Author of the publication

No Pie in the Sky: The Digital Currency Fraud Website Detection.

, , , , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 176-193. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust saliency maps with decoy-enhanced saliency score., , , and . CoRR, (2020)TextGuard: Provable Defense against Backdoor Attacks on Text Classification., , , , and . CoRR, (2023)PATROL: Provable Defense against Adversarial Policy in Two-player Games., , , , and . USENIX Security Symposium, page 3943-3960. USENIX Association, (2023)CADE: Detecting and Explaining Concept Drift Samples for Security Applications., , , , , , and . USENIX Security Symposium, page 2327-2344. USENIX Association, (2021)Impact of Imperfect Time Synchronization on Cooperative Jamming Assisted Slow FH Systems., , , and . GLOBECOM, page 1-6. IEEE, (2020)Target Tracking via Two-Branch Spatio-Temporal Regularized Correlation Filter Network., , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 86-97. Springer, (2019)An Empirical Study of Malicious Code In PyPI Ecosystem., , , , , and . ASE, page 166-177. IEEE, (2023)EDGE: Explaining Deep Reinforcement Learning Policies., , , and . NeurIPS, page 12222-12236. (2021)Hybrid digital-analog coding scheme for overlay cognitive radio network with correlated sources., , , and . WCNC, page 1-5. IEEE, (2016)Defending Against Adversarial Samples Without Security through Obscurity., , , , , , , , and . ICDM, page 137-146. IEEE Computer Society, (2018)