1. Yu, H., Gibbons, P.B., Kaminsky, M., et al.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)
2. Ali, M.A., Azad, M.A., Centeno, M.P., et al.: Consumer-facing technology fraud: economics, attack methods and potential solutions. Futur. Gener. Comput. Syst. 100, 408–427 (2019)
3. Shebuti, R., Leman, A.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2015), pp. 985–994. ACM, New York (2015)
4. Chouiekh, A., Haj, E.L.H.I.E.L.: Convnets for fraud detection analysis. Procedia Comput. Sci. 127, 133–138 (2018)
5. Li, R., Zhang, Y., Tuo, Y., et al.: A novel method for detecting telecom fraud user. In: 2018 3rd International Conference on Information Systems Engineering (ICISE), 46–50. IEEE (2018)