Author of the publication

Combating phishing attacks via brand identity and authorization features.

, , and . Security and Communication Networks, 8 (6): 888-898 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and Robust Graph-based Transductive Learning via Minimum Tree Cut., , and . ICDM, page 952-961. IEEE Computer Society, (2011)Drawing and Recognizing Chinese Characters with Recurrent Neural Network., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 40 (4): 849-862 (2018)An Abused Webpage Detection Method Based on Screenshots Text Recognition., , , , and . ICEA, page 106-110. ACM, (2021)Integrating supervised subspace criteria with restricted Boltzmann Machine for feature extraction., , , and . IJCNN, page 1622-1629. IEEE, (2014)Minimum-risk training for semi-Markov conditional random fields with application to handwritten Chinese/Japanese text recognition., , , , and . Pattern Recognition, 47 (5): 1904-1916 (2014)Transductive Learning on Adaptive Graphs., , , , and . AAAI, AAAI Press, (2010)Adaptive spatial pooling for image classification., , , and . Pattern Recognition, (2016)A Taxonomy of Hyperlink Hiding Techniques, , , , and . CoRR, (2013)MTC: A Fast and Robust Graph-Based Transductive Learning Method., , , and . IEEE Trans. Neural Netw. Learning Syst., 26 (9): 1979-1991 (2015)Combating phishing attacks via brand identity and authorization features., , and . Security and Communication Networks, 8 (6): 888-898 (2015)