Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. Kiruthiga S, Kola Sujatha P, Kannan A (2014) Detecting cloning attack in Social Networks using classification and clustering techniques. In: 2014 International Conference on Recent Trends in Information Technology, IEEE. 1–6. https://doi.org/10.1109/ICRTIT.2014.6996166
2. Wang Z, Luo N, Zhou P (2020) GuardHealth: Blockchain empowered secure data management and Graph Convolutional Network enabled anomaly detection in smart healthcare. J Parallel Distrib Comput 142:1–12. https://doi.org/10.1016/j.jpdc.2020.03.004
3. L. P, S. V, V. Sasikala, Arunarasi J, Rajini AR ,Nithiya N (2022) Fake Profile Identification in Social Network using Machine Learning and NLP,” in 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), IEEE,1–4. https://doi.org/10.1109/IC3IOT53935.2022.9767958
4. Aljably R, Tian Y, Al-Rodhaan M (2020) Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. Sec Commun Networks 2020:1–14. https://doi.org/10.1155/2020/5874935
5. Venugopal V, “International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING Detection and Verification of Cloned Profiles in Online Social Networks Using MapReduce Based Clustering and Classification.” [Online]. Available: www.ijisae.org
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure UPI: Machine Learning-Driven Fraud Detection System for UPI Transactions;2024 2nd International Conference on Disruptive Technologies (ICDT);2024-03-15