نتایج جستجو برای: fake
تعداد نتایج: 5746 فیلتر نتایج به سال:
Consumer reviews are now part of everyday decision-making. Yet, the credibility of these reviews is fundamentally undermined when businesses commit review fraud, creating fake reviews for themselves or their competitors. We investigate the economic incentives to commit review fraud on the popular review platform Yelp, using two complementary approaches and datasets. We begin by analyzing restau...
1.1. A fake projective plane is a smooth compact complex surface which is not the complex projective plane but has the same Betti numbers as the complex projective plane. Such a surface is known to be projective algebraic and it is the quotient of the (open) unit ball B in C (B is the symmetric space of PU(2, 1)) by a torsion-free cocompact discrete subgroup of PU(2, 1) whose Euler-Poincaré cha...
In our daily life, fake reviews to restaurants on e-commerce website have some great affects to the choice of consumers. By categorizing the set of fake reviews, we have found that fake reviews from hype make up the largest part, and this type of review always mislead consumers. This article analyzed all the characteristics of fake reviews of hype and find that the text of the review always tel...
A key tool for investigating body ownership is the rubber hand illusion, in which synchronous multisensory feedback can induce feelings of ownership over a fake hand. Much research in the field aims to tease apart the mechanisms that underlie this phenomenon. Currently there is conflicting evidence as to whether increasing the distance between the real and fake hands (within reaching space) can...
This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending Bianchi’s model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput...
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید