Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Saeedreza Shehnepoor"'
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:280-291
Publikováno v:
Telecommunication Systems. 77:255-268
Saving energy in Wireless Sensor Networks (WSNs), is critical in different applications, such as environment monitoring, keeping human awareness and etc. Many studies have investigated energy consumption and improved the WSN lifetime longevity by red
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:3456-3468
Fraud review detection is a hot research topic in recent years. The Cold-start is a particularly new but significant problem referring to the failure of a detection system to recognize the authenticity of a new user. State-of-the-art solutions employ
Motivated by potential financial gain, companies may hire fraudster groups to write fake reviews to either demote competitors or promote their own businesses. Such groups are considerably more successful in misleading customers, as people are more li
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1d8aa97b75b56acb08ff14a0ca1ad968
http://arxiv.org/abs/2201.02621
http://arxiv.org/abs/2201.02621
Publikováno v:
IEEE transactions on neural networks and learning systems.
Social reviews are indispensable resources for modern consumers' decision making. To influence the reviews, for financial gains, some companies may choose to pay groups of fraudsters rather than individuals to demote or promote products and services.
Cardiovascular Disease (CVD) is considered as one of the principal causes of death in the world. Over recent years, this field of study has attracted researchers’ attention to investigate heart sounds’ patterns for disease diagnostics. In this st
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d50812652f8bcfe9ec1d01b299969044
Publikováno v:
Telecommunication Systems. 77:269-269
Publikováno v:
Computer Speech & Language. 64:101105
Automatic Speaker Verification (ASV) is authentication of individuals by analyzing their speech signals. Different synthetic approaches allow spoofing to deceive ASV systems (ASVs), whether using techniques to imitate a voice or reconstruct the featu
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2017, 12 (7), pp.1585-1595. ⟨10.1109/TIFS.2017.2675361⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2017, 12 (7), pp.1585-1595. ⟨10.1109/TIFS.2017.2675361⟩
International audience; Nowadays, a big part of people rely on available content in social media in their decisions (e.g., reviews and feedback on a topic or product). The possibility that anybody can leave a review provides a golden opportunity for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6fa63c4948c3946ee93e03c46b88a0ef