Author of the publication

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.

, , , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing., , and . IEEE Trans. Inf. Forensics Secur., 14 (4): 923-938 (2019)Robust Sequential DeepFake Detection., , and . CoRR, (2023)DeepFake-Adapter: Dual-Level Adapter for DeepFake Detection., , , and . CoRR, (2023)WHU-NERCMS at TRECVID2015: Instance Search Task., , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2015)Open-Set Adversarial Defense with Clean-Adversarial Mutual Learning., , , and . Int. J. Comput. Vis., 130 (4): 1070-1087 (2022)Focusing on Clinically Interpretable Features: Selective Attention Regularization for Liver Biopsy Image Classification., , , and . MICCAI (5), volume 12905 of Lecture Notes in Computer Science, page 153-162. Springer, (2021)Learning Modality-Consistency Feature Templates: A Robust RGB-Infrared Tracking System., , , , , and . IEEE Trans. Ind. Electron., 66 (12): 9887-9897 (2019)Discrete log anomaly detection: A novel time-aware graph-based link prediction approach., , and . Inf. Sci., (November 2023)CAT: Enhancing Multimodal Large Language Model to Answer Questions in Dynamic Audio-Visual Scenarios., , , , , and . CoRR, (2024)Robust Training of Optical Neural Network with Practical Errors using Genetic Algorithm: A Case Study in Silicon-on-Insulator-Based Photonic Integrated Chips., , , and . ICICDT, page 1-4. IEEE, (2021)