Author of the publication

An Abused Webpage Detection Method Based on Screenshots Text Recognition.

, , , , and . ICEA, page 106-110. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The adaptive composite trapezoidal rule for Hadamard finite-part integrals on an interval., , and . J. Comput. Appl. Math., (2017)Nonconforming FEMs for an Optimal Design Problem., and . SIAM J. Numer. Anal., 53 (2): 874-894 (2015)Multi-scale semantic deep fusion models for phishing website detection., , and . Expert Syst. Appl., (2022)A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites., and . J. Netw. Syst. Manag., 32 (1): 8 (March 2024)Toward 6G $TK\mu$ Extreme Connectivity: Architecture, Key Technologies and Experiments., , , , , , , , , and 15 other author(s). IEEE Wirel. Commun., 30 (3): 86-95 (June 2023)Full-spectrum cell-free RAN for 6G systems: system design and experimental results., , , , , , , , , and 8 other author(s). Sci. China Inf. Sci., (March 2023)Novel empty train return strategy and passenger control strategy to satisfy asymmetric passenger demand: A joint optimization with train timetabling., , , , , , and . Comput. Ind. Eng., (July 2023)Optimal shape parameter in the MQ-RBF by minimizing an energy gap functional., and . Appl. Math. Lett., (2018)Service Delay Minimization for Federated Learning Over Mobile Devices., , , , , and . IEEE J. Sel. Areas Commun., 41 (4): 990-1006 (April 2023)From ORAN to Cell-Free RAN: Architecture, Performance Analysis, Testbeds and Trials., , , , , , , , , and 3 other author(s). CoRR, (2023)