no code implementations • 15 Mar 2023 • Haonan Zhong, Jiamin Chang, Ziyue Yang, Tingmin Wu, Pathum Chamikara Mahawaga Arachchige, Chehara Pathmabandu, Minhui Xue
toxic images) and models (resp.
no code implementations • 18 Aug 2022 • Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal
The Profiler does not require large data sets to train on to be effective and its analysis of varied email features reduces the impact of concept drift.
no code implementations • 24 Mar 2022 • Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph
Cyber-phishing attacks recently became more precise, targeted, and tailored by training data to activate only in the presence of specific information or cues.
no code implementations • 17 May 2021 • Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone
RAIDER also keeps the number of features to a minimum by selecting only the significant features to represent phishing emails and detect spear-phishing attacks.
no code implementations • 26 Jun 2020 • Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cecile Paris, Surya Nepal, Yang Xiang
We further compare the identified 16 security categories across different sources based on their popularity and impact.