Author of the publication

Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach.

, , , , , , and . WWW, page 616-626. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forecasting Association Rules Using Existing Data Sets., , , and . IEEE Trans. Knowl. Data Eng., 15 (6): 1448-1459 (2003)Massive XML Data Mining in Cloud Computing Environment.. Journal of Multimedia, 9 (8): 1011-1016 (2014)A Reconfigurable ΔΣ ADC With Up to 100 MHz Bandwidth Using Flash Reference Shuffling., , and . IEEE Trans. on Circuits and Systems, 61-I (8): 2263-2271 (2014)Understanding Collaboration Process Design in CSCL: A Case Study in a PG Environment., , and . JSW, 8 (4): 852-859 (2013)Real-time quantifying heart beat rate from facial video recording on a smart phone using Kalman filters., , , and . Healthcom, page 393-396. IEEE, (2014)OFScheduler: A Dynamic Network Optimizer for MapReduce in Heterogeneous Cluster., , , and . International Journal of Parallel Programming, 43 (3): 472-488 (2015)A novel local path planning method considering both robot posture and path smoothness., , , , , , , and . ROBIO, page 172-178. IEEE, (2013)Exploring Online Identity Re-Construction in Social Network Communities: a Qualitative Study., , and . PACIS, page 36. (2014)Laser only feature based multi robot SLAM., , , and . ICARCV, page 1012-1017. IEEE, (2012)Dynamic spectrum sharing and user scheduling for CR-MIMO system based on interference alignment., , and . ICT, page 1-5. IEEE, (2013)