Phishing Detection Method Based on Borderline-Smote Deep Belief Network

Author(s):  
Jiahua Zhang ◽  
Xiaoyong Li
2018 ◽  
Vol 51 (24) ◽  
pp. 9-14 ◽  
Author(s):  
Peng Tang ◽  
Kaixiang Peng ◽  
Kai Zhang ◽  
Zhiwen Chen ◽  
Xu Yang ◽  
...  

2019 ◽  
Vol 28 (5) ◽  
pp. 925-932
Author(s):  
Hua WEI ◽  
Chun SHAN ◽  
Changzhen HU ◽  
Yu ZHANG ◽  
Xiao YU

Sign in / Sign up

Export Citation Format

Share Document