Automatically Dismantling Online Dating Fraud
暂无分享,去创建一个
Gianluca Stringhini | Monica T. Whitty | Awais Rashid | Guillermo Suarez-Tangil | Claudia Peersman | Matthew Edwards | G. Stringhini | M. Whitty | A. Rashid | Guillermo Suarez-Tangil | M. Edwards | Claudia Peersman
[1] E K Sadalla,et al. Evolution, traits, and the stages of human courtship: qualifying the parental investment model. , 1990, Journal of personality.
[2] Sotiris Ioannidis,et al. Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[3] Aunshul Rege. What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud , 2009 .
[4] Valliyammai Chinnaiah,et al. Fake profile detection techniques in large-scale online social networks: A comprehensive review , 2017, Comput. Electr. Eng..
[5] Jeffrey T. Hancock,et al. Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[6] Jeffrey T. Hancock,et al. The truth about lying in online dating profiles , 2007, CHI.
[7] Monica T. Whitty,et al. Revealing the 'real' me, searching for the 'actual' you: Presentations of self on an internet dating site , 2008, Comput. Hum. Behav..
[8] Hans van Halteren,et al. New Machine Learning Methods Demonstrate the Existence of a Human Stylome , 2005, J. Quant. Linguistics.
[9] Monica T. Whitty,et al. The online dating romance scam: causes and consequences of victimhood , 2014 .
[10] Sonia Chiasson,et al. "Don't Break My Heart!": User Security Strategies for Online Dating (Short Paper) , 2017 .
[11] Paul Rayson,et al. Who Am I? Analyzing Digital Personas in Cybercrime Investigations , 2013, Computer.
[12] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[13] Gianluca Stringhini,et al. The Geography of Online Dating Fraud , 2018, IEEE S&P 2018.
[14] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[15] Ryan L. Boyd,et al. The Development and Psychometric Properties of LIWC2015 , 2015 .
[16] Walid Magdy,et al. Fake it till you make it: Fishing for Catfishes , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[17] Monica T. Whitty,et al. The online dating romance scam: The psychological impact on victims – both financial and non-financial , 2016 .
[18] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..
[19] Din J. Wasem,et al. Mining of Massive Datasets , 2014 .
[20] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[21] Monica T. Whitty,et al. The Scammers Persuasive Techniques Model Development of a Stage Model to Explain the Online Dating Romance Scam , 2013 .
[22] Fei-Fei Li,et al. Deep visual-semantic alignments for generating image descriptions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[24] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[25] Anand Rajaraman,et al. Mining of Massive Datasets , 2011 .
[26] Markus Jakobsson,et al. Case Study: Romance Scams , 2016, Understanding Social Engineering Based Scams.
[27] Dumitru Erhan,et al. Show and Tell: Lessons Learned from the 2015 MSCOCO Image Captioning Challenge , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Gianluca Stringhini,et al. Quit Playing Games with My Heart: Understanding Online Dating Scams , 2015, DIMVA.