An auctioning reputation system based on anomaly
暂无分享,去创建一个
Jonathon T. Giffin | V. Ganapathy | Mihai Christodorescu | L. Kruger | Nicholas Kidd | Hao Wang | Shai Rubin | T. Giffin | Hao Wang | Vinod Ganapathy | Vinod Ganapathy | Jonathon T. Giffin | Louis Kruger | Hao Wang | Nicholas Kidd
[1] Berit Holmqvist. Face to interface , 1994 .
[2] J. Wooders,et al. Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .
[3] Chrysanthos Dellarocas. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003 .
[4] Robert J. Kauffman,et al. Running up the bid: detecting, predicting, and preventing reserve price shilling in online auctions , 2003, ICEC '03.
[5] Ulrich Brinkmann,et al. „Face to Interface“: Zum Problem der Vertrauenskonstitution im Internet am Beispiel von elektronischen Auktionen / “Face to Interface” – The Establishment of Trust in the Internet: The Case of e-Auctions , 2001 .
[6] J. Rice. Mathematical Statistics and Data Analysis , 1988 .
[7] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[8] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[9] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[10] Ali Hortaçsu,et al. Winner's Curse, Reserve Prices and Endogenous Entry: Empirical Insights from Ebay Auctions , 2003 .
[11] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[12] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[13] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[14] Ashish Sureka,et al. Mining eBay: Bidding Strategies and Shill Detection , 2002, WEBKDD.
[15] David G. Stork,et al. Pattern Classification , 1973 .
[16] W. Loh,et al. Nonparametric estimation of conditional quantiles using quantile regression trees ∗ ( Published in Bernoulli ( 2002 ) , 8 , 561 – 576 ) , 2008 .
[17] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[18] Joos Vandewalle,et al. Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.
[19] R. Koenker,et al. Robust Tests for Heteroscedasticity Based on Regression Quantiles , 1982 .
[20] Chrysanthos Dellarocas,et al. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..
[21] Paul Resnick,et al. Reputation systems , 2000, CACM.
[22] R. Koenker,et al. Regression Quantiles , 2007 .
[23] Andrew B. Whinston,et al. Shill-Proof Fee Schedule: The Sunscreen against Seller Self-Collusion in Online English Auctions , 2004 .
[24] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[25] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[26] Jaswinder Pal Singh,et al. Computing and using reputations for internet ratings , 2001, EC '01.
[27] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[28] J. Kagel,et al. Common Value Auctions and the Winner's Curse , 2002 .