Privacy-Aware Identity Cloning Detection Based on Deep Forest
نویسندگان
چکیده
We propose a novel method to detect identity cloning of social-sensor cloud service providers prevent the detrimental outcomes caused by deception. This approach leverages non-privacy-sensitive user profile data gathered from social networks and powerful deep learning model perform cloned detection. evaluated proposed against state-of-the-art detection techniques other popular deception models atop real-world dataset. The results show that our significantly outperforms these techniques/models in terms Precision F1-score.
منابع مشابه
constructing gender identity through narratives based on hallidays metafunctions
هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...
15 صفحه اولPrivacy-Aware Malware Detection
Overview In cloud-infrastructure, cloud service providers (e.g. Amazon Web Service, IBM Cloud, Microsoft Azure) are not allowed to access the content of customer virtual machines. In consequence, it is hard for the providers to protect their infrastructure from malware infections. As the virtual machines are usually created from a limited set of standard images and likely share many vulnerabili...
متن کاملDeep Identity-aware Transfer of Facial Attributes
This paper presents a Deep convolutional network model for Identity-Aware Transfer (DIAT) of facial attributes. Given the source input image and the reference attribute, DIAT aims to generate a facial image (i.e., target image) that not only owns the reference attribute but also keep the same or similar identity to the input image. We develop a two-stage scheme to transfer the input image to ea...
متن کاملDeep Edge-Aware Saliency Detection
There has been profound progress in visual saliency thanks to the deep learning architectures, however, there still exist three major challenges that hinder the detection performance for scenes with complex compositions, multiple salient objects, and salient objects of diverse scales. In particular, output maps of the existing methods remain low in spatial resolution causing blurred edges due t...
متن کاملAn Architecture for Privacy-Aware Inter-domain Identity Management
The management of service oriented architectures demands an efficient control of service users and their authorizations. Similar to structured cabling in LANs, Identity & Access Management systems have proven to be important components of organizations’ IT infrastructures. Yet, due to new management challenges such as virtual organizations, on-demand computing and the integration of third party...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-91431-8_26