Getting into the mind of an "in-auction" fraud perpetrator
暂无分享,去创建一个
[1] Shi-Jen Lin,et al. Fuzzy rule optimization for online auction frauds detection based on genetic algorithm , 2013, Electronic Commerce Research.
[2] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..
[3] Jie Lu,et al. A Proficient and Dynamic Bidding Agent for Online Auctions , 2012, ADMI.
[4] Ladislav Beránek,et al. The Use of Contextual Information to Detection of Fraud on Online Auctions , 2013 .
[5] Jarrod Trevathan,et al. An Adaptive Shill Bidding Agent , 2007, ICE-B.
[6] Tuomas Sandholm,et al. Algorithm for optimal winner determination in combinatorial auctions , 2002, Artif. Intell..
[7] Robert J. Kauffman,et al. The effects of shilling on final bid prices in online auctions , 2005, Electron. Commer. Res. Appl..
[8] Haiping Xu,et al. Model checking bidding behaviors in internet concurrent auctions , 2007, Comput. Syst. Sci. Eng..
[9] Robert J. Kauffman,et al. Running up the bid: detecting, predicting, and preventing reserve price shilling in online auctions , 2003, ICEC '03.
[10] Paul F. Syverson,et al. Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.
[11] Nicholas R. Jennings,et al. A Fuzzy-Logic Based Bidding Strategy for Autonomous Agents in Continuous Double Auctions , 2003, IEEE Trans. Knowl. Data Eng..
[12] Haiping Xu,et al. Inference of Online Auction Shills Using Dempster-Shafer Theory , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[13] Abdolkarim Sadrieh,et al. Sudden Termination Auctions - An Experimental Study , 2012 .
[14] Shi-Jen Lin,et al. Combining ranking concept and social network analysis to detect collusive groups in online auctions , 2012, Expert Syst. Appl..
[15] Jarrod Trevathan,et al. Disarming the bid sniper , 2011 .
[16] Gillian Dobbie,et al. Evaluating Fraud Detection Algorithms Using an Auction Data Generator , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[17] Jarrod Trevathan,et al. A Software Tool for Collecting Data from Online Auctions , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[18] J. Snyder. Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud? , 2000 .
[19] Haiping Xu,et al. Combating online in-auction fraud: Clues, techniques and challenges , 2009, Comput. Sci. Rev..
[20] Jarrod Trevathan,et al. Investigating Shill Bidding Behaviour Involving Colluding Bidders , 2007, J. Comput..
[21] Gillian Dobbie,et al. Detecting online auction shilling frauds using supervised learning , 2014, Expert Syst. Appl..
[22] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[23] Haiping Xu,et al. A Multi-State Bayesian Network for Shill Verification in Online Auctions , 2010, SEKE.
[24] Ian M. Atkinson,et al. Targeting the Strategies of a Bid Sniper , 2011, 2011 44th Hawaii International Conference on System Sciences.
[25] Dibyen Majumdar,et al. Price comparison: A reliable approach to identifying shill bidding in online auctions? , 2012, Electron. Commer. Res. Appl..
[26] Jarrod Trevathan,et al. A Simple Shill Bidding Agent , 2007, Fourth International Conference on Information Technology (ITNG'07).
[27] Andrew B. Whinston,et al. Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions , 2001, Int. J. Electron. Commer..
[28] Andrew B. Whinston,et al. Shill bidding in multi-round online auctions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[29] Jeffrey C. Ely,et al. Sniping and Squatting in Auction Markets , 2009 .
[30] Jarrod Trevathan,et al. An Anonymous and Secure Continuous Double Auction Scheme , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[31] Judy E. Scott,et al. A typology of complaints about eBay sellers , 2008, CACM.