Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we study the communication patterns of users from a novel perspective, i.e. proxy users could access the limited services which are blocked.
In this paper, based on the discernible communication patterns, a novel system, ProxyHunter, is presented to automatically detect the web proxies. The ...
Apr 25, 2024 · Qiurong Zhu, Jiangbing Yang, Haibo Hou, Minghua Wang: False Invoice Detection Based on Communication Bipartite Graphs.
A comprehensive systematic literature review of graph-based anomaly detection (GBAD) on fraud detection accomplished.
Missing: Invoice | Show results with:Invoice
Qiurong Zhu's 6 research works with 10 citations and 117 reads, including: False Invoice Detection Based on Communication Bipartite Graphs.
False Invoice Detection Based on Communication Bipartite Graphs. ICAIIS 2021 ... statistics · update feed · XML dump · RDF dump · browse · persons · conferences ...
Web Proxy Detection via Bipartite Graphs and One-Mode Projections · False Invoice Detection Based on Communication Bipartite Graphs · Network Packet Sniffer with ...
The model builds a heterogeneous information network based on real transaction data, abstracts three types of bipartite graphs (user–device, user–merchant, and ...
Jiangbing Yang's 6 research works with 10 citations, including: False Invoice Detection Based on Communication Bipartite Graphs.
In this dissertation, we specifically focus on the fraudulent claim identification problem and develop different solution schemes to identify the fraudulent ...