Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics
暂无分享,去创建一个
[1] T. Graepel,et al. Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.
[2] Padhraic Smyth,et al. Modeling human location data with mixtures of kernel densities , 2014, KDD.
[3] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[4] Debrup Chakraborty,et al. A cryptographic study of tokenization systems , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[5] Saeid Safavi,et al. Fraud Detection in Voice-Based Identity Authentication Applications and Services , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).
[6] Xiaoping Zhou,et al. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks , 2016, IEEE Transactions on Knowledge and Data Engineering.
[7] Shazia Wasim Sadiq,et al. Discovering interpretable geo-social communities for user behavior prediction , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[8] M. Kosinski,et al. Computer-based personality judgments are more accurate than those made by humans , 2015, Proceedings of the National Academy of Sciences.
[9] Aixin Sun,et al. Topic Modeling for Short Texts with Auxiliary Word Embeddings , 2016, SIGIR.
[10] Sherali Zeadally,et al. Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior , 2014, IEEE Transactions on Information Forensics and Security.
[11] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[12] K. Suzanne Barber,et al. Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[13] Zhanpeng Jin,et al. CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification , 2016, IEEE Transactions on Information Forensics and Security.
[14] Guiran Chang,et al. nPAKE: An Improved Group PAKE Protocol , 2012, 2012 Ninth Web Information Systems and Applications Conference.
[15] Thamar Solorio,et al. A Case Study of Sockpuppet Detection in Wikipedia , 2013 .