The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.展开更多
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho...Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.展开更多
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi...The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods.展开更多
This study aims to examine the relationship between audit committee attributes (audit committee independence, financial expertise, meeting frequency, gender diversity, and ethnic composition) and the propensity for ...This study aims to examine the relationship between audit committee attributes (audit committee independence, financial expertise, meeting frequency, gender diversity, and ethnic composition) and the propensity for fraudulent financial reporting. The sample includes 116 fraudulent and non-frandulent firms listed on Bursa Malaysia from 2005 to 2010. The finding of this study indicates that audit committee independence is positively associated with fraudulent financial reporting. The higher the proportion of independent or outside directors on the committee, the higher the possibility of financial fraud, and vice versa. The results also show that the expertise of members of the audit committee is negatively associated with corporate fraud. This suggests that when audit committee members are financially literate, they are more competent to curb fraudulent financial reporting. However, the findings for frequency of audit committee meetings, gender, and ethnicity show that there is no relationship between these variables and corporate fraud. The result of this study is robust after controlling for other firm-specific effects.展开更多
Public institutions are charged with the responsibility of providing essential services for the welfare of the citizens by manipulating the economy's financial flow through public expenditure, taxation, and so on. Th...Public institutions are charged with the responsibility of providing essential services for the welfare of the citizens by manipulating the economy's financial flow through public expenditure, taxation, and so on. The reliance on public institutions to provide public services in Nigeria has resulted in disappointing results, because chief executives of the institutions take less interest in the degree of its success, and this accounts for the high level of fraudulent practices in such institutions. This study, therefore, examined the relationship between forensic auditing and fraudulent practices in Nigerian public institutions. To achieve this purpose, some hypothetical statements were made and a review of relevant literature was explored. The population of the study consisted of the general managers and accountants of 12 public institutions in Nigeria. The data generated were statistically tested with the Pearson Product-Moment Correlation Coefficient. The findings suggest that both the proactive and reactive forensic auditing techniques have a negative significant relationship with fraudulent practices in Nigerian public institutions. Based on the above, it was recommended that: (1) The Economic and Financial Crime Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and other anti-corruption bodies in Nigeria should have, in their payroll, internal forensic auditors to supplement the duties of the internal auditors; (2) Forensic auditors should regularly undergo training and development programs to acquaint them with relevant knowledge and skills for effective forensic auditing; and (3) Forensic auditing should be made mandatory for public institutions by regulatory authorities rather than being voluntary.展开更多
This paper develops a hypothesis of the four factors from the cause of fraudulent financial reporting in terms of thoughts, culture, motive, opportunity and economic trade-off. Then tests whether independent directors...This paper develops a hypothesis of the four factors from the cause of fraudulent financial reporting in terms of thoughts, culture, motive, opportunity and economic trade-off. Then tests whether independent directors monitor and improve the quality of financial report on the basis of 1 170 firms in China by means of OLS regression. The evidence is consistent with the hypothesis.展开更多
With increasingly rampant telephone fraud activities,the social impact and economic losses caused to China have increased dramatically.Precise,convenient,and efficient fraudulent phone call recognition has become a ch...With increasingly rampant telephone fraud activities,the social impact and economic losses caused to China have increased dramatically.Precise,convenient,and efficient fraudulent phone call recognition has become a challenge since telephone fraud became more varied and covert.To deal with this problem,many researchers have extracted some statistical features of telephone fraud behavior and proposed some machine learning algorithms on the field of fraudulent phone call recognition.In this paper,the calling detail records are utilized to construct a classifier for fraudulent phone call recognition.Meantime,a deep learning approach based on convolutional neural network(CNN)is proposed for better features learning and compared with the existing state-of-the-art machine learning algorithms.It learns phone number and call behavior features of telephone fraud,and improves the accuracy of classification.The evaluation results show that the proposed algorithm outperforms competitive algorithms.展开更多
Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of inciden...Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC (Nuclear Regulatory Commission) since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (near field communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based equipment qualification management) system works with the support of legacy systems such as PMS (procurement management system) and FMS (facility management system).展开更多
基金supported by the National Social Science Fund of China(23BGL272)。
文摘The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.
