Author:
Furutani Satoshi,Shibahara Toshiki,Hato Kunio,Akiyama Mitsuaki,Aida Masaki
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generative Adversarial Networks for Cybersecurity Threat;2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET);2023-11-23
2. Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering;IEEE Transactions on Information Forensics and Security;2023
3. MUSH: Multi-Stimuli Hawkes Process Based Sybil Attacker Detector for User-Review Social Networks;IEEE Transactions on Network and Service Management;2022-12