Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    An Early Warning Model of Telecommunication Network Fraud Based on User Portrait

    Wen Deng1, Guangjun Liang1,2,3,*, Chenfei Yu1, Kefan Yao1, Chengrui Wang1, Xuan Zhang1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1561-1576, 2023, DOI:10.32604/cmc.2023.035016 - 06 February 2023

    Abstract With the frequent occurrence of telecommunications and network fraud crimes in recent years, new frauds have emerged one after another which has caused huge losses to the people. However, due to the lack of an effective preventive mechanism, the police are often in a passive position. Using technologies such as web crawlers, feature engineering, deep learning, and artificial intelligence, this paper proposes a user portrait fraud warning scheme based on Weibo public data. First, we perform preliminary screening and cleaning based on the keyword “defrauded” to obtain valid fraudulent user Identity Documents (IDs). The basic… More >

  • Open Access

    ARTICLE

    A Fast Detection Method of Network Crime Based on User Portrait

    Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497 - 21 April 2021

    Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use More >

  • Open Access

    ARTICLE

    Gender Forecast Based on the Information about People Who Violated Traffic Principle

    Rui Li1, Guang Sun1,*, Jingyi He1, Ying Jiang1, Rui Sun1, Haixia Li1, Peng Guo1,2, Jianjun Zhang3

    Journal on Internet of Things, Vol.2, No.2, pp. 65-73, 2020, DOI:10.32604/jiot.2020.09868 - 14 September 2020

    Abstract User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’ information. When it talks about user portrait, it will be connected with precise marketing and operating. However, there are more ways which can reflect the good use of user portrait. Commercial use is the most acceptable use but it also can be used in different industries widely. The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety. It can extract the information from people who More >

  • Open Access

    ARTICLE

    An Ui Design Optimization Strategy for General App in Big Data Environment

    Hangjun Zhou1, Jieyu Zhou1,*, Guang Sun2,3, Wangdong Jiang3, Chuntian Luo1, Xiaoping Fan1, Haowen Zhang1, Haoran Zhang1

    Journal of Quantum Computing, Vol.1, No.2, pp. 65-80, 2019, DOI:10.32604/jqc.2019.07238

    Abstract Due to the huge amount of increasing data, the requirements of people for electronic products such as mobile phones, tablets, and notebooks are constantly improving. The development and design of various software applications attach great importance to users’ experiences. The rationalized UI design should allow a user not only enjoy the visual design experience of the new product but also operating it more pleasingly. This process is to enhance the attractiveness and performance of the new product and thus to promote the active usage and consuming conduct of users. In this paper, an UI design More >

Displaying 1-10 on page 1 of 4. Per Page