From post

Short and Distort Manipulations in the Cryptocurrency Market: Case Study, Patterns and Detection.

, , , , , и . ICA3PP (3), том 13157 из Lecture Notes in Computer Science, стр. 494-508. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and validation of SMS worm propagation over social networks., , , , и . J. Comput. Sci., (2017)SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks., , , , , и . IEEE Access, (2017)Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning., , , , , и . Comput. Secur., (декабря 2023)A lightweight and high-precision approach for bulky JavaScript engines fuzzing., , , , , и . TrustCom, стр. 982-989. IEEE, (2023)ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports., , , , , и . ADMA (5), том 14180 из Lecture Notes in Computer Science, стр. 122-136. Springer, (2023)DetOH: An Anchor-Free Object Detector with Only Heatmaps., , , , , и . ADMA (2), том 14177 из Lecture Notes in Computer Science, стр. 152-167. Springer, (2023)HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning., , , , , , , , , и 1 other автор(ы). Inf. Process. Manag., 60 (6): 103518 (ноября 2023)PTrustE: A high-accuracy knowledge graph noise detection method based on path trustworthiness and triple embedding., , , , , , и . Knowl. Based Syst., (2022)Routing Model Based on Service Degree and Residual Energy in WSN., , , и . CollaborateCom, том 201 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 363-372. Springer, (2016)Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum., , , , , и . SECON, стр. 501-509. IEEE, (2023)