Algorithmic information theory
Algorithmic information theory
Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An introduction to Kolmogorov complexity and its applications (2nd ed.)
An introduction to Kolmogorov complexity and its applications (2nd ed.)
Syntactic clustering of the Web
Selected papers from the sixth international conference on World Wide Web
Finding related pages in the World Wide Web
WWW '99 Proceedings of the eighth international conference on World Wide Web
Similarity estimation techniques from rounding algorithms
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Evaluating strategies for similarity search on the web
Proceedings of the 11th international conference on World Wide Web
Evaluating contents-link coupled web page clustering for web search results
Proceedings of the eleventh international conference on Information and knowledge management
The Case against Accuracy Estimation for Comparing Induction Algorithms
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Scalability Issues for High Performance Digital Libraries on the World Wide Web
ADL '96 Proceedings of the 3rd International Forum on Research and Technology Advances in Digital Libraries
Utilizing hyperlink transitivity to improve web page clustering
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Web-page classification through summarization
Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
HIS '05 Proceedings of the Fifth International Conference on Hybrid Intelligent Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Finding near-duplicate web pages: a large-scale evaluation of algorithms
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
IEEE Transactions on Dependable and Secure Computing
Data Compression: The Complete Reference
Data Compression: The Complete Reference
No-reference JPEG-image quality assessment using GAP-RBF
Signal Processing
Cantina: a content-based approach to detecting phishing web sites
Proceedings of the 16th international conference on World Wide Web
Learning to detect phishing emails
Proceedings of the 16th international conference on World Wide Web
Finding similar files in a large file system
WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference
Seam carving for content-aware image resizing
ACM SIGGRAPH 2007 papers
Artificial Intelligence Review
No-reference image quality assessment based on DCT domain statistics
Signal Processing
Dictionary based color image retrieval
Journal of Visual Communication and Image Representation
Searching for Cognitively Diverse Tests: Towards Universal Test Diversity Metrics
ICSTW '08 Proceedings of the 2008 IEEE International Conference on Software Testing Verification and Validation Workshop
A hybrid phish detection approach by identity discovery and keywords retrieval
Proceedings of the 18th international conference on World wide web
Clustering Heterogeneous Web Data using Clustering by Compression. Cluster Validity
SYNASC '08 Proceedings of the 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
Extracting content structure for web pages based on visual representation
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Image classification via LZ78 based string kernel: a comparative study
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms
IEEE Transactions on Image Processing
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the Seventh Symposium on Usable Privacy and Security
Using visual website similarity for phishing detection and reporting
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Intelligent phishing detection and protection scheme for online transactions
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
We propose a novel approach for detecting visual similarity between two Web pages. The proposed approach applies Gestalt theory and considers a Web page as a single indivisible entity. The concept of supersignals, as a realization of Gestalt principles, supports our contention that Web pages must be treated as indivisible entities. We objectify, and directly compare, these indivisible supersignals using algorithmic complexity theory. We illustrate our approach by applying it to the problem of detecting phishing scams. Via a large-scale, real-world case study, we demonstrate that 1) our approach effectively detects similar Web pages; and 2) it accuractely distinguishes legitimate and phishing pages.