Modeling Malicious Behaviors and Fake News Dissemination on Social Networks. | 0 | 0.34 | 2021 |
Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination. | 0 | 0.34 | 2020 |
Time-aware multi-resolutional approach to re-identifying location histories by using social networks | 0 | 0.34 | 2020 |
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data | 0 | 0.34 | 2019 |
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost. | 0 | 0.34 | 2018 |
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning. | 0 | 0.34 | 2016 |
Score Level Fusion For Network Traffic Application Identification | 0 | 0.34 | 2016 |
Speaker verification method for operation system of consumer electronic devices | 0 | 0.34 | 2015 |
Evaluating Header Information Features for Malware Infection Detection. | 0 | 0.34 | 2015 |
De-anonymising Social Network Posts by Linking with Résumé. | 0 | 0.34 | 2015 |
Evaluating payload features for malware infection detection. | 2 | 0.45 | 2014 |
A Study On Gait Recognition Using Lpc Cepstrum For Mobile Terminal | 1 | 0.35 | 2013 |
Anonymizing Face Images by Using Similarity-Based Metric. | 1 | 0.36 | 2013 |
Ineluctable background checking on social networks: Linking job seeker's résumé and posts. | 1 | 0.36 | 2013 |
Text Independent Speaker Gender Recognition Using Lip Movement | 1 | 0.36 | 2012 |
Content-Based De-anonymisation of Tweets | 1 | 0.36 | 2011 |
Internet Traffic Classification Using Score Level Fusion of Multiple Classifier | 4 | 0.42 | 2010 |
Speaker gender recognition using score level fusion by AdaBoost | 3 | 0.41 | 2010 |
Text-indicated speaker recognition using kernel mutual subspace method | 1 | 0.36 | 2008 |
Speaker Recognition Using Kernel Mutual Subspace Method | 9 | 0.79 | 2004 |