Author:
Mao Weixuan,Cai Zhongmin,Zeng Bo,Guan Xiaohong
Funder
National Natural Science Foundation of China
863 High Tech Development Plan
Research Fund for Doctoral Program of Higher Education of China
International Research Collaboration Project of Shaanxi Province
Fundamental Research Funds for Central Universities
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Information Systems
Reference39 articles.
1. Alabdulmohsin I, Han Y, Shen Y, Zhang X (2016) Content-agnostic malware detection in heterogeneous maliciousdistribution graph. In: Proceedings of the 25th ACM international on conference on information and knowledge management (CIKM). ACM, pp 2395–2400
2. Baluja S, Seth R, Sivakumar D, Jing Y, Yagnik J, Kumar S, Deepak R, Mohamed A (2008) Video suggestion and discovery for youtube: taking random walks through the view graph. In: Proceedings of the 17th international conference on World Wide Web (WWW). ACM, pp 895–904
3. Bayer U, Comparetti PM, Hlauschek C, Kruegel C, Kirda E (2009) Scalable, behavior-based malware clustering. In: Network and distributed system security symposium (NDSS)
4. Bilgic M, Mihalkova L, Getoor L (2010) Active learning for networked data. In: Proceedings of the 27th international conference on machine learning (ICML 2010), pp 79–86
5. Calado P, Cristo M, Moura E, Ziviani N, Ribeiro-Neto B, Gonçalves MA (2003) Combining link-based and content-based methods for web document classification. In: Proceedings of the twelfth international conference on information and knowledge management, CIKM ’03, New York, NY, USA. ACM, pp 394–401. ISBN 1-58113-723-0
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献