Search
Search Results
-
FingerprintNet: Synthesized Fingerprints for Generated Image Detection
While recent advances in generative models benefit the society, the generated images can be abused for malicious purposes, like fraud, defamation,... -
Model fusion of deep neural networks for anomaly detection
Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network...
-
International revenue share fraud prediction on the 5G edge using federated learning
Edge computing and multi-access edge computing (MEC) are two recent paradigms of distributed computing that are growing due to the rise of the...
-
YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network
Image forgery identification is the technique of analysing and spotting any unauthorised or fraudulent adjustment in digital images. Digital images...
-
Iterative cleaning and learning of big highly-imbalanced fraud data using unsupervised learning
Fraud datasets often times lack consistent and accurate labels, and are characterized by having high class imbalance where the number of fraudulent...
-
An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework
The global pandemic forced many education establishments around the world to move to remotely learning. Criminals, have taken this opportunity to... -
FinBrain 2.0: when finance meets trustworthy AI
Artificial intelligence (AI) has accelerated the advancement of financial services by identifying hidden patterns from data to improve the quality of...
-
Model-Based Security Assessment on the Design of a Patient-Centric Data Sharing Platform
The architectural design of a healthcare data sharing system must cope with security requirements especially when the system integrates different... -
Anti-Spoofing System for Face Detection Using Convolutional Neural Network
The concept of face anti-spoofing is an important part in the face recognition system. It has great importance for fiscal payment and different... -
LBP and CNN feature fusion for face anti-spoofing
Face anti-spoofing has been attracting attention because of its prominent role in the security of face recognition systems. A face spoofing attack is...
-
Associations Dynamic Evolution: Evolving Graph Transformer
In online lending services, fraud prediction is an especially critical step to control loss risk and improve processing efficiency. It is definitely... -
Data-Centric AI for Healthcare Fraud Detection
Automated methods for detecting fraudulent healthcare providers have the potential to save billions of dollars in healthcare costs and improve the...
-
Mobile money fraud detection using data analysis and visualization techniques
Financial investigations in the realm of fraud detection demand rigorous data analysis to identify anomalies and inform decision-making. This paper...
-
Unsupervised Fraud Detection on Sparse Rating Networks
Network fraud detection, specifically identifying abnormal users on rating platforms, has attracted considerable interests of researchers due to its... -
Explainable machine learning models for Medicare fraud detection
As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The...
-
Ethereum fraud behavior detection based on graph neural networks
Since Bitcoin was first conceived in 2008, blockchain technology has attracted a large amount of researchers’ attention. At the same time, it has...
-
Risk decision analysis of commercial insurance based on neural network algorithm
To improve the effect of commercial insurance risk decision, this paper applies neural network algorithms to commercial insurance risk decision under...
-
Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This...
-
Telecommunication fraud resilient framework for efficient and accurate detection of SMS phishing using artificial intelligence techniques
One of the telecommunications’ most popular forms of fraud is the short message service (SMS). Mobile users have a valid fear about SMS spam, which...
-
Design and implementation of liveness detection system based on improved shufflenet V2
Face recognition is a prevalent identity verification method, but it requires a liveness detection system to guard against face fraud from printed...