Identifying the Fraudulent Users for E-commerce Applications Based on the Access Behaviors.
Rujia ChenYi XiePublished in: ICIC (LNAI 1) (2024)
Keyphrases
- multiple users
- information access
- electronic commerce
- user requests
- user access
- recommender systems
- user requirements
- easily accessible
- user experience
- user interaction
- access control
- collaborative filtering
- social media
- disseminate information
- single user
- transparent access
- mobile applications
- user centric
- user satisfaction
- user interface
- information overload
- exchange information
- social networks
- user model
- social network analysis
- novice users
- digital libraries