Learn More
In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community, we find that criminal accounts tend to be socially connected, forming a small-world network. We also find that criminal hubs, sitting in the center of the social graph, are(More)
To date, as one of the most popular Online Social Networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. The Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit(More)
In mass spectrometry (MS) based proteomic data analysis, peak detection is an essential step for subsequent analysis. Recently, there has been significant progress in the development of various peak detection algorithms. However, neither a comprehensive survey nor an experimental comparison of these algorithms is yet available. The main objective of this(More)
To date, as one of the most popular online social networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit(More)
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all existing IRCs schemes and evaluate each scheme against the practical requirements in CAPTCHA applications, particularly in large-scale real-life applications such as Gmail and Hotmail. Then we present a security analysis of the(More)
Most existing malicious Android app detection approaches rely on manually selected detection heuristics, features, and models. In this paper, we describe a new, complementary system, called DroidMiner, which uses static analysis to automatically mine malicious program logic from known Android malware, abstracts this logic into a sequence of threat(More)
This paper presents an automatic computer-aided detection scheme on digital chest radiographs to detect pneumoconiosis. Firstly, the lung fields are segmented from a digital chest X-ray image by using the active shape model method. Then, the lung fields are subdivided into six non-overlapping regions, according to Chinese diagnosis criteria of(More)
Strigolactones (SLs), a newly discovered class of carotenoid-derived phytohormones, are essential for developmental processes that shape plant architecture and interactions with parasitic weeds and symbiotic arbuscular mycorrhizal fungi. Despite the rapid progress in elucidating the SL biosynthetic pathway, the perception and signalling mechanisms of SL(More)