Skip to main content

Showing 1–8 of 8 results for author: Shehnepoor, S

Searching in archive cs. Search in all archives.
.
  1. Spatio-Temporal Graph Representation Learning for Fraudster Group Detection

    Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun

    Abstract: Motivated by potential financial gain, companies may hire fraudster groups to write fake reviews to either demote competitors or promote their own businesses. Such groups are considerably more successful in misleading customers, as people are more likely to be influenced by the opinion of a large group. To detect such groups, a common model is to represent fraudster groups' static networks, conseq… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

  2. arXiv:2111.05645  [pdf, other

    cs.LG cs.AI

    Social Fraud Detection Review: Methods, Challenges and Analysis

    Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun

    Abstract: Social reviews have dominated the web and become a plausible source of product information. People and businesses use such information for decision-making. Businesses also make use of social information to spread fake information using a single user, groups of users, or a bot trained to generate fraudulent content. Many studies proposed approaches based on user behaviors and review text to address… ▽ More

    Submitted 4 January, 2023; v1 submitted 10 November, 2021; originally announced November 2021.

  3. HIN-RNN: A Graph Representation Learning Neural Network for Fraudster Group Detection With No Handcrafted Features

    Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun

    Abstract: Social reviews are indispensable resources for modern consumers' decision making. For financial gain, companies pay fraudsters preferably in groups to demote or promote products and services since consumers are more likely to be misled by a large number of similar reviews from groups. Recent approaches on fraudster group detection employed handcrafted features of group behaviors without considerin… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

  4. arXiv:2006.06561  [pdf, other

    cs.LG cs.CR stat.ML

    ScoreGAN: A Fraud Review Detector based on Multi Task Learning of Regulated GAN with Data Augmentation

    Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun

    Abstract: The promising performance of Deep Neural Networks (DNNs) in text classification, has attracted researchers to use them for fraud review detection. However, the lack of trusted labeled data has limited the performance of the current solutions in detecting fraud reviews. The Generative Adversarial Network (GAN) as a semi-supervised method has demonstrated to be effective for data augmentation purpos… ▽ More

    Submitted 17 March, 2021; v1 submitted 11 June, 2020; originally announced June 2020.

  5. arXiv:2006.05718  [pdf, other

    cs.LG cs.SI

    DFraud3- Multi-Component Fraud Detection freeof Cold-start

    Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun

    Abstract: Fraud review detection is a hot research topic inrecent years. The Cold-start is a particularly new but significant problem referring to the failure of a detection system to recognize the authenticity of a new user. State-of-the-art solutions employ a translational knowledge graph embedding approach (TransE) to model the interaction of the components of a review system. However, these approaches s… ▽ More

    Submitted 11 June, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  6. arXiv:1910.13345  [pdf, other

    eess.AS cs.SD

    Replay Spoofing Countermeasure Using Autoencoder and Siamese Network on ASVspoof 2019 Challenge

    Authors: Mohammad Adiban, Hossein Sameti, Saeedreza Shehnepoor

    Abstract: Automatic Speaker Verification (ASV) is the process of identifying a person based on the voice presented to a system. Different synthetic approaches allow spoofing to deceive ASV systems (ASVs), whether using techniques to imitate a voice or recunstruct the features. Attackers try to beat up the ASVs using four general techniques; impersonation, speech synthesis, voice conversion, and replay. The… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

  7. arXiv:1904.11914  [pdf, other

    cs.LG cs.SD eess.AS stat.ML

    Statistical feature embedding for heart sound classification

    Authors: Mohammad Adiban, Bagher BabaAli, Saeedreza Shehnepoor

    Abstract: Cardiovascular Disease (CVD) is considered as one of the principal causes of death in the world. Over recent years, this field of study has attracted researchers' attention to investigate heart sounds' patterns for disease diagnostics. In this study, an approach is proposed for normal/abnormal heart sound classification on the Physionet challenge 2016 dataset. For the first time, a fixed-length fe… ▽ More

    Submitted 9 November, 2020; v1 submitted 26 April, 2019; originally announced April 2019.

    Journal ref: Journal of Electrical Engineering, 70(4), 259-272 (2019)

  8. arXiv:1703.03609  [pdf, other

    cs.SI cs.CL cs.IR physics.soc-ph

    NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

    Authors: Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh, Noel Crespi

    Abstract: Nowadays, a big part of people rely on available content in social media in their decisions (e.g. reviews and feedback on a topic or product). The possibility that anybody can leave a review provide a golden opportunity for spammers to write spam reviews about products and services for different interests. Identifying these spammers and the spam content is a hot topic of research and although a co… ▽ More

    Submitted 10 March, 2017; originally announced March 2017.