咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Phishing Detection with Image ... 收藏

Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor

作     者:Guoyuan Lin Bowen Liu Pengcheng Xiao Min Lei Wei Bi 

作者机构:School of Computer Science and TechnologyChina University of Mining&TechnologyXuzhou221116China State Key Laboratory for Novel Software Technology hosted at Nanjing UniversityNanjing210023China Department of MathematicsUniversity of EvansvilleIndiana47722USA Information Security CenterBeijing University of Posts and TelecommunicationsBeijing100876China SeeleTech CorporationSan Francisco94107USA Zabatech CorporationBeijing100088China 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2018年第57卷第12期

页      面:533-547页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:The work reported in this paper was supported by the Joint research project of Jiangsu Province under Grant No.BY2016026-04 the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University under Grant No.KFKT2018B27 the National Natural Science Foundation for Young Scientists of China under Grant No.61303263 the Jiangsu Provincial Research Foundation for Basic Research(Natural Science Foundation)under Grant No.BK20150201 

主  题:Anti-phishing blockchain texton correlation descriptor weighted euclidean distance image retrieval 

摘      要:Anti-detection is becoming as an emerging challenge for *** paper solves the threats of anti-detection from the threshold setting *** webpages are considered to complicate threshold setting condition when the threshold is *** to the common visual behavior which is easily attracted by the salient region of webpages,image retrieval methods based on texton correlation descriptor(TCD)are improved to obtain enough webpages which have similarity in the salient region for the images of *** are two steps for improving TCD which has advantage of recognizing the salient region of images:(1)This paper proposed Weighted Euclidean Distance based on neighborhood location(NLW-Euclidean distance)and double cross windows,and combine them to solve the problems in TCD;(2)Space structure is introduced to map the image set to Euclid space so that similarity relation among images can be used to complicate threshold setting *** results show that the proposed method can improve the effectiveness of anti-phishing and make the system more stable,and significantly reduce the possibilities of being hacked to be used as mining systems for blockchain.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分