Author of the publication

Technologies to Defeat Fraudulent Schemes Related to Email Requests.

, , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 133-135. AAAI, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implicit stochastic gradient descent, and . (2014)cite arxiv:1408.2923.Ranking Relations using Analogies in Biological and Information Networks, , , and . CoRR, (2009)Markov blankets and meta-heuristic search: Sentiment extraction from unstructured text, , and . Lecture Notes in Computer Science, (2006)Investigating the Impact of Network Effects on Content Generation: Evidence from a Large Online Student Network., , and . ICIS, Association for Information Systems, (2015)SLANTS: Sequential Adaptive Nonlinear Modeling of Time Series., , , and . IEEE Trans. Signal Process., 65 (19): 4994-5005 (2017)Deconvolution of mixing time series on a graph., and . UAI, page 51-60. AUAI Press, (2011)Stochastic blockmodel approximation of a graphon: Theory and consistent estimation., , and . NIPS, page 692-700. (2013)Privacy Controls and Disclosure Behavior., , , and . AMCIS, Association for Information Systems, (2015)Bias reduction of peer influence effects with latent coordinates and community membership., , and . IEEE BigData, page 3098-3103. IEEE Computer Society, (2017)Mixed membership stochastic block models, , , and . Advances in Neural Information Processing Systems (NIPS) 21, Red Hook, NY: Curran Associates, (2009)