Publisher
Zhejiang University Press
Reference63 articles.
1. Alibaba Cloud, 2023. Phone Number Verification Service (in Chinese). https://www.alibabacloud.com/product/verify?spm=a3c0i.23458820.2359477120.2.2e137d3frQSEAI [Accessed on Mar. 25, 2023].
2. Al-Qurishi M, Hossain MS, Alrubaian M, et al., 2018. Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Ind Inform, 14(2):799–813. https://doi.org/10.1109/TII.2017.2753202
3. Baytas IM, Xiao C, Zhang X, et al., 2017. Patient subtyping via time-aware LSTM networks. Proc 23rd ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining, p.65–74. https://doi.org/10.1145/3097983.3097997
4. Bhattacharyya S, Jha S, Tharakunnel K, et al., 2011. Data mining for credit card fraud: a comparative study. Dec Support Syst, 50(3):602–613. https://doi.org/10.1016/j.dss.2010.08.008
5. Bilge L, Strufe T, Balzarotti D, et al., 2009. All your contacts are belong to us: automated identity theft attacks on social networks. Proc 18th Int Conf on World Wide Web, p.551–560. https://doi.org/10.1145/1526709.1526784