{"id":"https://openalex.org/W2792644378","doi":"https://doi.org/10.1109/globalsip.2017.8309077","title":"Participatory detection of identity theft on mobile social platforms","display_name":"Participatory detection of identity theft on mobile social platforms","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2792644378","doi":"https://doi.org/10.1109/globalsip.2017.8309077","mag":"2792644378"},"language":"en","primary_location":{"id":"doi:10.1109/globalsip.2017.8309077","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2017.8309077","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012392280","display_name":"Philip A. K. Lorimer","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Philip A. K. Lorimer","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060039915","display_name":"Victor Ming-Fai Diec","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor Ming-Fai Diec","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003131477","display_name":"Burak Kantarc\u0131","orcid":"https://orcid.org/0000-0003-0220-7956"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Burak Kantarci","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012392280"],"corresponding_institution_ids":["https://openalex.org/I153718931"],"apc_list":null,"apc_paid":null,"fwci":0.9673,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84449748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"833","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7589919567108154},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6470195055007935},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5766765475273132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4890943169593811},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4759345054626465},{"id":"https://openalex.org/keywords/participatory-sensing","display_name":"Participatory sensing","score":0.4665621817111969},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.45381611585617065},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.45234501361846924},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.43872249126434326},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.4190685749053955},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4100413918495178},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28679949045181274},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.27091100811958313},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.24436724185943604},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.2435271441936493},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.23787909746170044},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23209676146507263},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1680401861667633}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7589919567108154},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6470195055007935},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5766765475273132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4890943169593811},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4759345054626465},{"id":"https://openalex.org/C2779208394","wikidata":"https://www.wikidata.org/wiki/Q7140460","display_name":"Participatory sensing","level":2,"score":0.4665621817111969},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.45381611585617065},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.45234501361846924},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.43872249126434326},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.4190685749053955},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4100413918495178},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28679949045181274},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27091100811958313},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.24436724185943604},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.2435271441936493},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.23787909746170044},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23209676146507263},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1680401861667633},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globalsip.2017.8309077","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2017.8309077","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1587157779","https://openalex.org/W1892874464","https://openalex.org/W1965068054","https://openalex.org/W2042740312","https://openalex.org/W2046347669","https://openalex.org/W2064490680","https://openalex.org/W2221311656","https://openalex.org/W2230089931","https://openalex.org/W2397135192","https://openalex.org/W2416111155","https://openalex.org/W2475143668","https://openalex.org/W2503906172","https://openalex.org/W2512166535","https://openalex.org/W2520341794","https://openalex.org/W2527365741","https://openalex.org/W2574953090","https://openalex.org/W2578533030","https://openalex.org/W2578866465","https://openalex.org/W4246165039","https://openalex.org/W6711907643"],"related_works":["https://openalex.org/W2340192855","https://openalex.org/W2741062270","https://openalex.org/W2326507185","https://openalex.org/W2165491783","https://openalex.org/W2783409857","https://openalex.org/W2318209665","https://openalex.org/W2033638097","https://openalex.org/W2063769785","https://openalex.org/W3132838512","https://openalex.org/W2003376982"],"abstract_inverted_index":{"Popularity":[0],"of":[1,9,21,45,64,71,92,105,115,127,188],"smart":[2],"devices":[3],"has":[4],"led":[5],"to":[6,27,42,61,122],"increasing":[7],"use":[8],"social":[10,22,73,79,96,120,129,147],"networking":[11,97],"services":[12,24],"for":[13,89],"various":[14],"purposes.":[15],"Despite":[16],"its":[17],"benefits,":[18],"the":[19,38,43,69,102,106,113,125,138,146,168,185,189],"ubiquity":[20],"network":[23,80],"introduces":[25],"vulnerabilities":[26],"malicious":[28],"behavior":[29,144],"such":[30],"as":[31],"Sybil":[32],"attacks":[33],"or":[34],"identity":[35,93],"theft.":[36],"As":[37],"5G":[39],"Era":[40],"leads":[41],"convergence":[44],"social,":[46],"wireless,":[47],"and":[48,77],"mobile":[49,65,76,186],"networks":[50],"by":[51,149,184],"enabling":[52],"synergistic":[53],"interplay":[54],"between":[55],"these":[56],"networks,":[57],"it":[58],"is":[59,176],"possible":[60],"take":[62],"advantage":[63],"edge":[66],"computing":[67,103],"in":[68,75,118,145,172],"detection":[70,91],"compromised":[72,179],"profiles":[74],"online":[78],"platforms.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85,135],"propose":[86],"a":[87,116,119,128,132,155,173],"framework":[88,111,140],"participatory":[90],"theft":[94],"on":[95,124,154],"platforms":[98,187],"which":[99],"would":[100],"exploit":[101],"power":[104],"user":[107,117],"equipment.":[108],"The":[109],"proposed":[110,139],"empowers":[112],"connections":[114,190],"platform":[121],"cooperate":[123],"verification":[126],"profile.":[130],"Through":[131],"proof-of-concept":[133],"study,":[134],"show":[136,165],"that":[137,166],"can":[141,181],"detect":[142],"anomalous":[143],"profile":[148],"having":[150],"each":[151],"connection":[152],"work":[153],"different":[156],"feature":[157],"subset":[158],"without":[159,191],"semantic":[160],"analysis.":[161],"Our":[162],"numerical":[163],"results":[164],"if":[167],"initial":[169],"matching":[170],"threshold":[171],"decision":[174],"tree":[175],"set":[177],"properly,":[178],"accounts":[180],"be":[182],"identified":[183],"undergoing":[192],"heavy":[193],"central":[194],"processing.":[195]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
