You are currently viewing a new version of our website. To view the old version click .

36 Results Found

  • Article
  • Open Access
9 Citations
5,789 Views
13 Pages

14 May 2014

Online auctions attract not only legitimate businesses trying to sell their products but also fraudsters wishing to commit fraudulent transactions. Consequently, fraudster detection is crucial to ensure the continued success of online auctions. This...

  • Article
  • Open Access
3 Citations
4,767 Views
14 Pages

26 December 2015

Online auction websites use a simple reputation system to help their users to evaluate the trustworthiness of sellers and buyers. However, to improve their reputation in the reputation system, fraudulent users can easily deceive the reputation system...

  • Article
  • Open Access
13 Citations
4,268 Views
16 Pages

Mining Mobile Network Fraudsters with Augmented Graph Neural Networks

  • Xinxin Hu,
  • Haotian Chen,
  • Hongchang Chen,
  • Xing Li,
  • Junjie Zhang and
  • Shuxin Liu

11 January 2023

With the rapid evolution of mobile communication networks, the number of subscribers and their communication practices is increasing dramatically worldwide. However, fraudsters are also sniffing out the benefits. Detecting fraudsters from the massive...

  • Article
  • Open Access
5,004 Views
14 Pages

5 July 2017

With a privacy-aware reputation system, an auction website allows the buyer in a transaction to hide his/her identity from the public for privacy protection. However, fraudsters can also take advantage of this buyer-anonymized function to hide the co...

  • Article
  • Open Access
7 Citations
3,581 Views
11 Pages

30 July 2021

The goal of our research was to assess whether the observation about deceptive texts having a lower positive tone than truthful ones in terms of sentiment could become operative and be used for building a classifier in the particular case of fraudste...

  • Article
  • Open Access
7 Citations
4,219 Views
28 Pages

Need-Based and Optimized Health Insurance Package Using Clustering Algorithm

  • Irum Matloob,
  • Shoab Ahmad Khan,
  • Farhan Hussain,
  • Wasi Haider Butt,
  • Rukaiya Rukaiya and
  • Fatima Khalique

13 September 2021

The paper presents a novel methodology based on machine learning to optimize medical benefits in healthcare settings, i.e., corporate, private, public or statutory. The optimization is applied to design healthcare insurance packages based on the empl...

  • Article
  • Open Access
19 Citations
4,056 Views
16 Pages

13 April 2021

Fraud can happen to any food business, but some sectors show more historical evidence of food fraud than others. This may be due to particular company characteristics that affect a company’s level of vulnerability. In the current study, we examined t...

  • Article
  • Open Access
4 Citations
5,534 Views
15 Pages

Online frauds have pernicious impacts on different system domains, including waste management systems. Fraudsters illegally obtain rewards for their recycling activities or avoid penalties for those who are required to recycle their own waste. Althou...

  • Article
  • Open Access
44 Citations
5,881 Views
19 Pages

An Efficient Boosted C5.0 Decision-Tree-Based Classification Approach for Detecting Non-Technical Losses in Power Utilities

  • Muhammad Salman Saeed,
  • Mohd Wazir Mustafa,
  • Usman Ullah Sheikh,
  • Touqeer Ahmed Jumani,
  • Ilyas Khan,
  • Samer Atawneh and
  • Nawaf N. Hamadneh

23 June 2020

Electricity fraud in billing are the primary concerns for Distribution System Operators (DSO). It is estimated that billions of dollars are wasted annually due to these illegal activities. DSOs around the world, especially in underdeveloped countries...

  • Article
  • Open Access
1 Citations
3,275 Views
13 Pages

STALITA: Innovative Platform for Bank Transactions Analysis

  • David Jesenko,
  • Štefan Kohek,
  • Borut Žalik,
  • Matej Brumen,
  • Domen Kavran,
  • Niko Lukač,
  • Andrej Živec and
  • Aleksander Pur

6 December 2022

Acts of fraud have become much more prevalent in the financial industry with the rise of technology and the continued economic growth in modern society. Fraudsters are evolving their approaches continuously to exploit the vulnerabilities of the curre...

