Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A deep learning approach for detecting fake reviewers: Exploiting reviewing behavior and textual information
Ensuring the credibility of online consumer reviews (OCRs) is a growing societal concern.
However, the problem of fake reviewers on online platforms significantly influences e …
However, the problem of fake reviewers on online platforms significantly influences e …
Detecting review manipulation on online platforms with hierarchical supervised learning
Opinion spammers exploit consumer trust by posting false or deceptive reviews that may
have a negative impact on both consumers and businesses. These dishonest posts are …
have a negative impact on both consumers and businesses. These dishonest posts are …
Fraudulent review detection model focusing on emotional expressions and explicit aspects: investigating the potential of feature engineering
Reading customer reviews before purchasing items online has become a common practice;
however, some companies use machine learning (ML) algorithms to generate false reviews …
however, some companies use machine learning (ML) algorithms to generate false reviews …
The use of eye-tracking in information systems research: a literature review of the last decade
Eye-trackers provide continuous information on individuals' gaze behavior. Due to the
increasing popularity of eye-tracking in the information systems (IS) field, we reviewed how …
increasing popularity of eye-tracking in the information systems (IS) field, we reviewed how …
Detecting anomalous online reviewers: An unsupervised approach using mixture models
Online reviews play a significant role in influencing decisions made by users in day-to-day
life. The presence of reviewers who deliberately post fake reviews for financial or other …
life. The presence of reviewers who deliberately post fake reviews for financial or other …
[HTML][HTML] Intelligent eye-tracker-based methods for detection of deception: A survey
W Celniak, D Słapczyńska, A Pająk, J Przybyło… - Electronics, 2023 - mdpi.com
Over the last few years, a large number of studies have been conducted on the monitoring of
human behavior remaining beyond conscious control. One area of application for such …
human behavior remaining beyond conscious control. One area of application for such …
Human identification for activities of daily living: A deep transfer learning approach
Sensor-based home Activities of Daily Living (ADLs) monitoring systems have emerged to
monitor elderly people's self-care ability remotely. However, the unobtrusive, privacy-friendly …
monitor elderly people's self-care ability remotely. However, the unobtrusive, privacy-friendly …
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools
Phishing websites become a critical cybersecurity threat affecting individuals and
organizations. Phishing-website detection tools are designed to protect users against such …
organizations. Phishing-website detection tools are designed to protect users against such …
Do you know him? Gaze dynamics toward familiar faces on a concealed information test
Can gaze position reveal concealed knowledge? During visual processing, gaze allocation
is influenced not only by features of the visual input, but also by previous exposure to …
is influenced not only by features of the visual input, but also by previous exposure to …
Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements
Organizational members who conceal information about adverse behaviors present a
substantial risk to that organization. Yet the task of identifying who is concealing information …
substantial risk to that organization. Yet the task of identifying who is concealing information …