The Best Way to a Strong Defense is a Strong Offense : Mitigating Deanonymization Attacks via Iterative Language Translation
暂无分享,去创建一个
[1] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[2] Kaushik Roy,et al. Genetic & Evolutionary Feature Selection for Author Identification of HTML Associated with Malware , 2014 .
[3] Damon L. Woodard,et al. A Comparison of Two Genetic & Evolutionary Feature Selection Strategies for Periocular-Based Biometric Recognition via X-TOOLSS , 2010, GEM.
[4] John W. Sheppard,et al. Comparing Frequency- and Style-Based Features for Twitter Author Identification , 2013, FLAIRS.
[5] Damon L. Woodard,et al. SSGA & EDA based feature selection and weighting for face recognition , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).
[6] Damon L. Woodard,et al. GEFeS: Genetic & evolutionary feature selection for periocular biometric recognition , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[7] Efstathios Stamatatos,et al. A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..