基金funded by the National Natural Science Foundation of China under Grant No.62002103Henan Province Science Foundation for Youths No.222300420058+1 种基金Henan Province Science and Technology Research Project No.232102321064Teacher Education Curriculum Reform Research Priority Project No.2023-JSJYZD-011.
文摘Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.
基金supported by Zhejiang Provincial Natural Science Foundation of China(Grant No.LGF20G030001)Ministry of Public Security Science and Technology Plan Project(2022LL16)Key scientific research projects of agricultural and social development in Hangzhou in 2020(202004A06).
文摘The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods.
文摘This study aims to examine the relationship between audit committee attributes (audit committee independence, financial expertise, meeting frequency, gender diversity, and ethnic composition) and the propensity for fraudulent financial reporting. The sample includes 116 fraudulent and non-frandulent firms listed on Bursa Malaysia from 2005 to 2010. The finding of this study indicates that audit committee independence is positively associated with fraudulent financial reporting. The higher the proportion of independent or outside directors on the committee, the higher the possibility of financial fraud, and vice versa. The results also show that the expertise of members of the audit committee is negatively associated with corporate fraud. This suggests that when audit committee members are financially literate, they are more competent to curb fraudulent financial reporting. However, the findings for frequency of audit committee meetings, gender, and ethnicity show that there is no relationship between these variables and corporate fraud. The result of this study is robust after controlling for other firm-specific effects.
文摘Public institutions are charged with the responsibility of providing essential services for the welfare of the citizens by manipulating the economy's financial flow through public expenditure, taxation, and so on. The reliance on public institutions to provide public services in Nigeria has resulted in disappointing results, because chief executives of the institutions take less interest in the degree of its success, and this accounts for the high level of fraudulent practices in such institutions. This study, therefore, examined the relationship between forensic auditing and fraudulent practices in Nigerian public institutions. To achieve this purpose, some hypothetical statements were made and a review of relevant literature was explored. The population of the study consisted of the general managers and accountants of 12 public institutions in Nigeria. The data generated were statistically tested with the Pearson Product-Moment Correlation Coefficient. The findings suggest that both the proactive and reactive forensic auditing techniques have a negative significant relationship with fraudulent practices in Nigerian public institutions. Based on the above, it was recommended that: (1) The Economic and Financial Crime Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and other anti-corruption bodies in Nigeria should have, in their payroll, internal forensic auditors to supplement the duties of the internal auditors; (2) Forensic auditors should regularly undergo training and development programs to acquaint them with relevant knowledge and skills for effective forensic auditing; and (3) Forensic auditing should be made mandatory for public institutions by regulatory authorities rather than being voluntary.
文摘This paper develops a hypothesis of the four factors from the cause of fraudulent financial reporting in terms of thoughts, culture, motive, opportunity and economic trade-off. Then tests whether independent directors monitor and improve the quality of financial report on the basis of 1 170 firms in China by means of OLS regression. The evidence is consistent with the hypothesis.
基金the National Natural Science Foundation of China(No.61931019).
文摘With increasingly rampant telephone fraud activities,the social impact and economic losses caused to China have increased dramatically.Precise,convenient,and efficient fraudulent phone call recognition has become a challenge since telephone fraud became more varied and covert.To deal with this problem,many researchers have extracted some statistical features of telephone fraud behavior and proposed some machine learning algorithms on the field of fraudulent phone call recognition.In this paper,the calling detail records are utilized to construct a classifier for fraudulent phone call recognition.Meantime,a deep learning approach based on convolutional neural network(CNN)is proposed for better features learning and compared with the existing state-of-the-art machine learning algorithms.It learns phone number and call behavior features of telephone fraud,and improves the accuracy of classification.The evaluation results show that the proposed algorithm outperforms competitive algorithms.
文摘Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC (Nuclear Regulatory Commission) since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (near field communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based equipment qualification management) system works with the support of legacy systems such as PMS (procurement management system) and FMS (facility management system).