Author of the publication

Catching predators at watering holes: finding and understanding strategically compromised websites.

, , , , , , and . ACSAC, page 153-166. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors influencing out of pocket ratio to CPS among NPC patients in Guangxi: 2014-2020., , , , , and . HPCC/DSS/SmartCity/DependSys, page 2159-2163. IEEE, (2022)Enhanced Implementation of Max ∗ Operator for Turbo Decoding., , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 413-419. Springer, (2013)"The Ballot Problem in Disguise", in Disguise: 11249., , and . The American Mathematical Monthly, 115 (9): 859-860 (2008)Function Based Fault Detection for Uncertain Multivariate Nonlinear Non-Gaussian Stochastic Systems Using EntropyOptimization Principle., and . Entropy, 15 (1): 32-52 (2013)Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information., , , , , and . Trustcom/BigDataSE/ISPA, page 915-920. IEEE, (2016)Multi-domain Dialogue State Tracking as Dynamic Knowledge Graph Enhanced Question Answering., and . CoRR, (2019)A Survey on Contextual Multi-armed Bandits.. CoRR, (2015)A Two-Layer, Energy-Efficient Approach for Joint Power Control and Uplink-Downlink Channel Allocation in D2D Communication., , and . Sensors, 20 (11): 3285 (2020)Low-Rank and Continuous Target Feature Enhancement for SAR Object Recognition., , , , and . IGARSS, page 3740-3743. IEEE, (2019)Effective storage location assignment model based on a genetic simulation annealing algorithm., , , , , and . Int. J. Wirel. Mob. Comput., 19 (1): 9-17 (2020)