<?xml version="1.0"?>
<dblpperson name="Ieng-Fat Lam" pid="88/486" n="2">
<person key="homepages/88/486" mdate="2009-06-09">
<author pid="88/486">Ieng-Fat Lam</author>
</person>
<r><inproceedings key="conf/sersc-isa/LamXWC09" mdate="2017-05-24">
<author pid="88/486">Ieng-Fat Lam</author>
<author pid="74/627">Wei-Cheng Xiao</author>
<author pid="47/2345">Szu-Chi Wang</author>
<author pid="02/1783">Kuan-Ta Chen</author>
<title>Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach.</title>
<pages>270-279</pages>
<year>2009</year>
<booktitle>ISA</booktitle>
<ee>https://doi.org/10.1007/978-3-642-02617-1_28</ee>
<crossref>conf/sersc-isa/2009</crossref>
<url>db/conf/sersc-isa/isa2009.html#LamXWC09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwsec/LamCC08" mdate="2020-09-05">
<author pid="88/486">Ieng-Fat Lam</author>
<author pid="02/1783">Kuan-Ta Chen</author>
<author orcid="0000-0001-5667-7764" pid="34/6553">Ling-Jyh Chen</author>
<title>Involuntary Information Leakage in Social Network Services.</title>
<pages>167-183</pages>
<year>2008</year>
<booktitle>IWSEC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-89598-5_11</ee>
<crossref>conf/iwsec/2008</crossref>
<url>db/conf/iwsec/iwsec2008.html#LamCC08</url>
</inproceedings>
</r>
<coauthors n="4" nc="1">
<co c="0"><na f="c/Chen:Kuan=Ta" pid="02/1783">Kuan-Ta Chen</na></co>
<co c="0"><na f="c/Chen:Ling=Jyh" pid="34/6553">Ling-Jyh Chen</na></co>
<co c="0"><na f="w/Wang:Szu=Chi" pid="47/2345">Szu-Chi Wang</na></co>
<co c="0"><na f="x/Xiao:Wei=Cheng" pid="74/627">Wei-Cheng Xiao</na></co>
</coauthors>
</dblpperson>

