نتایج جستجو برای: fake

تعداد نتایج: 5746  

2015
Albert Dipanda Richard Chbeir

Journal: :EJIS 2005
Richard J. Boland

Received: 3 October 2005 Accepted: 3 October 2005 One of my most memorable experiences with Claudio occured in Cleveland about 10 years ago. I was serving as department chair, and had organized a semester long research seminar, bringing one great scholar in for a full week, every week of the term. During their week in residence, the visitors would give two seminars and meet informally with facu...

Journal: :CoRR 2012
Ahmed Abbasi Zhu Zhang Hsinchun Chen

Existing fake website detection systems are unable to effectively detect fake websites. In this study, we advocate the development of fake website detection systems that employ classification methods grounded in statistical learning theory (SLT). Experimental results reveal that a prototype system developed using SLT-based methods outperforms seven existing fake website detection systems on a t...

2006
Eui Chul Lee Kang Ryoung Park Jaihie Kim

Fake iris detection is to detect and defeat a fake (forgery) iris image input. To solve the problems of previous researches on fake iris detection, we propose the new method of detecting fake iris attack based on the Purkinje image. Especially, we calculated the theoretical positions and distances between the Purkinje images based on the human eye model and the performance of fake detection alg...

Journal: :international journal of infection 0
viroj wiwanitkit hainan medical university, hainan, china; wiwanitkit house, bangkok, thailand; wiwanitkit house, bangkok, thailand.

Journal: :مطالعات حقوق خصوصی 0
حسن پوربافرانی استادیار گروه حقوق جزا دانشکدۀ علوم اداری و اقتصاد دانشگاه اصفهان حیدر منصوری کارشناس ارشد حقوق جزا و جرم شناسی دانشگاه اصفهان

lawgiver, for the purpose of penal supporting of national historical-cultural monuments, ratified repeated article 566 of islamic penal code in 1388; which demonstrates three actions of “making fake cases”, “introducing, carrying or storing” and “buying of historical-cultural monuments” as crimes. this criminalizing was necessary and advantageous, but the procedure of criminalizing has some wea...

2018
Zilong Zhao Jichang Zhao Yukie Sano Orr Levy Hideki Takayasu Misako Takayasu Daqing Li Shlomo Havlin

Social media can be a double-edged sword for modern communications, either a convenient channel exchanging ideas or an unexpected conduit circulating fake news through a large population. Existing studies of fake news focus on efforts on theoretical modelling of propagation or identification methods based on black-box machine learning, neglecting the possibility of identifying fake news using o...

Journal: :The Computer Science Journal of Moldova 2016
Nikolay A. Moldovyan Alexander A. Moldovyan Dmitriy N. Moldovyan Victor A. Shcherbacov

A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...

2011
Hossein Jahankhani Thulasirajh Jayaraveendran William Kapuku-Bwabw

Fake website pages use the similar page layout, font style and picture to mimic legitimate web pages in an effort to convince internet users to give their personal sensitive information such as bank account number, passwords, personal details etc and also sell fake products like fake ticket, duplicate brand cloths, medication etc. There are many available techniques in the market to identify th...

2007
Qinyuan Feng Yafei Dai

P2P file sharing systems often use incentive policies to encourage sharing. With the decrease of free riders, the amount of cheating behaviors has increased. Some users rename a common file with a popular name to attract the downloads of other users in order to gain unfair advantages from incentive policies. We call the renamed file a fake file. While techniques have been proposed to combat fak...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید