no code implementations • 12 Nov 2019 • Panpan Zheng, Shuhan Yuan, Xintao Wu, Yubao Wu
The key challenge is that the buyers are anonymized in darknet markets.
3 code implementations • 12 Sep 2018 • Panpan Zheng, Shuhan Yuan, Xintao Wu
However, there is usually a gap between the time that a user commits a fraudulent action and the time that the user is suspended by the platform.
1 code implementation • 5 Mar 2018 • Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
Currently, most of the fraud detection approaches require a training dataset that contains records of both benign and malicious users.
1 code implementation • 3 Jun 2017 • Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang
In particular, we develop a multi-source long-short term memory network (M-LSTM) to model user behaviors by using a variety of user edit aspects as inputs, including the history of edit reversion information, edit page titles and categories.