Author of the publication

Catching predators at watering holes: finding and understanding strategically compromised websites.

, , , , , , and . ACSAC, page 153-166. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Importance Representation Convolutional Neural Network for Fine-Grained Image Classification., , and . Symmetry, 10 (10): 479 (2018)Privacy in the Genomic Era., , , , , , , and . ACM Comput. Surv., 48 (1): 6:1-6:44 (2015)iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency., , and . SIGCOMM Posters and Demos, page 166-168. ACM, (2019)Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 888-897. Springer, (2006)Beyond Risk-Based Access Control: Towards Incentive-Based Access Control., , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 102-112. Springer, (2011)A Semantic-Based Malware Detection System Design Based on Channels., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 653-662. Springer, (2014)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 271-284. Springer, (2013)Automated Segmentation Using a Fast Implementation of the Chan-Vese Models., and . ICIC (2), volume 5227 of Lecture Notes in Computer Science, page 1135-1141. Springer, (2008)A Representation Method and Optimization of Network Flow Based on Coalgebra., and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 2026-2029. IEEE, (2018)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)