A Fraud Detection System for Real-time Messaging Communication on Android Facebook Messenger
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2015|
|Graduation Academic Year:||103|
|Keywords (in Chinese):||詐騙偵測 、潛在語意模型 、餘弦相似度|
|Keywords (in other languages):||Fraud Detection, Latent Semantic Analysis, Cosine Similarity|
|Reference times:||Clicks: 68 Downloads: 9|
|School Collection Retrieve National Library Collection Retrieve Error Report|
Recently, the popularity rate of the smartphone usage has rapidly risen. There is a variety of mobile applications which are developed, such as “Facebook”, “Line”, “WeChat”, etc. The applications not only make people communicate with each other more easily, but also help humans reduce extra fee of calling or sending short messages. However, when we enjoy the convenience of the smartphone, many potential risks will appear at the same time. For example, some of high risk permissions would let your personal privacy information be exposed. In Taiwan, fraudsters also use the applications as a fraud tool to complete their purpose of crime.
In this paper, we develop a fraud detection system of communications to solve the fraud problems. We use some technologies to process input data and verify feasibility of the fraud detection system, such as natural language processing, matrix processing, latent semantic analysis and cosine similarity. Then, we collect some news and cases about fraud event as training data for our fraud detection system and intercept the real-time message chat logs from “Facebook Messenger” as testing data. Finally, we develop a mobile application to warn the user whether the real-time message chat logs are fraud event or not.
 Y. Kou, C. T. Lu, S. Sirwongwattana and Y. P. Huang, “Survey of fraud detection techniques,” 2004 IEEE international conference on Networking, sensing and control, vol. 2, pp. 749-754, 2004.
 W. Lee and K. W. Mok, “Adaptive intrusion detection: a data mining approach,” Artificial Intelligence Review, vol. 14, no. 6, pp. 533-567, 2000.
 M. H. Cahill, D. Lambert, J. C. Pinheiro and D. X. Sun, “Detecting fraud in the real world,” Handbook of massive data sets, pp. 911-929, 2002.
 J. B. S. Freeman, A. Bivens and B. Szymanski, “Host-based intrusion detection using user signatures,” Graduate Research Conference, 2002.
 S. C. Deerwester, S. T. Dumais, T. K. Landauer, G. W. Furnas and R. A. Harsh-man, “Indexing by Latent Semantic Analysis,” American Society for Information Science, vol. 41, no. 6, pp 391-407, 1990b.
 C. D. Manning, P. Raghavan and H. Schütze, “Introduction to information retrieval,” Cambridge: Cambridge university press, 2008.
 G. Cosma and M. Joy, “An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis,” Institute of Electrical and Electronics Engineers Transactions on Computers, vol. 61, no. 3, pp. 379-394, 2012.
 N. Evangelopoulos, X. Zhang, and V. R. Prybutok, “Latent Semantic Analysis: Five Methodological Recommendations,” European Journal of Information Sys-tems, vol. 21, no. 1, pp. 70-86, 2010.
 T. K. Landauer, D. S. McNamara, S. Dennis and W. Kintsch, Handbook of Latent Semantic Analysis, Psychology Press, 2013.
 F.-F. Kuo, M.-K. Shan, and S.-Y. Lee, “Background Music Recommendation for Video Based on Multimodal Latent Semantic Analysis,” 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2013.
 R. Klein, A. Kyrilov and M. Tokman, “Automated Assessment of Short Free-Text Responses in Computer Science using Latent Semantic Analysis,” in Proceedings of the 16th annual joint conference on innovation and technology in computer science education, ACM, pp. 158-162, 2011.
 M. C. Lintean, C. Moldovan, V. Rus and D. S. McNamara, “The Role of Local and Global Weighting in Assessing the Semantic Similarity of Texts Using Latent Semantic Analysis,” FLAIRS Conference, pp. 235-240, 2010.
 M. G. Ozsoy, F. N. Alpaslan and I. Cicekli, “Text summarization using Latent Semantic Analysis,” Journal of Information Science, vol. 37, no. 4, pp. 405-417, 2011.
 C.-J. Luh, S.-A. Yang and D. T.-L. Huang, “Estimating Search Engine Ranking Function with Latent Semantic Analysis and a Genetic Algorithm,” in Proceed-ings of the 2012 3rd International Conference on E-Business and E-Government-Volume 04, IEEE Computer Society, pp. 439-442, 2012.
 P. Y. Hui and H. Y. Meng, “Latent Semantic Analysis for Multimodal User Input With Speech and Gestures,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 2, pp. 417-429, 2014.
 T. Hofmann, “Probabilistic latent semantic analysis,” in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, ACM, pp. 289-296, 1999.
 J. Zhang and S. Gong, “Action Categorization by Structural Probabilistic Latent Semantic Analysis,” Computer Vision and Image Understanding, vol. 114, no. 8, pp. 857-864, 2010.
 C. Shen, T. Li and C. H. Ding, “Integrating Clustering and Multi-Document Summarization by Bi-Mixture Probabilistic Latent Semantic Analysis (PLSA) with Sentence Bases,” Association for the Advancement of Artiﬁcial Intelligence, pp. 914-920, 2011.
 E. C. Su, J.-M. Chang, C.-W. Cheng, T.-Y. Sung, and W.-L. Hsu, “Prediction of nuclear proteins using nuclear translocation signals proposed by probabilistic la-tent semantic indexing,” BMC bioinformatics (13:S17-S13), pp. 1-10, 2012.
 Y. Wen, C. Zou and J. Liu, “Probabilistic latent semantic analysis for sketch-based 3D model retrieval," 2014 4th IEEE International Conference on Information Science and Technology (ICIST), pp. 594-597, 2014.
 D. M. Blei, A. Y. Ng and M. I. Jordan, “Latent Dirichlet Allocation,” the Journal of machine Learning research, vol. 3, pp. 993-1022, 2003.
 A. Bhardwaj, M. Reddy, S. Setlur, V. Govindaraju and S. Ramachandrula, “Latent Dirichlet Allocation Based Writer Identification in Offline Handwriting,” in Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, ACM, pp. 357-362, 2010.
 J. C. Niebles, H. Wang, and L. Fei-Fei, “Unsupervised learning of human action categories using spatial-temporal words,” International journal of computer vision, vol. 79, no. 3, pp. 299-318, 2008.
 J. Caol, J. Li, Y. Zhang and S. Tang, “LDA-Based Retrieval Framework for Semantic News Video Retrieval,” 2007 IEEE International Conference on Semantic Computing (ICSC), pp. 155-160, 2007.
 M. Juneja, A. Vedaldi, C. Jawahar and A. Zisserman, “Blocks that Shout: Distinctive Parts for Scene Classification,” 2013 IEEE Conference on Computer Vi-sion and Pattern Recognition (CVPR), pp. 924-930, 2013.
 T. Pang-Ning, M. Steinbach and V. Kumar, “Introduction to data mining,” Library of Congress, 2006.
 A. Singhal, “Modern information retrieval: A brief overview,” IEEE Data Eng. Bull, vol. 24, no. 4, pp. 35-43, 2001.
 V. Thada and D. V. Jaglan, “Comparison of Jaccard, Dice, Cosine Similarity Coefficient To Find Best Fitness Value for Web Retrieved Documents Using Genet-ic Algorithm,” International Journal of Innovations in Engineering and Technology, 2013.