the training set, which is significant reduction in the cumulative mis classification cost over AdaBoost without consuming additional computing power.
Proceedings ArticleDOI

Cost-based modeling for fraud and intrusion detection: results from the JAM project

TL;DR: There is clear evidence that state-of-the-art commercial fraud detection systems can be substantially improved in stopping losses due to fraud by combining multiple models of fraudulent transaction shared among banks.
Book ChapterDOI

An analysis of the 1999 DARPA/lincoln Laboratory evaluation data for network anomaly detection

TL;DR: This investigation of the 1999 background network traffic suggests the presence of simulation artifacts that would lead to overoptimistic evaluation of network anomaly detection systems.