[1] |
YU H , KAMINSKY M , Gibbons P B ,et al. SybilGuard:defending against sybil attacks via social networks[J]. IEEE/ACM Transactions on Networking, 2008,16(3): 576-589.
|
[2] |
TRAN N , LI J , SUBRAMANIAN L ,et al. Optimal Sybil-resilient node admission control[C]// IEEE Infocom. 2015.
|
[3] |
YANG C , HARKREADER R , ZHANG J ,et al. Analyzing spammers' social networks for fun and profit:a case study of cyber criminal ecosystem on twitter[C]// International Conference on World Wide Web. 2012.
|
[4] |
刘枭, 王晓国 . 基于概率图的银行电信诈骗检测方法[J]. 计算机科学, 2018,45(7): 122-128.
|
|
LIU X , WANG X G . Probabilistic graphical model based approach for bank telecommunication fraud detection[J]. Computer Science, 2018,45(7): 122-128.
|
[5] |
丁濛濛 . 基于规则引擎的互联网金融反欺诈研究[J]. 电脑知识与技术, 2018,14(1): 1-3.
|
|
DING M M . Internet finance anti-fraud research based on rule engine[J]. Computer Knowledge and Technology, 2018,14(1): 1-3.
|
[6] |
张成虎, 李时 . 基于 AI 技术的反洗钱系统设计[J]. 中国金融电脑, 2005,(3): 44-47.
|
|
ZHANG C H , LI S . Design of anti-money laundering system based on AI technology[J]. Financial Computer of China, 2005,(3): 44-47.
|
[7] |
喻炜, 王建东 . 基于交易网络特征向量中心度量的可疑洗钱识别系统[J]. 计算机应用, 2009,29(9): 2581-2585.
|
|
YU Y , WANG J D . Suspicious money laundering detection system based on eigenvector centrality measure of transaction network[J]. Journal of Computer Applications, 2009,29(9): 2581-2585.
|
[8] |
孙景, 陈婧, 万红 . 基于复杂网络的可疑金融交易识别研究[J]. 数字技术与应用, 2013,4(149): 206-207.
|
|
SUN J , CHEN J , WAN H . Research on suspicious financial transaction identification based on complex network[J]. Digital Technology and Application, 2013,4(149): 206-207.
|
[9] |
刘丽芳, 陶文立, 陈延妙 . 拓扑工具在反洗钱关联账户资金流分析中的运用[J]. 福建金融, 2013,2: 39-44.
|
|
LIU L F , TAO W L , CHEN Y M . Application of topology tools in analysis of fund flow of anti-money laundering related accounts[J]. Fujian Finance, 2013,2: 39-44.
|
[10] |
WANG S N , YANG J G . A money laundering risk evaluation method based on decision tree[C]// International Conference on Machine Learning and Cybernetics. 2007.
|
[11] |
LIU Y , . Based on social network crime organization relation mining and central figure determining[C]// IEEE 3rd International Conference on Software Engineering and Service Science. Beijing,China, 2012.
|
[12] |
李艳丽, 刘阳, 谢文波 ,等. 大数据发现非法传销网络[J]. 大数据, 2017,3(5): 106-112.
|
|
LI Y L , LIU Y , XIE W B ,et al. Detecting illegal pyramid scheme network in big data[J]. Big Data, 2017,3(5): 106-112.
|