Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bite Qiu
@article{DBLP:journals/internet/WenyinLQQ12, author = {Liu Wenyin and Gang Liu and Bite Qiu and Xiaojun Quan}, title = {Antiphishing through Phishing Target Discovery}, journal = {{IEEE} Internet Comput.}, volume = {16}, number = {2}, pages = {52--61}, year = {2012}, url = {https://doi.org/10.1109/MIC.2011.103}, doi = {10.1109/MIC.2011.103}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/WenyinLQQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/QuanWQ11, author = {Xiaojun Quan and Liu Wenyin and Bite Qiu}, title = {Term Weighting Schemes for Question Categorization}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {33}, number = {5}, pages = {1009--1021}, year = {2011}, url = {https://doi.org/10.1109/TPAMI.2010.154}, doi = {10.1109/TPAMI.2010.154}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/QuanWQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WenyinFQQL10, author = {Liu Wenyin and Ning Fang and Xiaojun Quan and Bite Qiu and Gang Liu}, title = {Discovering phishing target based on semantic link network}, journal = {Future Gener. Comput. Syst.}, volume = {26}, number = {3}, pages = {381--388}, year = {2010}, url = {https://doi.org/10.1016/j.future.2009.07.012}, doi = {10.1016/J.FUTURE.2009.07.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/WenyinFQQL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WenyinQFQ10, author = {Liu Wenyin and Xiaojun Quan and Min Feng and Bite Qiu}, title = {A short text modeling method combining semantic and statistical information}, journal = {Inf. Sci.}, volume = {180}, number = {20}, pages = {4031--4041}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.06.021}, doi = {10.1016/J.INS.2010.06.021}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WenyinQFQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/QiuFW10, author = {Bite Qiu and Ning Fang and Liu Wenyin}, title = {Detect Visual Spoofing in Unicode-Based Text}, booktitle = {20th International Conference on Pattern Recognition, {ICPR} 2010, Istanbul, Turkey, 23-26 August 2010}, pages = {1949--1952}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPR.2010.480}, doi = {10.1109/ICPR.2010.480}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/QiuFW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/LiuQW10, author = {Gang Liu and Bite Qiu and Liu Wenyin}, title = {Automatic Detection of Phishing Target from Phishing Webpage}, booktitle = {20th International Conference on Pattern Recognition, {ICPR} 2010, Istanbul, Turkey, 23-26 August 2010}, pages = {4153--4156}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPR.2010.1010}, doi = {10.1109/ICPR.2010.1010}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/LiuQW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.