[1] |
CINIC.The 41st China statistical report on internet development[R]. Beijing:China Internet Network Information Center, 2018.
|
[2] |
QIN Z , YAN J , REN K ,et al. SecSIFT:secure image SIFT feature extraction in cloud computing[J]. ACM Transactions on Multimedia Computing,Communications and Applications, 2016,12(4s):65.
|
[3] |
GOMEZ-NIETO E , SAN ROMAN F , PAGLIOSA P ,et al. Similarity preserving snippet-based visualization of Web search results[J]. IEEE Transactions on Visualization and Computer Graphics, 2014,20(3): 457-470.
|
[4] |
HOFMANN T , . Probabilistic latent semantic indexing[C]// ACM SIGIR Forum. ACM, 2017: 211-218.
|
[5] |
SADOWSKI C , LEVIN G . Simhash:hash-based similarity detection[R]. Google, 2007.
|
[6] |
KO?CZ A , CHOWDHURY A . Lexicon randomization for near-duplicate detection with I-match[J]. The Journal of Supercomputing, 2008,45(3): 255-276.
|
[7] |
SHIVAKUMAR N , GARCIA-MOLINA H , . Finding near-replicas of documents on the Web[C]// International Workshop on the World Wide Web and Databases. Springer , 1998: 204-212.
|
[8] |
KAPOOR A , ARORA V . Application of bloom filter for duplicate URL detection in a web crawler[C]// IEEE International Conference on Collaboration and Internet Computing. IEEE, 2016: 246-255.
|
[9] |
JIANG J , CHEN J , CHOO K K R ,et al. A deep learning based online malicious URL and DNS detection scheme[C]// International Conference on Security and Privacy in Communication Systems. Springer, 2017: 438-448.
|
[10] |
LIU W , DENG X , HUANG G ,et al. An antiphishing strategy based on visual similarity assessment[J]. IEEE Internet Computing, 2006,10(2): 58-65.
|
[11] |
MAO J , TIAN W , LI P ,et al. Phishing-alarm:robust and efficient phishing detection via page component similarity[J]. IEEE Access, 2017(5): 17020-17030.
|
[12] |
ZHANG H , LIU G , CHOW T W S ,et al. Textual and visual content-based anti-phishing:a Bayesian approach[J]. IEEE Transactions on Neural Networks, 2011,22(10): 1532-1546.
|
[13] |
CHEN Z , ZHANG P , ZHENG C ,et al. CookieMiner:towards real-time reconstruction of web-downloading chains from network traces[C]// IEEE International Conference on Communications. IEEE, 2016: 1-6.
|
[14] |
BOBBARJUNG D R , JAGANNATHAN S , DUBNICKI C . Improving duplicate elimination in storage systems[J]. ACM Transactions on Storage, 2006,2(4): 424-448.
|
[15] |
MIKOLAJCZYK K , SCHMID C . A performance evaluation of local descriptors[J]. IEEE transactions on pattern analysis and machine intelligence, 2005,27(10): 1615-1630.
|