Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models

    Sujithra Kanmani*, Surendiran Balasubramanian

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1439-1454, 2023, DOI:10.32604/csse.2023.029953 - 03 November 2022

    Abstract Online reviews significantly influence decision-making in many aspects of society. The integrity of internet evaluations is crucial for both consumers and vendors. This concern necessitates the development of effective fake review detection techniques. The goal of this study is to identify fraudulent text reviews. A comparison is made on shill reviews vs. genuine reviews over sentiment and readability features using semi-supervised language processing methods with a labeled and balanced Deceptive Opinion dataset. We analyze textual features accessible in internet reviews by merging sentiment mining approaches with readability. Overall, the research improves fake review screening by using More >

  • Open Access

    ARTICLE

    Predictive-Analysis-based Machine Learning Model for Fraud Detection with Boosting Classifiers

    M. Valavan, S. Rita*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 231-245, 2023, DOI:10.32604/csse.2023.026508 - 16 August 2022

    Abstract Fraud detection for credit/debit card, loan defaulters and similar types is achievable with the assistance of Machine Learning (ML) algorithms as they are well capable of learning from previous fraud trends or historical data and spot them in current or future transactions. Fraudulent cases are scant in the comparison of non-fraudulent observations, almost in all the datasets. In such cases detecting fraudulent transaction are quite difficult. The most effective way to prevent loan default is to identify non-performing loans as soon as possible. Machine learning algorithms are coming into sight as adept at handling such More >

  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol.4, No.4, pp. 239-267, 2022, DOI:10.32604/jcs.2023.041095 - 10 August 2023

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different More >

  • Open Access

    ARTICLE

    Detecting and Analysing Fake Opinions Using Artificial Intelligence Algorithms

    Mosleh Hmoud Al-Adhaileh1, Fawaz Waselallah Alsaade2,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 643-655, 2022, DOI:10.32604/iasc.2022.021225 - 26 October 2021

    Abstract In e-commerce and on social media, identifying fake opinions has become a tremendous challenge. Such opinions are widely generated on the internet by fake viewers, also called fraudsters. They write deceptive reviews that purport to reflect actual user experience either to promote some products or to defame others. They also target the reputations of e-businesses. Their aim is to mislead customers to make a wrong purchase decision by selecting undesired products. Such reviewers are often paid by rival e-business companies to compose positive reviews of their products and/or negative reviews of other companies’ products. The… More >

  • Open Access

    ARTICLE

    Handling Class Imbalance in Online Transaction Fraud Detection

    Kanika1, Jimmy Singla1, Ali Kashif Bashir2, Yunyoung Nam3,*, Najam UI Hasan4, Usman Tariq5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2861-2877, 2022, DOI:10.32604/cmc.2022.019990 - 27 September 2021

    Abstract With the rise of internet facilities, a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction. However, the fraud cases have also increased causing the loss of money to the consumers. Hence, an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time. Generally, the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.… More >

  • Open Access

    ARTICLE

    Classification-Based Fraud Detection for Payment Marketing and Promotion

    Shuo He1,∗, Jianbin Zheng1,†, Jiale Lin2,‡, Tao Tang1,§, Jintao Zhao1,¶, Hongbao Liu1,ll

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 141-149, 2020, DOI:10.32604/csse.2020.35.141

    Abstract Nowadays, many payment service providers use the discounts and other marketing strategies to promote their products. This also raises the issue of people who deliberately take advantage of such promotions to reap financial benefits. These people are known as ‘scalper parties’ or ‘econnoisseurs’ which can constitute an underground industry. In this paper, we show how to use machine learning to assist in identifying abnormal scalper transactions. Moreover, we introduce the basic methods of Decision Tree and Boosting Tree, and show how these classification methods can be applied in the detection of abnormal transactions. In addition,… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834 - 10 June 2020

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming… More >

  • Open Access

    ARTICLE

    A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid

    Khelifi Naim1, *, Benahmed Khelifa2, Bounaama Fateh3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 97-117, 2020, DOI:10.32604/cmc.2020.09391 - 30 March 2020

    Abstract In order to strengthen their security issues, electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields. Having been treated earlier by several researchers, various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses, aiming primarily to the identification of suspicious incoming hazards. Wireless meshes have been extensively used in smart grid communication architectures due to their facility, lightness of conception and low cost installation; however, the communicated packets are still exposed to be… More >

  • Open Access

    ARTICLE

    A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data Analytics

    Hangjun Zhou1,2,*, Guang Sun1,3, Sha Fu1, Wangdong Jiang1, Juan Xue1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 179-192, 2019, DOI:10.32604/cmc.2019.05214

    Abstract With the rapid development of mobile Internet and finance technology, online e-commerce transactions have been increasing and expanding very fast, which globally brings a lot of convenience and availability to our life, but meanwhile, chances of committing frauds also come in all shapes and sizes. Moreover, fraud detection in online e-commerce transactions is not totally the same to that in the existing areas due to the massive amounts of data generated in e-commerce, which makes the fraudulent transactions more covertly scattered with genuine transactions than before. In this article, a novel scalable and comprehensive approach More >

  • Open Access

    ARTICLE

    Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media

    Chengzhang Zhu1, 2, Wentao Zhao2, *, Qian Li1, Pan Li2, Qiaobo Da3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 317-333, 2019, DOI:10.32604/cmc.2019.05677

    Abstract Detecting collaborative fraudsters who manipulate opinions in social media is becoming extremely important in order to provide reliable information, in which, however, the diversity in different groups of collaborative fraudsters presents a significant challenge to existing collaborative fraudsters detection methods. These methods often detect collaborative fraudsters as the largest group of users who have the strongest relation with each other in the social media, consequently overlooking the other groups of fraudsters that are with strong user relation yet small group size. This paper introduces a novel network embedding-based framework NEST and its instance BEST to… More >

Displaying 21-30 on page 3 of 33. Per Page