Author of the publication

Poster: CUD: crowdsourcing for URL spam detection.

, , , and . ACM Conference on Computer and Communications Security, page 785-788. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting Multi-Modal E-commerce Attribute Value Extraction via Unified Learning Scheme and Dynamic Range Minimization., , , , , , and . CoRR, (2022)Testing the Message Flow of Android Auto Apps., , , , and . SANER, page 559-563. IEEE, (2019)An Event-Triggering Approach to Recursive Filtering for Complex Networks With State Saturations and Random Coupling Strengths., , , and . IEEE Trans. Neural Networks Learn. Syst., 31 (10): 4279-4289 (2020)Public Opinion Propagation Model on Social Networks., , and . CSO, page 325-328. IEEE Computer Society, (2014)Non-fragile estimation for discrete-time T-S fuzzy systems with event-triggered protocol., , , and . Kybernetika, 56 (1): 57-80 (2020)WD-UNeXt: Weight loss function and dropout U-Net with ConvNeXt for automatic segmentation of few shot brain gliomas., , , and . IET Image Process., 17 (11): 3271-3280 (2023)Computational thinking in early childhood is underpinned by sequencing ability and self-regulation: a cross-sectional study., , and . Educ. Inf. Technol., 28 (11): 14747-14765 (November 2023)Recursive filtering for time-varying systems under duty cycle scheduling based on collaborative prediction., , , , and . J. Frankl. Inst., 357 (17): 13189-13204 (2020)基于Android平台的隐私泄漏静态检测工具的分析与比较 (Analysis and Comparison of Privacy Leak Static Detection Tools for Android Applications)., , , , and . 计算机科学, 44 (10): 127-133 (2017)Application Recommendation based on Metagraphs: Combining Behavioral and Published Information., , and . COMPSAC, page 250-259. IEEE, (2023)