China has started restructuring its telecom industry to promote more competition and clear the way for issuing 3G licenses china’s largest mobile communications company,China Mobile Communications Corp.,announced on ...China has started restructuring its telecom industry to promote more competition and clear the way for issuing 3G licenses china’s largest mobile communications company,China Mobile Communications Corp.,announced on May 23 that it would acquire China Railway Communication Co.Ltd.,also展开更多
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac...The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks.展开更多
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.展开更多
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho...Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.展开更多
随着高速发展的互联网和移动通信在业务层面的逐渐融合,国内运营商所采用的"封闭花园"模式的业务架构已经面临各种挑战,因此需要更多地考虑如何有效引入互联网业务和服务模式,不断提升用户体验。在电信运营商逐步开放其电信能...随着高速发展的互联网和移动通信在业务层面的逐渐融合,国内运营商所采用的"封闭花园"模式的业务架构已经面临各种挑战,因此需要更多地考虑如何有效引入互联网业务和服务模式,不断提升用户体验。在电信运营商逐步开放其电信能力API的背景下,基于Mashup的业务构建模式,提出了一种云计算环境下的电信网络能力服务提供模式。该模式将Mashup的理念移植到电信能力上,并将电信能力封装成Web Element的形式呈现给用户,进一步提升了电信网络能力服务的抽象层次。这种电信能力应用模式打破了电信能力拘泥于手持终端的传统形式,提出了一种新的适合于Web2.0环境的电信网络能力服务提供模式。在"OMP(Open Mobile Internet Platform)应用运行和开发引擎算法及功能研发"项目中的试用证明了其可行性。展开更多
In order to study supply chain of the telecom value-added service,a multi-leaders and multi-followers Stackelberg game model with multiple telecom operators and multiple service providers whose income is composed of i...In order to study supply chain of the telecom value-added service,a multi-leaders and multi-followers Stackelberg game model with multiple telecom operators and multiple service providers whose income is composed of information fee division and advertisement was constructed.Then a demonstration was simulated,and the results were compared with the situation of service providers' income only from information fee division.The simulated and compared results indicate that,the enterprises in the supply chain have the nature of pursuing the maximum profits in capital markets;meanwhile,first-mover advantages and some enterprise can get more profits with the information asymmetry.展开更多
Single photon sources are key components for quantum technologies such as quantum communication, computing and metrology. A key challenge towards the realization of global quantum networks are transmission losses in o...Single photon sources are key components for quantum technologies such as quantum communication, computing and metrology. A key challenge towards the realization of global quantum networks are transmission losses in optical fibers. Therefore, single photon sources are required to emit at the low-loss telecom wavelength bands. However, an ideal telecom wavelength single photon source has yet to be discovered. Here, we review the recent progress in realizing such sources. We start with single photon emission based on atomic ensembles and spontaneous parametric down conversion, and then focus on solid-state emitters including semiconductor quantum dots, defects in silicon carbide and carbon nanotubes. In conclusion, some state-of-the-art applications are highlighted.展开更多
To analyze the positive influencing factors of Chinese telecom operators' EVA(Economic Value Added),this paper selects fifteen indicators based on the enterprise features of telecom operators and telecommunication...To analyze the positive influencing factors of Chinese telecom operators' EVA(Economic Value Added),this paper selects fifteen indicators based on the enterprise features of telecom operators and telecommunications industry characteristics,and then classifies these indicators into the following factors:operation scale,profitability,solvency and asset management ability by factor analysis.This paper also gives the priorities of these four factors by regression analysis,of which the operation scale is the most important factor.The research results point out a clear method for the telecom operatorsto increase their EVA in order to meet the performance appraisal from State-owned Assets Supervision and Administration Commission of the State Council.展开更多
Reference to the international cases and experiences of asymmetric regulation in telecommunications industry,based on China's legal environment and telecommunications competition in the market,give analysis to the...Reference to the international cases and experiences of asymmetric regulation in telecommunications industry,based on China's legal environment and telecommunications competition in the market,give analysis to the role of asymmetric regulation for the development of china telecommunications market,put forward feasible measures to asymmetric regulation in China.展开更多
The financial turbulence caused by the U.S.subprime crisis has a far-reaching impact on the global financial system and economic development.Based on an in-depth analysis of the cause of U.S.subprime crisis and its ef...The financial turbulence caused by the U.S.subprime crisis has a far-reaching impact on the global financial system and economic development.Based on an in-depth analysis of the cause of U.S.subprime crisis and its effects on China and global economy,in combi-nation with the current status of China's telecom sector,this article puts forward policy suggestions for the de-velopment and regulation of China's telecom sector.展开更多
The strategic value evaluation ofphysical channels is the main purpose of thispaper.To interpret this value,we refine finance,location and competition dimensions.Atotal of 166 social high-star channels are selected as...The strategic value evaluation ofphysical channels is the main purpose of thispaper.To interpret this value,we refine finance,location and competition dimensions.Atotal of 166 social high-star channels are selected as empirical samples.Practice showsthat all second-layer indicators can be quantified by information system or artificial collection.The weight of three first-layer indicatorscan be defined by correlation analysis.The valuecomprehensive ranking of the channels is clearbased on the first-layer and second-layer indicators.In the sample group in this study,theweight of location value is higher.The resultson channels' strategic value research may provide further insights on business value,servicevalue and other related fields.展开更多
文摘China has started restructuring its telecom industry to promote more competition and clear the way for issuing 3G licenses china’s largest mobile communications company,China Mobile Communications Corp.,announced on May 23 that it would acquire China Railway Communication Co.Ltd.,also
基金This research work has been conducted in cooperation with members of DETSI project supported by BPI France and Pays de Loire and Auvergne Rhone Alpes.
