Author of the publication

You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse.

, , , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 221-233. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 376-377. Springer, (2012)Improving Password Guessing Using Byte Pair Encoding., , , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 254-268. Springer, (2017)A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 732-743. Springer, (2015)Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud., , , , and . HPCC/SmartCity/DSS, page 750-757. IEEE, (2018)Efficient and Scalable Privacy-Preserving Similar Document Detection., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)An empirical analysis of family in the Tor network., , , and . ICC, page 1995-2000. IEEE, (2013)Relation Extraction based on Data Partition and Representation Integration., , , , , and . DSC, page 68-75. IEEE, (2021)Memory chunking analysis of numerical password for Chinese websites., , , , and . MILCOM, page 788-793. IEEE, (2016)Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 613-618. Springer, (2004)