Author of the publication

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.

, , , , and . ISI, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)., , and . ACM Trans. Priv. Secur., 23 (4): 21:1-21:33 (2020)Will Cooperation Help Content Creators Grow? Empirical Evidence from Twitch.tv., , and . ICIS, Association for Information Systems, (2020)Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach., , , , , , and . ISI, page 1-6. IEEE, (2020)An efficient network coding scheme for two-way communication with ARQ feedback., , and . ICC, page 1-6. IEEE, (2016)Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data., , , , and . ICDH, page 115-117. IEEE, (2023)Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach., , , and . HICSS, page 548-556. ScholarSpace, (2024)Emoticon Analysis for Chinese Health and Fitness Topics., , , and . ICSH, volume 8549 of Lecture Notes in Computer Science, page 1-12. Springer, (2014)Video-based estimation of pain indicators in dogs., , , , and . CoRR, (2022)Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms., , , , and . HICSS, page 4143-4152. ScholarSpace, (2024)Exquisitor at the Video Browser Showdown 2024: Relevance Feedback Meets Conversational Search., , , , , and . MMM (4), volume 14557 of Lecture Notes in Computer Science, page 347-355. Springer, (2024)