Author of the publication

DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks.

, , , , and . TAAI, page 158-163. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting., , , and . ICMLC, page 2681-2686. IEEE, (2010)RePEF - A system for Restoring Packed Executable File for malware analysis., , , , , and . ICMLC, page 519-527. IEEE, (2011)Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking., , , and . ICITCS, page 1-7. IEEE Computer Society, (2015)Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis., , , and . AsiaJCIS, page 77-84. IEEE Computer Society, (2013)DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network., , , and . ICACT, page 533-538. IEEE, (2019)How to solve collision and authentication issues using RFID protocol technology., , , , and . ICMLC, page 454-460. IEEE, (2011)DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks., , , , and . TAAI, page 158-163. IEEE Computer Society, (2013)Android privacy., , , , and . ICMLC, page 1830-1837. IEEE, (2012)ChainSpot: Mining Service Logs for Cyber Security Threat Detection., , , , and . Trustcom/BigDataSE/ISPA, page 1867-1874. IEEE, (2016)