[1] 王琢, 李准, 徐野, 等. 基于评论图的虚假产品评论人的检测[J]. 计算机科学, 2014, 41(10):295-299, 305. (WANG Z, LI Z, XU Y, et al. Detecting product review spammers based on review graphs[J]. Computer Science, 2014, 41(10):295-299, 305.) [2] 李雨桥, 符红光. 基于社交图谱模型的虚假评论识别[J]. 计算机应用, 2014, 34(S2):151-153. (LI Y Q, FU H G. Fake comments recognition based on social network graph model[J]. Journal of Computer Applications, 2014, 34(S2):151-153.) [3] XIAO C, FREEMAN D M, HWA T. Detecting clusters of fake accounts in online social networks[C]//Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. New York:ACM, 2015:91-101. [4] 任亚峰, 姬东鸿, 张红斌, 等. 基于PU学习算法的虚假评论识别研究[J]. 计算机研究与发展, 2015, 52(3):639-648. (REN Y F, JI D H, ZHANG H B, et al. Deceptive reviews detection based on positive and unlabeled learning[J]. Journal of Computer Research and Development, 2015, 52(3):639-648.) [5] 段大高, 盖新新, 韩忠明, 等. 基于梯度提升决策树的微博虚假消息检测[J]. 计算机应用, 2018, 38(2):410-414. (DUAN D G, GAI X X, HAN Z M, et al. Micro-blog misinformation detection based on gradient boost decision tree[J]. Journal of Computer Applications, 2018, 38(2):410-414.) [6] SHU K, SLIVA A, WANG S, et al. Fake news detection on social media:a data mining perspective[J]. ACM SIGKDD Explorations Newsletter, 2017, 19(1):22-36. [7] SINGH N, SHARMA T, THAKRAL A, et al. Detection of fake profile in online social networks using machine learning[C]//Proceedings of the 2018 International Conference on Advances in Computing and Communication Engineering. Piscataway:IEEE, 2018:231-234. [8] 李璐旸, 秦兵, 刘挺. 虚假评论检测研究综述[J]. 计算机学报, 2018, 41(4):946-968. (LI L Y, QIN B, LIU T. Survey on fake review detection research[J]. Chinese Journal of Computers, 2018, 41(4):946-968.) [9] 李素君, 周波清, 羊四清. 传感器网络中鲁棒性虚假数据过滤方案[J]. 计算机工程与应用, 2012, 48(35):67-70, 232. (LI S J, ZHOU B Q, YANG S Q. Robust filtering false data scheme in sensor networks[J]. Computer Engineering and Applications, 2012, 48(35):67-70, 232.) [10] 曹燕华, 章志明, 余敏. 基于信任管理机制的无线传感器网络虚假数据过滤方案[J]. 计算机应用, 2014, 34(6):1567-1572. (CAO Y H, ZHANG Z M, YU M. False data filtering scheme based on trust management mechanism in wireless sensor networks[J]. Journal of Computer Applications, 2014, 34(6):1567-1572.) [11] 刘志雄, 黎梨苗. 传感器网络中一种基于双重认证的虚假数据过滤方案[J]. 小型微型计算机系统, 2018, 39(6):1276-1280. (LIU Z X, LI L M. Dual authentication based false report filtering in sensor networks[J]. Journal of Chinese Computer Systems, 2018, 39(6):1276-1280.) [12] ASHOK A, GOVINDARASU M, AJJARAPU V. Online detection of stealthy false data injection attacks in power system state estimation[J]. IEEE Transactions on Smart Grid, 2018, 9(3):1636-1646. [13] KHALAF M, YOUSSEF A, EL-SAADANY E. Detection of false data injection in automatic generation control systems using Kalman filter[C]//Proceedings of the 2007 IEEE Electrical Power and Energy Conference. Piscataway:IEEE, 2017:1-6. [14] 杨斌, 陆余良, 杨国正, 等. 一种基于聚类的路径伪造检测方法[J]. 计算机科学, 2014, 41(8):158-163. (YANG B, LU Y L, YANG G Z, et al, Path forging detection approach based on aggregation[J]. Computer Science, 2014, 41(8):158-163.) [15] VIGNESHWARAN S, SURESH M, MEENAKUMARI R. An SVM based statistical image quality assessment for fake biometric detection[J]. International Journal for Trends in Engineering & Technology, 2015, 4(1):5-12. [16] 操文成. 语音伪造盲检测技术研究[D]. 成都:西南交通大学, 2017:1-38. (CAO W C. Research on blind speech forgery detection technology[D]. Chengdu:Southwest Jiaotong University, 2017:1-38.) [17] GALBALLY J, MARCEL S, FIERREZ J. Image quality assessment for fake biometric detection:application to iris, fingerprint, and face recognition[J]. IEEE Transactions on Image Processing, 2014, 23(2):710-724. [18] KULKARNI N A, SANKPAL L J. Efficient approach determination for fake biometric detection[C]//Proceedings of the 2017 International Conference on Computing, Communication, Control and Automation. Piscataway:IEEE, 2017:1-4. [19] USGS water data support team. USGS water data for the nation help[EB/OL].[2018-10-9]. https://www.usgs.gov/products/data-and-tools/real-time-dat. |