文摘The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks.
基金supported by the National Social Science Fund of China(23BGL272)。
文摘The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.
基金funded by the National Natural Science Foundation of China under Grant No.62002103Henan Province Science Foundation for Youths No.222300420058+1 种基金Henan Province Science and Technology Research Project No.232102321064Teacher Education Curriculum Reform Research Priority Project No.2023-JSJYZD-011.
文摘Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.
文摘随着高速发展的互联网和移动通信在业务层面的逐渐融合,国内运营商所采用的"封闭花园"模式的业务架构已经面临各种挑战,因此需要更多地考虑如何有效引入互联网业务和服务模式,不断提升用户体验。在电信运营商逐步开放其电信能力API的背景下,基于Mashup的业务构建模式,提出了一种云计算环境下的电信网络能力服务提供模式。该模式将Mashup的理念移植到电信能力上,并将电信能力封装成Web Element的形式呈现给用户,进一步提升了电信网络能力服务的抽象层次。这种电信能力应用模式打破了电信能力拘泥于手持终端的传统形式,提出了一种新的适合于Web2.0环境的电信网络能力服务提供模式。在"OMP(Open Mobile Internet Platform)应用运行和开发引擎算法及功能研发"项目中的试用证明了其可行性。
基金supported by Research Start Fund of Northwest A&F University and Youth Fund of Communication University of China under Grant No.XNG1035partly performed in the project"On-line Multi-attribute Procurement Auction Mechanism Design and Multi-agent System Implementation"supported by National Natural Science Foundation of China under Grant No.71001009
文摘In order to study supply chain of the telecom value-added service,a multi-leaders and multi-followers Stackelberg game model with multiple telecom operators and multiple service providers whose income is composed of information fee division and advertisement was constructed.Then a demonstration was simulated,and the results were compared with the situation of service providers' income only from information fee division.The simulated and compared results indicate that,the enterprises in the supply chain have the nature of pursuing the maximum profits in capital markets;meanwhile,first-mover advantages and some enterprise can get more profits with the information asymmetry.
基金financially supported by the ERC Starting Grant No.715770(QD-NOMS)the National Natural Science Foundation of China(No.61728501)
文摘Single photon sources are key components for quantum technologies such as quantum communication, computing and metrology. A key challenge towards the realization of global quantum networks are transmission losses in optical fibers. Therefore, single photon sources are required to emit at the low-loss telecom wavelength bands. However, an ideal telecom wavelength single photon source has yet to be discovered. Here, we review the recent progress in realizing such sources. We start with single photon emission based on atomic ensembles and spontaneous parametric down conversion, and then focus on solid-state emitters including semiconductor quantum dots, defects in silicon carbide and carbon nanotubes. In conclusion, some state-of-the-art applications are highlighted.
文摘To analyze the positive influencing factors of Chinese telecom operators' EVA(Economic Value Added),this paper selects fifteen indicators based on the enterprise features of telecom operators and telecommunications industry characteristics,and then classifies these indicators into the following factors:operation scale,profitability,solvency and asset management ability by factor analysis.This paper also gives the priorities of these four factors by regression analysis,of which the operation scale is the most important factor.The research results point out a clear method for the telecom operatorsto increase their EVA in order to meet the performance appraisal from State-owned Assets Supervision and Administration Commission of the State Council.
文摘Reference to the international cases and experiences of asymmetric regulation in telecommunications industry,based on China's legal environment and telecommunications competition in the market,give analysis to the role of asymmetric regulation for the development of china telecommunications market,put forward feasible measures to asymmetric regulation in China.
文摘The financial turbulence caused by the U.S.subprime crisis has a far-reaching impact on the global financial system and economic development.Based on an in-depth analysis of the cause of U.S.subprime crisis and its effects on China and global economy,in combi-nation with the current status of China's telecom sector,this article puts forward policy suggestions for the de-velopment and regulation of China's telecom sector.
基金supported in part by the Youth Innovation Fund of Beijing University of Posts and Telecommunications in 2012
文摘The strategic value evaluation ofphysical channels is the main purpose of thispaper.To interpret this value,we refine finance,location and competition dimensions.Atotal of 166 social high-star channels are selected as empirical samples.Practice showsthat all second-layer indicators can be quantified by information system or artificial collection.The weight of three first-layer indicatorscan be defined by correlation analysis.The valuecomprehensive ranking of the channels is clearbased on the first-layer and second-layer indicators.In the sample group in this study,theweight of location value is higher.The resultson channels' strategic value research may provide further insights on business value,servicevalue and other related fields.