Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fair ranking: a critical review, challenges, and future directions
Ranking, recommendation, and retrieval systems are widely used in online platforms and
other societal systems, including e-commerce, media-streaming, admissions, gig platforms …
other societal systems, including e-commerce, media-streaming, admissions, gig platforms …
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
Fraudar: Bounding graph fraud in the face of camouflage
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
Automated crowdturfing attacks and defenses in online review systems
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation
online, but are limited by the costs of hiring and managing human workers. In this paper, we …
online, but are limited by the costs of hiring and managing human workers. In this paper, we …
Towards detecting anomalous user behavior in online social networks
Users increasingly rely on crowdsourced information, such as reviews on Yelp and Amazon,
and liked posts and ads on Facebook. This has led to a market for blackhat promotion …
and liked posts and ads on Facebook. This has led to a market for blackhat promotion …
Silentwhispers: Enforcing security and privacy in decentralized credit networks
Credit networks model transitive trust (or credit) between users in a distributed environment
and have recently seen a rapid increase of popularity due to their flexible design and …
and have recently seen a rapid increase of popularity due to their flexible design and …
Graph-based fraud detection in the face of camouflage
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
The doppelgänger bot attack: Exploring identity impersonation in online social networks
People have long been aware of malicious users that impersonate celebrities or launch
identity theft attacks in social networks. However, beyond anecdotal evidence, there have …
identity theft attacks in social networks. However, beyond anecdotal evidence, there have …
Deceptive opinion spam detection approaches: a literature survey
Nowadays, a large number of customers purchase products and services online. Customers
can write their opinions in reviews to express the value and quality of purchased goods and …
can write their opinions in reviews to express the value and quality of purchased goods and …
[PDF][PDF] Privacy preserving payments in credit networks
A credit network models trust between agents in a distributed environment and enables
payments between arbitrary pairs of agents. With their flexible design and robustness …
payments between arbitrary pairs of agents. With their flexible design and robustness …