Cited By
View all- Prasad SBouma-Sims EMylappan AReaves BCapkun SRoesner F(2020)Who's calling? characterizing robocalls through audio and metadata analysisProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489235(397-414)Online publication date: 12-Aug-2020
- Tertychnyi PSlobozhan IOllikainen MDumas M(2020)Scalable and Imbalance-Resistant Machine Learning Models for Anti-money Laundering: A Two-Layered ApproachEnterprise Applications, Markets and Services in the Finance Industry10.1007/978-3-030-64466-6_3(43-58)Online publication date: 26-Nov-2020
- Yuan DMiao YGong NYang ZLi QSong DWang QLiang XCavallaro LKinder JWang XKatz J(2019)Detecting Fake Accounts in Online Social Networks at the Time of RegistrationsProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3363198(1423-1438)Online publication date: 6-Nov-2019
- Show More Cited By