  • Article
  • Open Access
1 Citations
2,109 Views
12 Pages

7 December 2022

Cybersecurity companies from around the world use state-of-the-art technology to provide the best protection against malicious software. Recent times have seen behavioral biometry becoming one of the most popular and widely used components in MFA (Mu...

  • Article
  • Open Access
12 Citations
2,792 Views
16 Pages

30 May 2022

Several approaches have been proposed to detect any malicious manipulation caused by electricity fraudsters. Some of the significant approaches are Machine Learning algorithms and data-based methods that have shown advantages compared to the traditio...

  • Article
  • Open Access
1 Citations
4,694 Views
14 Pages

This study examines some of the documentation tools and techniques that forensic accountants, internal auditors, external auditors, and others can use to document accounting and financial reporting systems under investigation. While prior research ha...

  • Article
  • Open Access
9 Citations
3,471 Views
15 Pages

Identifying Irregular Financial Operations Using Accountant Comments and Natural Language Processing Techniques

  • Vytautas Rudžionis,
  • Audrius Lopata,
  • Saulius Gudas,
  • Rimantas Butleris,
  • Ilona Veitaitė,
  • Darius Dilijonas,
  • Evaldas Grišius,
  • Maarten Zwitserloot and
  • Kristina Rudzioniene

26 August 2022

Finding not typical financial operations is a complicated task. The difficulties arise not only due to the sophisticated actions of fraudsters but also because of the large number of financial operations performed by business companies. This is espec...

  • Review
  • Open Access
5 Citations
2,914 Views
13 Pages

14 November 2022

The possibilities and reach of social networks are increasing, designs are becoming more diverse, and ideas more visionary. Most recently, the former company “Facebook” announced the creation of a metaverse. With these technical possibili...

  • Article
  • Open Access
2 Citations
5,081 Views
18 Pages

Using Process Mining to Reduce Fraud in Digital Onboarding

  • Matheus Camilo da Silva,
  • Gabriel Marques Tavares,
  • Marcos Cesar Gritti,
  • Paolo Ceravolo and
  • Sylvio Barbon Junior

28 February 2023

In the context of online banking, new users have to register their information to become clients through mobile applications; this process is called digital onboarding. Fraudsters often commit identity fraud by impersonating other people to obtain ac...

  • Article
  • Open Access
3 Citations
3,620 Views
15 Pages

Food Fraud Vulnerability Assessment in the Chinese Baijiu Supply Chain

  • Yiqin Wang,
  • Jiali Liu,
  • Yanling Xiong,
  • Xuefan Liu and
  • Xiaowei Wen

23 January 2023

As a representative of Chinese alcoholic drinks, baijiu has developed into a mass-consumption commodity. Its simple industrial chain makes it a suitable target for fraudsters. In order to understand the differences and potential factors of fraud vuln...

  • Article
  • Open Access
28 Citations
4,832 Views
11 Pages

14 February 2020

Organic foods are frequently targeted by fraudsters. Examination of underlying factors helps to reduce fraud vulnerability and to prevent fraud. In this study, the fraud vulnerability of five actors from each of four chains were examined using the SS...

  • Article
  • Open Access
78 Citations
7,918 Views
16 Pages

Ensemble Bagged Tree Based Classification for Reducing Non-Technical Losses in Multan Electric Power Company of Pakistan

  • Muhammad Salman Saeed,
  • Mohd Wazir Mustafa,
  • Usman Ullah Sheikh,
  • Touqeer Ahmed Jumani and
  • Nayyar Hussain Mirjat

Non-technical losses (NTLs) have been a major concern for power distribution companies (PDCs). Billions of dollars are lost each year due to fraud in billing, metering, and illegal consumer activities. Various studies have explored different methodol...

