Folgen
Guang Xiang
Guang Xiang
Carnegie Mellon University
Keine bestätigte E-Mail-Adresse
Titel
Zitiert von
Zitiert von
Jahr
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 21, 2011
6142011
Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus
G Xiang, B Fan, L Wang, C Rose, J Hong
The 21st ACM International Conference on Information and Knowledge …, 2012
3512012
A hybrid phish detection approach by identity discovery and keywords retrieval
G Xiang, JI Hong
Proceedings of the 18th international conference on World wide web, 571-580, 2009
1732009
Microblogs as Parallel Corpora
L Wang, G Xiang, C Dyer, A Black, I Trancoso
The 51th Annual Meeting of the Association for Computational Linguistics (ACL), 2013
97*2013
A supervised approach to predict company acquisition with factual and topic features using profiles and news articles on techcrunch
G Xiang, Z Zheng, M Wen, J Hong, C Rose, C Liu
Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012
952012
Leveraging High-level and Low-level Features for Multimedia Event Detection
L Jiang, A Hauptmann, G Xiang
ACM Multimedia 2012, 2012
872012
Modeling people's place naming preferences in location sharing
J Lin, G Xiang, JI Hong, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
832010
Clever clustering vs. simple speed-up for summarizing rushes
AG Hauptmann, MG Christel, WH Lin, B Maher, J Yang, RV Baron, ...
Proceedings of the international workshop on TRECVID video summarization, 20-24, 2007
462007
Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams
G Liu, G Xiang, BA Pendleton, JI Hong, W Liu
7th Symposium on Usable Privacy and Security (SOUPS), page Article 8, 2011
432011
A hierarchical adaptive probabilistic approach for zero hour phish detection
G Xiang, B Pendleton, J Hong, C Rose
Computer Security–ESORICS 2010, 268-285, 2011
352011
Extracting Events with Informal Temporal References in Personal Histories in Online Communities
M Wen, Z Zheng, H Jang, G Xiang, C Rose
The annual meeting of the Association for Computational Linguistics (ACL), 2013
202013
Comparing Classification Algorithm for Mouse Dynamics based User Identification
C Shen, Z Cai, R Maxion, G Xiang
The IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012
192012
Reputation-aware contract-supervised Grid computing
X Qu, N Xiao, G Xiang, XJ Yang
Grid and Cooperative Computing–GCC 2004Workshops, 44-51, 2004
152004
A Secure K-Automorphism Privacy Preserving Approach with High Data Utility in Social Networks
J Yang, B Wang, X Yang, H Zhang, G Xiang
The 7th International Conference on Frontier of Computer Science and Technology, 2012
122012
Sparse Multi-task Learning for Detecting Influential Nodes in an Implicit Diffusion Network
Y Wang, G Xiang, SK Chang
The Twenty-Seventh AAAI Conference on Artificial Intelligence (AAAI-13), 2013
102013
Toward a phish free world: A feature-type-aware cascaded learning framework for phish detection
G Xiang
Language Technologies Institute, School of Computer Science, Carnegie Mellon …, 2013
102013
Modeling content from human-verified blacklists for accurate zero-hour phish detection
G Xiang, B Pendleton, J Hong
Tech Report at Carnegie Mellon University School of Computer Science, 2009
82009
Correlating alerts with a data mining based approach
G Xiang, X Dong, G Yu
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005
72005
Sparse Linear Influence Model for Hot User Selection on Mining a Social Network
Y Wang, SK Chang, G Xiang
The 24th International Conference on Software Engineering and Knowledge …, 2012
52012
Improving Relative-Entropy Pruning using Statistical Significance
L Wang, N Tomeh, G Xiang, A Black, I Trancoso
The 25th International Conference on Computational Linguistics (Coling 2012), 2012
22012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20