All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
ECCV'10 Proceedings of the 11th European conference on Computer vision: Part I
A simplified multi-class support vector machine with reduced dual optimization
Pattern Recognition Letters
Hi-index | 0.00 |