Author of the publication

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies.

, , , , , , and . CYBCONF, page 324-329. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 540-550. Springer, (2015)Image Recognition by Integration of Connectionist and Symbolic Approaches., , and . IJPRAI, 9 (3): 485-515 (1995)Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)Multiple Classifier Systems.. Encyclopedia of Biometrics, Springer US, (2009)On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks., , , , , , , and . CoRR, (2018)An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification., , and . ICIAP, volume 5716 of Lecture Notes in Computer Science, page 434-442. Springer, (2009)CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism., , and . ERCIM News, (2015)Multimodal fingerprint verification by score-level fusion: An experimental investigation., , and . J. Intell. Fuzzy Syst., 24 (1): 51-60 (2013)Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?, , , , , , and . CoRR, (2020)Bayesian relevance feedback for content-based image retrieval., and . Pattern Recognit., 37 (7): 1499-1508 (2004)