  • Article
  • Open Access
5 Citations
3,296 Views
20 Pages

Credit card fraud detection is a critical challenge in the financial sector due to the rapidly evolving tactics of fraudsters and the significant class imbalance betweenegitimate and fraudulent transactions. Traditional models, while effective to som...

  • Article
  • Open Access
1 Citations
4,975 Views
17 Pages

4 February 2023

The COVID-19 pandemic has provided a unique opportunity for fraudsters to innovatively swindle money through the trade of necessary goods and services. Although several incidents of financial fraud were reported during the pandemic, there is a lack o...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,606 Views
16 Pages

A Bellman–Ford Algorithm for the Path-Length-Weighted Distance in Graphs

  • Roger Arnau,
  • José M. Calabuig,
  • Luis M. García-Raffi,
  • Enrique A. Sánchez Pérez and
  • Sergi Sanjuan

22 August 2024

Consider a finite directed graph without cycles in which the arrows are weighted by positive weights. We present an algorithm for the computation of a new distance, called path-length-weighted distance, which has proven useful for graph analysis in t...

  • Article
  • Open Access
11 Citations
4,708 Views
16 Pages

Comparison of Targeted (HPLC) and Nontargeted (GC-MS and NMR) Approaches for the Detection of Undeclared Addition of Protein Hydrolysates in Turkey Breast Muscle

  • Liane Wagner,
  • Manuela Peukert,
  • Bertolt Kranz,
  • Natalie Gerhardt,
  • Sabine Andrée,
  • Ulrich Busch and
  • Dagmar Adeline Brüggemann

8 August 2020

The adulteration of fresh turkey meat by the undeclared addition of protein hydrolysates is of interest for fraudsters due to the increase of the economic gain by substituting meat with low cost ingredients. The aim of this study was to compare the s...

  • Article
  • Open Access
6 Citations
8,066 Views
16 Pages

13 March 2021

During the past decade, the technological advancement have allowed the gambling industry worldwide to deploy various platforms such as the web and mobile applications. Government agencies and local authorities have placed strict regulations regarding...

  • Feature Paper
  • Article
  • Open Access
424 Views
21 Pages

Mask Inflation Encoder and Quasi-Dynamic Thresholding Outlier Detection in Cellular Networks

  • Roland N. Mfondoum,
  • Nikol Gotseva,
  • Atanas Vlahov,
  • Antoni Ivanov,
  • Pavlina Koleva,
  • Vladimir Poulkov and
  • Agata Manolova

4 November 2025

Mobile networks have advanced significantly, providing high-throughput voice, video, and integrated data access to support connectivity through various services to facilitate high user density. This traffic growth has also increased the complexity of...

  • Article
  • Open Access
47 Citations
8,310 Views
25 Pages

Blockchain Adoption to Secure the Food Industry: Opportunities and Challenges

  • Sudeep Tanwar,
  • Akshay Parmar,
  • Aparna Kumari,
  • Nilesh Kumar Jadav,
  • Wei-Chiang Hong and
  • Ravi Sharma

8 June 2022

With the growth in food products’ usage, ensuring their quality and safety has become progressively difficult. Specifically, food traceability turns out to be a very critical task for retailers, sellers, consumers, surveillance authorities, and...

  • Article
  • Open Access
17 Citations
4,268 Views
15 Pages

Redefinition of the Mora Romagnola Pig Breed Herd Book Standard Based on DNA Markers Useful to Authenticate Its “Mono-Breed” Products: An Example of Sustainable Conservation of a Livestock Genetic Resource

  • Silvia Tinarelli,
  • Anisa Ribani,
  • Valerio Joe Utzeri,
  • Valeria Taurisano,
  • Claudio Bovo,
  • Stefania Dall’Olio,
  • Francesco Nen,
  • Samuele Bovo,
  • Giuseppina Schiavo and
  • Maurizio Gallo
  • + 1 author

18 February 2021

Mora Romagnola is an autochthonous pig breed, raised in the north of Italy. Mono-breed pork products of this breed are part of important niche value chain that is intrinsically linked to the conservation of this local genetic resources that can only...

