نتایج جستجو برای: fake accounts
تعداد نتایج: 63918 فیلتر نتایج به سال:
Existing fake website detection systems are unable to effectively detect fake websites. In this study, we advocate the development of fake website detection systems that employ classification methods grounded in statistical learning theory (SLT). Experimental results reveal that a prototype system developed using SLT-based methods outperforms seven existing fake website detection systems on a t...
Fake iris detection is to detect and defeat a fake (forgery) iris image input. To solve the problems of previous researches on fake iris detection, we propose the new method of detecting fake iris attack based on the Purkinje image. Especially, we calculated the theoretical positions and distances between the Purkinje images based on the human eye model and the performance of fake detection alg...
lawgiver, for the purpose of penal supporting of national historical-cultural monuments, ratified repeated article 566 of islamic penal code in 1388; which demonstrates three actions of “making fake cases”, “introducing, carrying or storing” and “buying of historical-cultural monuments” as crimes. this criminalizing was necessary and advantageous, but the procedure of criminalizing has some wea...
Social media can be a double-edged sword for modern communications, either a convenient channel exchanging ideas or an unexpected conduit circulating fake news through a large population. Existing studies of fake news focus on efforts on theoretical modelling of propagation or identification methods based on black-box machine learning, neglecting the possibility of identifying fake news using o...
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...
Fake website pages use the similar page layout, font style and picture to mimic legitimate web pages in an effort to convince internet users to give their personal sensitive information such as bank account number, passwords, personal details etc and also sell fake products like fake ticket, duplicate brand cloths, medication etc. There are many available techniques in the market to identify th...
Political agents often attempt to influence elections through troll farms that flood social media platforms with messages from fake accounts emulate genuine information. We study the ability of manipulate elections. show such disinformation tactics is more effective when voters are otherwise well-informed. Thus, for example, societies high-quality vulnerable electoral manipulation.
P2P file sharing systems often use incentive policies to encourage sharing. With the decrease of free riders, the amount of cheating behaviors has increased. Some users rename a common file with a popular name to attract the downloads of other users in order to gain unfair advantages from incentive policies. We call the renamed file a fake file. While techniques have been proposed to combat fak...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید