Author of the publication

A distributed architecture for phishing detection using Bayesian Additive Regression Trees.

, , , and . eCrime, page 1-10. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HD image retrieval utilizing networked image directory., , , and . IEEE Trans. Consumer Electronics, 48 (4): 925-931 (2002)Approximate predictive densities and their applications in generalized linear models., and . Comput. Stat. Data Anal., 55 (4): 1570-1580 (2011)Maximum likelihood estimation of ordered multinomial probabilities by geometric programming., , and . Comput. Stat. Data Anal., 53 (4): 889-893 (2009)Hierarchical Optimization Time Integration for CFL-rate MPM Stepping., , , , , , , and . CoRR, (2019)A comparative study of rank aggregation methods for partial and top ranked lists in genomic applications., , and . Briefings Bioinform., 20 (1): 178-189 (2019)Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees., , , and . ICC, page 1-5. IEEE, (2009)Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification., , , , , , and . IEEE Access, (2021)Hybrid High-order Brain Functional Networks for Schizophrenia-Aided Diagnosis., , , , , , and . Cogn. Comput., 14 (4): 1303-1315 (2022)Method for Earlier Failure of the Special Vehicle Tub Curve based on the Weibull Two-Fold Piecewise Model., , , , and . Int. J. Perform. Eng., 16 (1): 87-97 (2020)Unsupervised Learning of Depth, Optical Flow and Pose With Occlusion From 3D Geometry., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (1): 308-320 (2022)