Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (5): 48-55.doi: 10.11959/j.issn.2096-109x.2019050
• Special Column: Routing Technology in Complex Network Environment • Previous Articles Next Articles
Fang LYU, Fenghe TANG, Junheng HUANG, Bailing WANG()
Revised:
2019-02-10
Online:
2019-10-15
Published:
2019-11-02
Supported by:
CLC Number:
Fang LYU, Fenghe TANG, Junheng HUANG, Bailing WANG. Frequent path discovery algorithm for financial network[J]. Chinese Journal of Network and Information Security, 2019, 5(5): 48-55.
[1] | YU H , KAMINSKY M , Gibbons P B ,et al. SybilGuard:defending against sybil attacks via social networks[J]. IEEE/ACM Transactions on Networking, 2008,16(3): 576-589. |
[2] | TRAN N , LI J , SUBRAMANIAN L ,et al. Optimal Sybil-resilient node admission control[C]// IEEE Infocom. 2015. |
[3] | YANG C , HARKREADER R , ZHANG J ,et al. Analyzing spammers' social networks for fun and profit:a case study of cyber criminal ecosystem on twitter[C]// International Conference on World Wide Web. 2012. |
[4] | 刘枭, 王晓国 . 基于概率图的银行电信诈骗检测方法[J]. 计算机科学, 2018,45(7): 122-128. |
LIU X , WANG X G . Probabilistic graphical model based approach for bank telecommunication fraud detection[J]. Computer Science, 2018,45(7): 122-128. | |
[5] | 丁濛濛 . 基于规则引擎的互联网金融反欺诈研究[J]. 电脑知识与技术, 2018,14(1): 1-3. |
DING M M . Internet finance anti-fraud research based on rule engine[J]. Computer Knowledge and Technology, 2018,14(1): 1-3. | |
[6] | 张成虎, 李时 . 基于 AI 技术的反洗钱系统设计[J]. 中国金融电脑, 2005,(3): 44-47. |
ZHANG C H , LI S . Design of anti-money laundering system based on AI technology[J]. Financial Computer of China, 2005,(3): 44-47. | |
[7] | 喻炜, 王建东 . 基于交易网络特征向量中心度量的可疑洗钱识别系统[J]. 计算机应用, 2009,29(9): 2581-2585. |
YU Y , WANG J D . Suspicious money laundering detection system based on eigenvector centrality measure of transaction network[J]. Journal of Computer Applications, 2009,29(9): 2581-2585. | |
[8] | 孙景, 陈婧, 万红 . 基于复杂网络的可疑金融交易识别研究[J]. 数字技术与应用, 2013,4(149): 206-207. |
SUN J , CHEN J , WAN H . Research on suspicious financial transaction identification based on complex network[J]. Digital Technology and Application, 2013,4(149): 206-207. | |
[9] | 刘丽芳, 陶文立, 陈延妙 . 拓扑工具在反洗钱关联账户资金流分析中的运用[J]. 福建金融, 2013,2: 39-44. |
LIU L F , TAO W L , CHEN Y M . Application of topology tools in analysis of fund flow of anti-money laundering related accounts[J]. Fujian Finance, 2013,2: 39-44. | |
[10] | WANG S N , YANG J G . A money laundering risk evaluation method based on decision tree[C]// International Conference on Machine Learning and Cybernetics. 2007. |
[11] | LIU Y , . Based on social network crime organization relation mining and central figure determining[C]// IEEE 3rd International Conference on Software Engineering and Service Science. Beijing,China, 2012. |
[12] | 李艳丽, 刘阳, 谢文波 ,等. 大数据发现非法传销网络[J]. 大数据, 2017,3(5): 106-112. |
LI Y L , LIU Y , XIE W B ,et al. Detecting illegal pyramid scheme network in big data[J]. Big Data, 2017,3(5): 106-112. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|