参考文献
[1]TSANG S,KOH Y S,DOBBIE G,et al.Detecting Online Auction Shilling Frauds Using Supervised Learning[J].Expert Systems with Applications,2014,41(6):3027-3040.
[2]DONG F,SHATZ S M,XU H.Reasoning Under Uncertainty for Shill Detection in Online Auctions Using Dempster-shafer Theory[J].International Journal of Software Engineering & Knowledge Engineering,2011,20(7):943-973.
[3]ZHANG Y,BIAN J,ZHU W.Trust Fraud:A Crucial Challenge for China’s E-commerce Market[J].Electronic Commerce Research and Applications,2013,12(5):299-308.
[4]YOU W,LIU L,XIA M,et al.Reputation Inflation Detection in a Chinese C2C Market[J].Electronic Commerce Research & Applications,2011,10(5):510-519.
[5]苗光胜,冯登国,苏璞睿.P2P信任模型中基于行为相似度的共谋团体识别模型[J].通信学报,2009,30(8):9-20.
[6]CHANG W,CHANG J.Using Clustering Techniques to Analyze Fraudulent Behavior Changes in Online Auctions[C]//Proceedings of International Conference on Networking & Information Technology.Washington D.C.,USA:IEEE Press,2010:34-38.
[7]CAI G,WANG M,WANG Y,et al.A Collusion Detection Trust Model Based on Behaviour Similarity[C]//Proceedings of IET International Conference on Information and Communications Technologies.Beijing,China:[s.n.],2013:318-323.
[8]CHIU C,KU Y,LIE T,et al.Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches[J].International Journal of Electronic Commerce,2011,15(3):123-147.
[9]王倩,刘奕群,马少平,等.面向用户互联网访问日志的异常点击分析[J].中文信息学报,201,24(3):44-48,61.
[10]MARANZATO R,PEREIRA A,NEUBERT M,et al.Fraud Detection in Reputation Systems in E-markets Using Logistic Regression and Stepwise Optimization[J].ACM SIGAPP Applied Computing Review,2010,11(1):14-26.
[11]BURKE R.Classification Features for Attack Detection in Collaborative Recommender Systems[C]//Pro-ceedings of ACM Sigkdd International Conference on Know-ledge Discovery & Data Mining.New York,USA:ACM Press,2006:542-547.
[12]ALLAHBAKHSH M,IGNJATOVIC A.Detecting,Representing and Querying Collusion in Online Rating Systems[EB/OL].(2015-10-21).http://arxiv.org/corr.
[13]LIU Y,SUN Y.Anomaly Detection in Feedback-based Reputation Systems Through Temporal and Correlation Analysis[C]//Proceedings of the 2nd IEEE Inter-national Conference on Social Computing.Washington D.C.,USA:IEEE Press,2010:65-72.
[14]SUN Y,LIU Y.Security of Online Reputation Systems:Evolution of Attacks and Defenses[J].IEEE Signal Processing Magazine,2012,29(2):87-97.
[15]ALMENDRA V.Finding the Needle:A Risk-based Ranking of Product Listings at Online Auction Sites for Non-delivery Fraud Prediction[J].Expert Systems with Applications,2013,40(12):4805-4811.
[16]CHANG W,CHANG J.A Novel Two-stage Phased Modeling Framework for Early Fraud Detection in Online Auctions[J].Expert Systems with Applications,2011,38(9):11244-11260.
[17]ZHU Yanchun,ZHANG Wei,YU Changhai.Detection of Feedback Reputation Fraud in Taobao Using Social Network Theory[C]//Proceedings of International Joint Conference on Service Sciences.Washington D.C.,USA:IEEE Press,2011:188-192.
[18]NIU J,WANG L,CHEN Y,et al.Detecting Collusive Cheating in Online Shopping Systems Through Characteristics of Social Networks[C]//Proceedings of Computer Communications Workshops.Washington D.C.,USA:IEEE Press,2014:311-316.
[19]BO Z,FENG S,HAILEI Y,et al.A Relationship Based Collusive Attack Detection Mechanism for Reputation Aggregation in Social Network[M].[S.1.]:Atlantis Press,2014.
[20]PALSHIKAR G K,APTE M M.Collusion Set Detection Using Graph Clustering[J].Data Mining and Know-ledge Discovery,2008,16(2):135-164.
[21]HU J,FANG D,WEI X,et al.Colluder Detection Based on Hypergraph Decomposition[C]//Proceedings of International Conference on Computational Intelligence & Security.Washington D.C.,USA:IEEE Press,2013:630-634.
[22]TSANG S,DOBBIE G,KOH Y S.Evaluating Fraud Detec-tion Algorithms Using an Auction Data Generator[C]//Proceedings of IEEE International Conference on Data Mining Workshops.Washington D.C.,USA:IEEE Press,2012:332-339.
[23]HOFFMAN K,ZAGE D,NITA C.A Survey of Attack and Defense Techniques for Reputation Systems[J].ACM Computing Surveys,2009,42(1):1-31.
[24]KEUNG L C,NIUKYUN S.Trust-based Social Mechanism to Counter Deceptive Behaviour[D].[S.1.]:University of Warwick,2011.
[25]DEMPSTER A P.Upper and Lower Probabilities Induced by a Multivalued Mapping[J].The Annals of Mathematical Statistics,1967,38(2):325-339.
[26]SHAFER G.A Mathematical Theory of Evidence[M].Princeton,USA:Princeton University Press,1976.
[27]TIAN C,YANG B.A DS Evidence Theory Based Fuzzy Trust Model in File-sharing P2P Networks[J].Peer-to-Peer Networking and Applications,2014,7(4):332-345.
[28]ZHAO J,LAU R Y K,ZHANG W,et al.Extracting and Reasoning About Implicit Behavioral Evidences for Detecting Fraudulent Online Transactions in e-Commerce[J].Decision Support Systems,2016,86:109-121.
[29]LAU R Y K,LIAO S Y,KWOK R C,et al.Text Mining and Probabilistic Language Modeling for Online Review Spam Detection[J].ACM Transactions on Management Information Systems,2011,2(4):1-30.
编辑索书志 |