Author of the publication

Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.

, , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 522-538. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Comprehensive Detection of DNS Tunnels., , , , , and . ISCC, page 1-7. IEEE, (2020)DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence., , , , , , , , and . TrustCom, page 1842-1848. IEEE, (2020)ALT-Based Route Planning in Dynamic Time-Dependent Road Networks., , , and . MLMI, page 35-39. ACM, (2019)Improved Secure Lightweight RFID Authentication Protocol., , , , , and . MLMI, page 127-132. ACM, (2020)A Framework for Document-level Cybersecurity Event Extraction from Open Source Data., , , , , , and . CSCWD, page 422-427. IEEE, (2021)A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification., , , , and . ICPR, page 3775-3782. IEEE, (2020)TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*., , , , , , , and . COMPSAC, page 272-279. IEEE, (2022)Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests., , , , , and . CSCWD, page 391-396. IEEE, (2021)Attack Detection by Rough Set Theory in Recommendation System., , and . GrC, page 692-695. IEEE Computer Society, (2010)Towards Network Anomaly Detection Using Graph Embedding., , , , , and . ICCS (4), volume 12140 of Lecture Notes in Computer Science, page 156-169. Springer, (2020)