cherryL123's Stars
philomathic-guy/Malicious-Web-Content-Detection-Using-Machine-Learning
Chrome extension for detecting phishing web sites
duo-labs/phinn
A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.
EdisonLeeeee/ICLR2022-OpenReviewData
ICLR 2022 Paper submission trend analysis from https://openreview.net/group?id=ICLR.cc/2022/Conference
Gxy-2001/DataScienceAssignment
数据科学基础大作业:实现的技术包括利用python爬虫,爬取关键词搜索的微博正文,特定微博下的评论;预处理微博文本;手写textRank;聚类,kmeans,DBSCAN,层次聚类;情感词典情感分析;pyecharts可视化绘图
lindsey98/PhishIntention
PhishIntention: Phishing detection through webpage intention
yuanqi7/Phishing-Detection-on-Ethereum
As the most famous application of blockchain, cryptocurrency has suffered huge economic losses due to phishing scams. Our work shares phishing account information from Etherscan and the code for how to crawl it. In addition, the trans2vec algorithm for detection was shared. In our work, accounts and transactions in Ethereum are treated as nodes and edges, so detection of phishing accounts can be modeled as a node classification problem. This work starts from Etherscan exposed nodes reported by phishing points and randomly extracts the same number of non-phishing fraud nodes. A large Ethereum trading network was crawled from ethereum records through breadth search.
sohailahmedkhan/Phishing-Websites-Classification-using-Deep-Learning
A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3 different feature selection and 2 different dimensionality reduction techniques are used for comparison.
Khuzd/PhishGan
URL phishing detection using Generative Adversarial Network (GAN)
Vnjvibhash/Phishing-Website-Detection-Using-Neural-Network
This System Contains The Full Project of Phishing Website Detection with the GUI
jackaduma/HomoglyphAttacksDetector
Detecting Homoglyph Attacks with CNN model using Computer Vision method
cherryL123/NLP4CyberSecurity
NLP model and tech for cyber security tasks