1 code implementation • 9 Oct 2020 • Perry Deng, Cooper Linsky, Matthew Wright
Visually similar characters, or homoglyphs, can be used to perform social engineering attacks or to evade spam and plagiarism detectors.
Clustering Transfer Learning