Author of the publication

Targeting key data breach services in underground supply chain.

, , and . ISI, page 322-324. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Commanding Model of Counterwork Simulation System Based on Value Driving Decision-Making., , , and . AsiaSim (1), volume 323 of Communications in Computer and Information Science, page 13-19. Springer, (2012)Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model., , and . ICIS, Association for Information Systems, (2016)Binarized features with discriminant manifold filters for robust single-sample face recognition., , , , , and . Signal Process. Image Commun., (2018)Multigrid Bilateral Filtering., , , and . IEICE Trans. Inf. Syst., 97-D (10): 2748-2759 (2014)Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks., , , , , , and . Inf. Sci., (2016)Deep neural network-based bottleneck feature and denoising autoencoder-based dereverberation for distant-talking speaker identification., , , , , and . EURASIP J. Audio Speech Music. Process., (2015)Keyword-specific normalization based keyword spotting for spontaneous speech., and . ISCSLP, page 233-237. IEEE, (2012)Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers., , , and . IEEE Access, (2019)Multifarious distances, cameras and illuminations face database., , , , and . APSIPA, page 873-876. IEEE, (2015)Face recognition with local contourlet combined patterns., , , , and . ICASSP, page 1273-1277. IEEE, (2016)