Author of the publication

Modeling and analysis of identity threat behaviors through text mining of identity theft stories.

, , , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonconvex γ-norm and Laplacian scale mixture with salient map for moving object detection., , , and . Multim. Tools Appl., 83 (9): 26159-26182 (March 2024)Generalized nuclear norm and Laplacian scale mixture based low-rank and sparse decomposition for video foreground-background separation., , , , and . Signal Process., (2020)Generalized singular value thresholding operator based nonconvex low-rank and sparse decomposition for moving object detection., , , , and . J. Frankl. Inst., 356 (16): 10138-10154 (2019)Robust feature mining transformer for occluded person re-identification., , , and . Digit. Signal Process., (September 2023)Foreground-Background Separation via Generalized Nuclear Norm and Structured Sparse Norm Based Low-Rank and Sparse Decomposition., , , and . IEEE Access, (2020)Truncated γ norm-based low-rank and sparse decomposition., , , and . Multim. Tools Appl., 81 (27): 38279-38295 (November 2022)Neighbor enhanced contextual graph neural network for session-based recommendation., , , and . Multim. Tools Appl., 83 (11): 32553-32568 (March 2024)Modeling and analysis of identity threat behaviors through text mining of identity theft stories., , , and . Comput. Secur., (2017)Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories., , and . JISIC, page 184-191. IEEE, (2014)A Densely Connected Network Based on U-Net for Medical Image Segmentation., , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (3): 89:1-89:14 (2021)