We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,788 results
  1. FingerprintNet: Synthesized Fingerprints for Generated Image Detection

    While recent advances in generative models benefit the society, the generated images can be abused for malicious purposes, like fraud, defamation,...
    Yonghyun Jeong, Doyeon Kim, ... Jongwon Choi in Computer Vision – ECCV 2022
    Conference paper 2022
  2. Model fusion of deep neural networks for anomaly detection

    Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network...

    Nouar AlDahoul, Hezerul Abdul Karim, Abdulaziz Saleh Ba Wazir in Journal of Big Data
    Article Open access 05 August 2021
  3. International revenue share fraud prediction on the 5G edge using federated learning

    Edge computing and multi-access edge computing (MEC) are two recent paradigms of distributed computing that are growing due to the rise of the...

    Luís Ferreira, Leopoldo Silva, ... André Pilastri in Computing
    Article Open access 31 March 2023
  4. YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network

    Image forgery identification is the technique of analysing and spotting any unauthorised or fraudulent adjustment in digital images. Digital images...

    Litty Koshy, S. PraylaShyry in Signal, Image and Video Processing
    Article 19 January 2024
  5. Iterative cleaning and learning of big highly-imbalanced fraud data using unsupervised learning

    Fraud datasets often times lack consistent and accurate labels, and are characterized by having high class imbalance where the number of fraudulent...

    Robert K. L. Kennedy, Zahra Salekshahrezaee, ... Taghi M. Khoshgoftaar in Journal of Big Data
    Article Open access 19 June 2023
  6. An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework

    The global pandemic forced many education establishments around the world to move to remotely learning. Criminals, have taken this opportunity to...
    Mauricio Alexander Nieto Acosta, Hamid Jahankhani in AI, Blockchain and Self-Sovereign Identity in Higher Education
    Chapter 2023
  7. FinBrain 2.0: when finance meets trustworthy AI

    Artificial intelligence (AI) has accelerated the advancement of financial services by identifying hidden patterns from data to improve the quality of...

    Jun Zhou, Chaochao Chen, ... **aolin Zheng in Frontiers of Information Technology & Electronic Engineering
    Article 30 September 2022
  8. Model-Based Security Assessment on the Design of a Patient-Centric Data Sharing Platform

    The architectural design of a healthcare data sharing system must cope with security requirements especially when the system integrates different...
    Matthew Banton, Thais Webber, ... Juliana Bowles in From Data to Models and Back
    Conference paper 2022
  9. Anti-Spoofing System for Face Detection Using Convolutional Neural Network

    The concept of face anti-spoofing is an important part in the face recognition system. It has great importance for fiscal payment and different...
    Sumedha Sutradhar, Nazrul Ansari, ... Rupesh Mandal in Emerging Technology for Sustainable Development
    Conference paper 2024
  10. LBP and CNN feature fusion for face anti-spoofing

    Face anti-spoofing has been attracting attention because of its prominent role in the security of face recognition systems. A face spoofing attack is...

    Ravi Pratap Singh, Ratnakar Dash, Ramesh Kumar Mohapatra in Pattern Analysis and Applications
    Article 06 February 2023
  11. Associations Dynamic Evolution: Evolving Graph Transformer

    In online lending services, fraud prediction is an especially critical step to control loss risk and improve processing efficiency. It is definitely...
    Chapter 2023
  12. Data-Centric AI for Healthcare Fraud Detection

    Automated methods for detecting fraudulent healthcare providers have the potential to save billions of dollars in healthcare costs and improve the...

    Justin M. Johnson, Taghi M. Khoshgoftaar in SN Computer Science
    Article 11 May 2023
  13. Mobile money fraud detection using data analysis and visualization techniques

    Financial investigations in the realm of fraud detection demand rigorous data analysis to identify anomalies and inform decision-making. This paper...

    Rizik Al-Sayyed, Esra’a Alhenawi, ... Dima Suleiman in Multimedia Tools and Applications
    Article 21 July 2023
  14. Unsupervised Fraud Detection on Sparse Rating Networks

    Network fraud detection, specifically identifying abnormal users on rating platforms, has attracted considerable interests of researchers due to its...
    Shaowen Tang, Raymond Wong in Data Science and Machine Learning
    Conference paper 2024
  15. Explainable machine learning models for Medicare fraud detection

    As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The...

    John T. Hancock, Richard A. Bauder, ... Taghi M. Khoshgoftaar in Journal of Big Data
    Article Open access 09 October 2023
  16. Ethereum fraud behavior detection based on graph neural networks

    Since Bitcoin was first conceived in 2008, blockchain technology has attracted a large amount of researchers’ attention. At the same time, it has...

    Runnan Tan, Qingfeng Tan, ... Zhao Li in Computing
    Article 06 May 2023
  17. Risk decision analysis of commercial insurance based on neural network algorithm

    To improve the effect of commercial insurance risk decision, this paper applies neural network algorithms to commercial insurance risk decision under...

    Shanshan Wang, Zhenwang Zhao in Neural Computing and Applications
    Article 22 April 2022
  18. Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing

    Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This...

    Yu Zhang, Haoyun Dong in Journal of Cloud Computing
    Article Open access 24 April 2023
  19. Telecommunication fraud resilient framework for efficient and accurate detection of SMS phishing using artificial intelligence techniques

    One of the telecommunications’ most popular forms of fraud is the short message service (SMS). Mobile users have a valid fear about SMS spam, which...

    Devendra Sambhaji Hapase, Lalit Vasantrao Patil in Multimedia Tools and Applications
    Article 28 March 2024
  20. Design and implementation of liveness detection system based on improved shufflenet V2

    Face recognition is a prevalent identity verification method, but it requires a liveness detection system to guard against face fraud from printed...

    Yongxing Zhang, Wei **e, **aoyuan Yu in Signal, Image and Video Processing
    Article 22 March 2023
Did you find what you were looking for? Share feedback.