Detecting Homoglyph Attacks with a Siamese Neural Network
暂无分享,去创建一个
Hyrum S. Anderson | Jonathan Woodbridge | Anjum Ahuja | Daniel Grant | H. Anderson | Jonathan Woodbridge | Daniel Grant | A. Ahuja
[1] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[2] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[3] Yann LeCun,et al. Dimensionality Reduction by Learning an Invariant Mapping , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[4] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[5] Cordelia Schmid,et al. Product Quantization for Nearest Neighbor Search , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Guoliang Li,et al. A pivotal prefix based filtering algorithm for string similarity search , 2014, SIGMOD Conference.
[7] Dominic W. Massaro,et al. From orthography to pedagogy : essays in honor of Richard L. Venezky , 2005 .
[8] Samuel Marchal,et al. Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets , 2015, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[9] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[10] Andrea Vedaldi,et al. Vlfeat: an open and portable library of computer vision algorithms , 2010, ACM Multimedia.
[11] Lawrence K. Saul,et al. Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.
[12] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[13] Jian Sun,et al. Optimized Product Quantization for Approximate Nearest Neighbor Search , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[14] Sunil Arya,et al. Accounting for boundary effects in nearest neighbor searching , 1995, SCG '95.
[15] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[16] Christos Faloutsos,et al. Multidimensional Access Methods: Trees Have Grown Everywhere , 1997, VLDB.
[17] Stephen Morris,et al. Typo-Squatting: The Curse'' of Popularity , 2009 .
[18] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[19] Y. LeCun,et al. Learning methods for generic object recognition with invariance to pose and lighting , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[20] Hanan Samet,et al. The Design and Analysis of Spatial Data Structures , 1989 .
[21] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[22] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[23] Wen-Syan Li,et al. Top-k string similarity search with edit-distance constraints , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[24] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[25] Heng Tao Shen,et al. Hashing for Similarity Search: A Survey , 2014, ArXiv.
[26] Andrew H. Sung,et al. Detection of Phishing Attacks: A Machine Learning Approach , 2008, Soft Computing Applications in Industry.
[27] Guoliang Li,et al. Fast-join: An efficient method for fuzzy token matching based string similarity join , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[28] David G. Lowe,et al. Scalable Nearest Neighbor Algorithms for High Dimensional Data , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.