Search For:

Displaying 1-4 out of 4 total
Antiphishing through Phishing Target Discovery
Found in: IEEE Internet Computing
By Liu Wenyin,Gang Liu,Bite Qiu,Xiaojun Quan
Issue Date:March 2012
pp. 52-61
Phishing attacks are growing in both volume and sophistication. The antiphishing method described here collects webpages with either a direct or indirect association with a given suspicious webpage. This enables the discovery of a webpage's so-called
 
Term Weighting Schemes for Question Categorization
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Xiaojun Quan, Wenyin Liu, Bite Qiu
Issue Date:May 2011
pp. 1009-1021
Abstract—Term weighting has proven to be an effective way to improve the performance of text categorization. Very recently, with the development of user-interactive question answering or community question answering, there has emerged a need to accurately ...
 
Automatic Detection of Phishing Target from Phishing Webpage
Found in: Pattern Recognition, International Conference on
By Gang Liu, Bite Qiu, Liu Wenyin
Issue Date:August 2010
pp. 4153-4156
An approach to identification of the phishing target of a given (suspicious) webpage is proposed by clustering the webpage set consisting of its all associated webpages and the given webpage itself. We first find its associated webpages, and then explore t...
 
Detect Visual Spoofing in Unicode-Based Text
Found in: Pattern Recognition, International Conference on
By Bite Qiu, Ning Fang, Liu Wenyin
Issue Date:August 2010
pp. 1949-1952
Visual spoofing in Unicode-based text is anticipated as a severe web security problem in the near future as more and more Unicode-based web documents will be used. In this paper, to detect whether a suspicious Unicode character in a word is visual spoofing...
 
 1