Author of the publication

A Website Credibility Assessment Scheme Based on Page Association.

, , , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 105-118. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of a Sheet-Based Material Handling System for Layered Manufacturing., , and . ICRA, page 1352-1357. IEEE, (2001)Practical Control Flow Integrity and Randomization for Binary Executables., , , , , , , and . IEEE Symposium on Security and Privacy, page 559-573. IEEE Computer Society, (2013)SoK: Eternal War in Memory., , , and . IEEE Symposium on Security and Privacy, page 48-62. IEEE Computer Society, (2013)Structuring 2-way Branches in Binary Executables., , , and . COMPSAC (1), page 115-118. IEEE Computer Society, (2007)Barycentric coordinates based soft assignment for object classification., , and . ICME Workshops, page 1-6. IEEE Computer Society, (2016)Field experience with obfuscating million-user iOS apps in large enterprise mobile development., , , and . Softw., Pract. Exper., 49 (2): 252-273 (2019)A Flexible Fringe Projection Vision System with Extended Mathematical Model for Accurate Three-Dimensional Measurement., , and . Sensors, 16 (5): 612 (2016)An Efficient Direction Field-Based Method for the Detection of Fasteners on High-Speed Railways., , , , , and . Sensors, 11 (8): 7364-7381 (2011)Incorporating Intelligence in Fog Computing for Big Data Analysis in Smart Cities., , , , , , and . IEEE Trans. Industrial Informatics, 13 (5): 2140-2150 (2017)Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity., , , , and . IEEE Access, (2017)