CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites G Xiang, J Hong, CP Rose, L Cranor ACM Transactions on Information and System Security (TISSEC) 14 (2), 21, 2011 | 608 | 2011 |
Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus G Xiang, B Fan, L Wang, C Rose, J Hong The 21st ACM International Conference on Information and Knowledge …, 2012 | 349 | 2012 |
A hybrid phish detection approach by identity discovery and keywords retrieval G Xiang, JI Hong Proceedings of the 18th international conference on World wide web, 571-580, 2009 | 173 | 2009 |
Microblogs as Parallel Corpora L Wang, G Xiang, C Dyer, A Black, I Trancoso The 51th Annual Meeting of the Association for Computational Linguistics (ACL), 2013 | 97* | 2013 |
A supervised approach to predict company acquisition with factual and topic features using profiles and news articles on techcrunch G Xiang, Z Zheng, M Wen, J Hong, C Rose, C Liu Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012 | 93 | 2012 |
Leveraging High-level and Low-level Features for Multimedia Event Detection L Jiang, A Hauptmann, G Xiang ACM Multimedia 2012, 2012 | 87 | 2012 |
Modeling people's place naming preferences in location sharing J Lin, G Xiang, JI Hong, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 83 | 2010 |
Clever clustering vs. simple speed-up for summarizing rushes AG Hauptmann, MG Christel, WH Lin, B Maher, J Yang, RV Baron, ... Proceedings of the international workshop on TRECVID video summarization, 20-24, 2007 | 46 | 2007 |
Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams G Liu, G Xiang, BA Pendleton, JI Hong, W Liu 7th Symposium on Usable Privacy and Security (SOUPS), page Article 8, 2011 | 42 | 2011 |
A hierarchical adaptive probabilistic approach for zero hour phish detection G Xiang, B Pendleton, J Hong, C Rose Computer Security–ESORICS 2010, 268-285, 2011 | 35 | 2011 |
Extracting Events with Informal Temporal References in Personal Histories in Online Communities M Wen, Z Zheng, H Jang, G Xiang, C Rose The annual meeting of the Association for Computational Linguistics (ACL), 2013 | 20 | 2013 |
Comparing Classification Algorithm for Mouse Dynamics based User Identification C Shen, Z Cai, R Maxion, G Xiang The IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012 | 19 | 2012 |
Reputation-aware contract-supervised Grid computing X Qu, N Xiao, G Xiang, XJ Yang Grid and Cooperative Computing–GCC 2004Workshops, 44-51, 2004 | 15 | 2004 |
A Secure K-Automorphism Privacy Preserving Approach with High Data Utility in Social Networks J Yang, B Wang, X Yang, H Zhang, G Xiang The 7th International Conference on Frontier of Computer Science and Technology, 2012 | 12 | 2012 |
Sparse Multi-task Learning for Detecting Influential Nodes in an Implicit Diffusion Network Y Wang, G Xiang, SK Chang The Twenty-Seventh AAAI Conference on Artificial Intelligence (AAAI-13), 2013 | 10 | 2013 |
Toward a phish free world: A feature-type-aware cascaded learning framework for phish detection G Xiang Language Technologies Institute, School of Computer Science, Carnegie Mellon …, 2013 | 10 | 2013 |
Modeling content from human-verified blacklists for accurate zero-hour phish detection G Xiang, B Pendleton, J Hong Tech Report at Carnegie Mellon University School of Computer Science, 2009 | 8 | 2009 |
Correlating alerts with a data mining based approach G Xiang, X Dong, G Yu 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005 | 7 | 2005 |
Sparse Linear Influence Model for Hot User Selection on Mining a Social Network Y Wang, SK Chang, G Xiang The 24th International Conference on Software Engineering and Knowledge …, 2012 | 5 | 2012 |
Improving Relative-Entropy Pruning using Statistical Significance L Wang, N Tomeh, G Xiang, A Black, I Trancoso The 25th International Conference on Computational Linguistics (Coling 2012), 2012 | 2 | 2012 |