Author of the publication

A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 53-69. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error Vector Magnitude Analysis of Uplink Multiuser OFDMA and SC-FDMA Systems in the Presence of Nonlinear Distortion., , and . IEEE Communications Letters, 21 (1): 172-175 (2017)Semidefinite Optimization Providing Guaranteed Bounds on Linear Functionals of Solutions of Linear Integral Equations with Smooth Kernels., , and . J. Appl. Math., (2014)Alternate Mapping Correlated k-Distribution Method for Infrared Radiative Transfer Forward Simulation., , , , , , and . Remote. Sens., 11 (9): 994 (2019)Removing local irregularities of triangular meshes with highlight line models., , , , , and . Sci. China Ser. F Inf. Sci., 52 (3): 418-430 (2009)Best Water Vapor Information Layer of Himawari-8-Based Water Vapor Bands over East Asia., , , , , and . Sensors, 20 (8): 2394 (2020)A Tree-Based Distributed Model for BGP Route Processing., , and . HPCC, volume 4208 of Lecture Notes in Computer Science, page 119-128. Springer, (2006)SEU2-Net: multi-scale U2-Net with SE attention mechanism for liver occupying lesion CT image segmentation., , , , , , , , and . PeerJ Comput. Sci., (2024)An Efficient Generalizable Framework for Visuomotor Policies via Control-aware Augmentation and Privilege-guided Distillation., , , , , , , , and . CoRR, (2024)SoMeLVLM: A Large Vision Language Model for Social Media Processing., , , , , , , , and . CoRR, (2024)Multi-Clue Reasoning with Memory Augmentation for Knowledge-based Visual Question Answering., , , , and . CoRR, (2023)