  • Article
  • Open Access
11 Citations
5,998 Views
24 Pages

Achieving Excellence in Cyber Fraud Detection: A Hybrid ML+DL Ensemble Approach for Credit Cards

  • Eyad Btoush,
  • Xujuan Zhou,
  • Raj Gururajan,
  • Ka Ching Chan and
  • Omar Alsodi

22 January 2025

The rapid advancement of technology has increased the complexity of cyber fraud, presenting a growing challenge for the banking sector to efficiently detect fraudulent credit card transactions. Conventional detection approaches face challenges in ada...

  • Article
  • Open Access
24 Citations
6,061 Views
27 Pages

A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications

  • Priscila Morais Argôlo Bonfim Estrela,
  • Robson de Oliveira Albuquerque,
  • Dino Macedo Amaral,
  • William Ferreira Giozza and
  • Rafael Timóteo de Sousa Júnior

19 June 2021

As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authenticati...

  • Article
  • Open Access
11 Citations
4,233 Views
27 Pages

19 July 2024

This study addresses the critical challenge of data imbalance in credit card fraud detection (CCFD), a significant impediment to accurate and reliable fraud prediction models. Fraud detection (FD) is a complex problem due to the constantly evolving t...

  • Article
  • Open Access
4 Citations
2,860 Views
12 Pages

Multivariate Curve Resolution Methodology Applied to the ATR-FTIR Data for Adulteration Assessment of Virgin Coconut Oil

  • Michele De Luca,
  • Giuseppina Ioele,
  • Fedora Grande,
  • Maria Antonietta Occhiuzzi,
  • Martina Chieffallo,
  • Antonio Garofalo and
  • Gaetano Ragno

Virgin coconut oil (VCO) is a functional food with important health benefits. Its economic interest encourages fraudsters to deliberately adulterate VCO with cheap and low-quality vegetable oils for financial gain, causing health and safety problems...

  • Article
  • Open Access
1 Citations
1,671 Views
13 Pages

DART–Triple Quadrupole Mass Spectrometry Method for Multi-Target and Fast Detection of Adulterants in Saffron

  • Linda Monaci,
  • Anna Luparelli,
  • William Matteo Schirinzi,
  • Laura Quintieri and
  • Alexandre Verdu

Saffron is a high-cost spice due to the specific conditions for optimal growth and because of being harvested by hand. The massive income from commercializing saffron substituted with other plant parts or low-cost spices makes this spice the main tar...

  • Article
  • Open Access
1 Citations
3,245 Views
16 Pages

Abnormal Detection of Cash-Out Groups in IoT Based Payment

  • Hao Zhou,
  • Ming Zhang,
  • Lei Pang and
  • Jian-Hua Li

12 November 2021

With the rise of online/mobile transactions, the cost of cash-out has decreased and the cost of detection has increased. In the world of online/mobile payment in IoT, merchants and credit cards can be applied and approved online and used in the form...

  • Article
  • Open Access
16 Citations
18,924 Views
24 Pages

Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing...

  • Article
  • Open Access
649 Views
30 Pages

Interpretable Ensemble Learning Models for Credit Card Fraud Detection

  • Saria Iqbal,
  • Khalid Mahmood Awan,
  • Shahid Kamal and
  • Zahoor Ur Rehman

13 November 2025

With the growing advantages and conveniences provided by digital transactions, the financial sectors also face a loss of billions of dollars each year. While the use of credit cards has made life easier and convenient, it has also become a significan...

  • Abstract
  • Open Access
2 Citations
1,251 Views
2 Pages

20 August 2023

Food authenticity is becoming increasingly important to consumers, producers, and retailers. Furthermore, more and more food properties considered to be value-relevant are advertised. Food fraud, which is the intentional misrepresentation of a food&r...