Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterDecember 2024
Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4988–4990https://doi.org/10.1145/3658644.3691381In the pursuit of an effective spam detection system, the focus has often been on identifying known spam patterns either through rule-based detection systems or machine learning (ML) solutions that rely on keywords. However, both systems are susceptible ...
- short-paperJuly 2021
Similar Trademark Detection via Semantic, Phonetic and Visual Similarity Information
SIGIR '21: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 2025–2030https://doi.org/10.1145/3404835.3463038Millions of trademarks were registered last year in China, and thousands of applications are submitted daily. A trademark must be unique in the category it belongs to. Therefore, each new trademark application needs to be checked against all the existing ...
- research-articleJanuary 2021
Research on lightweight detection model of fake domain name
International Journal of Wireless and Mobile Computing (IJWMC), Volume 20, Issue 3Pages 264–271https://doi.org/10.1504/ijwmc.2021.115643In recent years, phishing websites and other fake domain name attacks have become more frequent, posing a serious threat to the security of society and individuals. Fake domain name detection has become an important part of network protection. At present, ...
- research-articleJanuary 2021
Webpage visual feature extraction and similarity algorithm
CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced TechnologiesPages 80–85https://doi.org/10.1145/3444370.3444552Nowadays, the Internet is developing rapidly, and the types of websites are more abundant than in previous decades. However, people face more significant network security risks, and the losses caused by phishing websites are even more severe. Phishing ...
- research-articleNovember 2020
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 1681–1698https://doi.org/10.1145/3372297.3417233Phishing websites are still a major threat in today's Internet ecosystem. Despite numerous previous efforts, similarity-based detection methods do not offer sufficient protection for the trusted websites, in particular against unseen phishing pages. ...
-
Automatic unpaired shape deformation transfer
ACM Transactions on Graphics (TOG), Volume 37, Issue 6Article No.: 237, Pages 1–15https://doi.org/10.1145/3272127.3275028Transferring deformation from a source shape to a target shape is a very useful technique in computer graphics. State-of-the-art deformation transfer methods require either point-wise correspondences between source and target shapes, or pairs of ...
- abstractAugust 2017
Boosting Recommender Systems with Deep Learning
RecSys '17: Proceedings of the Eleventh ACM Conference on Recommender SystemsPage 344https://doi.org/10.1145/3109859.3109926Farfetch is a global fashion marketplace with a catalog that, at any time, has over 200 000 products spanning over 2000 brands from luxury boutiques all around the world. Finding the right product to the right customer is a challenge that, we, as Data ...
- research-articleMarch 2017
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and PrivacyPages 289–300https://doi.org/10.1145/3029806.3029819Mobile application spoofing is an attack where a malicious mobile app mimics the visual appearance of another one. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a ...
- posterOctober 2016
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1790–1792https://doi.org/10.1145/2976749.2989050Most phishing pages try to convince users that they are legitimate sites by imitating visual signals like logos from the websites they are targeting. Visual similarity detection methods look for these imitations between the screen-shots of the suspect ...
- research-articleJune 2016
Matching User Photos to Online Products with Robust Deep Features
ICMR '16: Proceedings of the 2016 ACM on International Conference on Multimedia RetrievalPages 7–14https://doi.org/10.1145/2911996.2912002This paper focuses on a practically very important problem of matching a real-world product photo to exactly the same item(s) in online shopping sites. The task is extremely challenging because the user photos (i.e., the queries in this scenario) are ...
- research-articleNovember 2015
Illustration2Vec: a semantic vector representation of illustrations
SA '15: SIGGRAPH Asia 2015 Technical BriefsArticle No.: 5, Pages 1–4https://doi.org/10.1145/2820903.2820907Referring to existing illustrations helps novice drawers to realize their ideas. To find such helpful references from a large image collection, we first build a semantic vector representation of illustrations by training convolutional neural networks. ...
- research-articleJuly 2015
Learning visual similarity for product design with convolutional neural networks
ACM Transactions on Graphics (TOG), Volume 34, Issue 4Article No.: 98, Pages 1–10https://doi.org/10.1145/2766959Popular sites like Houzz, Pinterest, and LikeThatDecor, have communities of users helping each other answer questions about products in images. In this paper we learn an embedding for visual search in interior design. Our embedding contains two ...
- short-paperJune 2015
Semantic-aware Hashing for Social Image Retrieval
ICMR '15: Proceedings of the 5th ACM on International Conference on Multimedia RetrievalPages 483–486https://doi.org/10.1145/2671188.2749307With the proliferation of large-scale social images, recent years have witnessed the increasing amount of images with user-provided tags, which leads to considerable effort made on hashing based approximate nearest neighbor (ANN) search in huge ...
- research-articleApril 2015
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 289–294https://doi.org/10.1145/2695664.2695779This paper describes loop closures detection, a significant problem in mobile robotics, using analysis of similarity between images in a low-dimensional mapping. We represent a set of images as a graph in high-dimensional space, where each node is ...
- tutorialApril 2014
Emotionally Representative Image Discovery for Social Events
ICMR '14: Proceedings of International Conference on Multimedia RetrievalPages 177–184https://doi.org/10.1145/2578726.2578749With the emerging social networks, images have become a major medium for emotion delivery in social events due to their infectious and vivid characteristics. Discovering the emotionally representative images can help people intuitively understand the ...
- ArticleDecember 2013
How Do You Tell a Blackbird from a Crow?
ICCV '13: Proceedings of the 2013 IEEE International Conference on Computer VisionPages 9–16https://doi.org/10.1109/ICCV.2013.9How do you tell a blackbird from a crow? There has been great progress toward automatic methods for visual recognition, including fine-grained visual categorization in which the classes to be distinguished are very similar. In a task such as bird ...
- posterOctober 2012
What is happening: annotating images with verbs
MM '12: Proceedings of the 20th ACM international conference on MultimediaPages 1077–1080https://doi.org/10.1145/2393347.2396387Image annotation has been widely investigated to discover the semantics of an image. However, most of the existing algorithms focus on noun tags (e.g. concepts and objects). Since an image is a snapshot of the real world event, annotating images with ...
- ArticleJuly 2012
3D Storyboards for Interactive Visual Search
ICME '12: Proceedings of the 2012 IEEE International Conference on Multimedia and ExpoPages 848–853https://doi.org/10.1109/ICME.2012.62Interactive image and video search tools typically use a grid-like arrangement of thumbnails for preview purpose. Such a display, which is commonly known as storyboard, provides limited flexibility at interactive search and it does not optimally exploit ...
- articleJuly 2012
Indexing Large Online Multimedia Repositories Using Semantic Expansion and Visual Analysis
The proposed framework automatically predicts user tags for online videos from their visual features and associated textual metadata, which is semantically expanded using complementary textual resources.
- ArticleApril 2012
The correlation between semantic visual similarity and ontology-based concept similarity in effective web image search
APWeb'12: Proceedings of the 14th international conference on Web Technologies and ApplicationsPages 125–130https://doi.org/10.1007/978-3-642-29426-6_16This paper compares the correlations between visual similarity of real-world images and different ontology-based concept similarity in order to find a novel measurement of the relationship between semantic concepts (objects, scenes) in visual domain ...