Steve T.K. Jan


I will join Tiktok as a MLE after graduating from VT.

Education

University of Illinois at Urbana-Champaign Visiting Ph.D. in Computer Science
Virginia Tech Ph.D. in Computer Science
National Taiwan University M.S. in Computer Science
Chung Yuan Christian University B.S. in Computer Science

Experience

MIT-IBM Watson AI Lab, Research Intern May 2019 - Aug. 2019
Intel, Software Engineering Intern May 2018 - Aug. 2018

Publications

Google Scholar

Assessing Browser-level Defense against IDN-based Phishing
*Steve T. K. Jan, *Hang Hu, Yang Wang, and Gang Wang
Proceedings of The 30th USENIX Security Symposium (USENIX Security) 2021
*Co-first authors with equal contribution.
[1] [pdf]
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
Steve T. K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, and Bimal Viswanath
Proceedings of The 41st IEEE Symposium on Security and Privacy (IEEE SP) 2020
[2] [pdf] [video]
AI Trust in business processes: The need for process-aware explanations
Steve T. K. Jan, Vatche Ishakian, and Vinod Muthusamy
Proceedings of Innovative Applications of Artificial Intelligence (IAAI) 2020
[3] [pdf]
Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
Steve T. K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, and Gang Wang
Proceedings of AAAI Conference on Artificial Intelligence (AAAI) 2019
[4] [pdf]
Analyzing Payment-driven Targeted Q&A Systems
Steve T. K. Jan, Chun Wang, Qing Zhang, and Gang Wang
ACM Transactions on Social Computing (TSC) 2018
[5] [pdf]
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
Ke Tien, Steve T. K. Jan, Hang Hu, Danfeng Yao, and Gang Wang
Proceedings of ACM Internet Measurement Conference (IMC) 2018
[6] [pdf] [slides]
The Next Domino To Fall: Empirical Analysis of User Passwords across Online Services
Chun Wang, Steve T. K. Jan, Hang Hu, Douglas Bossart, and Gang Wang
Proceedings of The ACM Conference on Data and Applications Security and Privacy (CODASPY) 2018
[7] [pdf]
Pay-per-Question: Towards Targeted Q&A with Payments
Steve T. K. Jan, Chun Wang, Qing Zhang, and Gang Wang
Proceedings of ACM International Conference on Supporting Group Work (GROUP) 2018
[8] [pdf] [slides]
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Rupinder Paul Khandpur, Taoran Ji, Steve T. K. Jan, Gang Wang, Chang-Tien Lu, and Naren Ramakrishnan
Proceedings of Conference on Information and Knowledge Management (CIKM) 2017
[9] [pdf]
MeiKe: Influence-based Communities in Networkss
Yao Zhang, Bijaya Adhikari, Steve T. K. Jan, and Aditya Prakash
Proceedings of SIAM International Conference on Data Mining (SDM) 2017
[10] [pdf]
Unstable Communities in Network Ensembles
Ahsanur Rahman, Steve T. K. Jan, Hyunju Kim, Aditya Prakash, and T. M. Murali
Proceedings of SIAM International Conference on Data Mining (SDM) 2016
[11] [pdf]
Mining Unstable Communities from Network Ensembles
Ahsanur Rahmana, Steve T. K. Jan, Hyunju Kim, Aditya Prakash, and T. M. Murali
Proceedings of International Conference on Data Mining Workshop (ICDM Workshop) 2016
[12] [pdf]
A Simple Methodology of Soft Cost-sensitive Classification
Steve T. K. Jan, Da-Wei Wang, Chi-Hung Lin, and Hsuan-Tien Lin
Proceedings of Knowledge Discovery and Data Minin (KDD) 2012
[13] [pdf]
Data Selection Techniques for Large-scale RankSVM
Ken-Yi Lin, Steve T. K. Jan, and Hsuan-Tien Lin
Proceedings of Technologies and Applications of Artificial Intelligence (TAAI) 2013
[14] [pdf]
Cost-Sensitive Classification on Pathogen Species of Bacterial Meningitis by Surface Enhanced Raman Scattering
Steve T. K. Jan, Hsuan-Tien Lin, and Da-Wei Wang
Proceedings of IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2011
[15] [pdf]

Last updated on 2021-03-09