Author of the publication

Look Before You Leap: Detecting Phishing Web Pages by Exploiting Raw URL And HTML Characteristics.

, , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Individual Planning in Agent Populations: Exploiting Anonymity and Frame-Action Hypergraphs., , and . CoRR, (2015)Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics., , and . Expert Syst. Appl., (February 2024)Dual Self-Paced Cross-Modal Hashing., , , , , and . AAAI, page 15184-15192. AAAI Press, (2024)HTMLPhish: Enabling Accurate Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis., , and . CoRR, (2019)Look Before You Leap: Detecting Phishing Web Pages by Exploiting Raw URL And HTML Characteristics., , and . CoRR, (2020)Fast Solving of Influence Diagrams for Multiagent Planning on GPU-enabled Architectures., , and . ICAART (2), page 183-195. SciTePress, (2015)Speeding up Planning in Multiagent Settings Using CPU-GPU Architectures., , and . ICAART (Revised Selected Papers), volume 9494 of Lecture Notes in Computer Science, page 262-283. Springer, (2015)Approximating Model Equivalence in Interactive Dynamic Influence Diagrams Using Top K Policy Paths., , and . IAT, page 208-211. IEEE Computer Society, (2011)978-0-7695-4513-4.Interactive Dynamic Influence Diagrams for Relational Agents., , , and . WI-IAT (3), page 233-234. IEEE Computer Society, (2015)978-1-4673-9618-9.A Group-based Approach to Improve Multifactorial Evolutionary Algorithm., , , , and . IJCAI, page 3870-3876. ijcai.org, (2018)