Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on social network's anomalous behavior detection
L ** spammer groups with dynamic co-review graph optimization
C Wang, N Li, S Ji, X Fang, Z Wang - Cybersecurity, 2024 - Springer
Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer
groups to post misleading reviews or ratings, aiming to manipulate public perception and …
groups to post misleading reviews or ratings, aiming to manipulate public perception and …
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media
Online reviews have a significant influence on consumers' purchasing decisions.
Unfortunately, many sellers exploit these reviews by employing a large number of spammers …
Unfortunately, many sellers exploit these reviews by employing a large number of spammers …
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm
Q Zhang, Z Liang, S Ji, B **ng, DKW Chiu - Cybersecurity, 2023 - Springer
It is not uncommon for malicious sellers to collude with fake reviewers (also called
spammers) to write fake reviews for multiple products to either demote competitors or …
spammers) to write fake reviews for multiple products to either demote competitors or …
SecureEngine: Spammer classification in cyber defence for leveraging green computing in Sustainable city
A Makkar - Sustainable Cities and Society, 2022 - Elsevier
In today's era, Sustainable city is evaluated using the services provided to the society. The
designing of the integral part of the society should be focused towards the benefits of …
designing of the integral part of the society should be focused towards the benefits of …
[HTML][HTML] Anomalous behavior detection based on optimized graph embedding representation in social networks
L **ng, S Li, Q Zhang, H Wu, H Ma, X Zhang - Journal of King Saud …, 2024 - Elsevier
Anomalous behaviors in social networks can lead to privacy leaks and the spread of false
information. In this paper, we propose an anomalous behavior detection method based on …
information. In this paper, we propose an anomalous behavior detection method based on …
Utilizing a time-dependent graph convolutional neural network for fraudulent transaction identification
The present disclosure relates to utilizing a graph convolu tional neural network to generate
similarity probabilities between pairs of digital identities associated with digital transactions …
similarity probabilities between pairs of digital identities associated with digital transactions …
Semi-GSGCN: Social Robot Detection Research with Graph Neural Network.
X Wang, Q Zheng, K Zheng, Y Sui… - … , Materials & Continua, 2020 - search.ebscohost.com
Malicious social robots are the disseminators of malicious information on social networks,
which seriously affect information security and network environments. Efficient and reliable …
which seriously affect information security and network environments. Efficient and reliable …