In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Background: Post-translational modifications have a substantial influence on the structure and functions of protein. Post-translational phosphorylation is one of the most common m...
Paul D. Yoo, Yung Shwen Ho, Bing Bing Zhou, Albert...