Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (4): 1309-1317.DOI: 10.11772/j.issn.1001-9081.2022040546
• Frontier and comprehensive applications • Previous Articles Next Articles
Yihan WANG, Chen TANG, Lan ZHANG()
Received:
2022-04-24
Revised:
2022-06-09
Accepted:
2022-06-13
Online:
2022-07-26
Published:
2023-04-10
Contact:
Lan ZHANG
About author:
WANG Yihan, born in 1998, M. S. candidate. Her research interests include right confirmation and traceability of data, blockchain application.Supported by:
通讯作者:
张兰
作者简介:
王亦涵(1998—),女,四川广元人,硕士研究生,主要研究方向:数据确权追溯、区块链应用;基金资助:
CLC Number:
Yihan WANG, Chen TANG, Lan ZHANG. Anti-fraud and anti-tampering online trading mechanism for bulk stock[J]. Journal of Computer Applications, 2023, 43(4): 1309-1317.
王亦涵, 唐晨, 张兰. 大宗商品防欺诈抗篡改线上交易机制[J]. 《计算机应用》唯一官方网站, 2023, 43(4): 1309-1317.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022040546
欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 |
---|---|---|---|
商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 |
商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 |
商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 |
Tab. 1 Details of frauds
欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 |
---|---|---|---|
商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 |
商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 |
商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 |
交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 |
---|---|---|---|---|
购买者下单 | ① | √ | ||
② | √ | |||
提供者发货 | ① | √ | ||
② | √ | |||
运输者运输 | ① | √ | √ | |
② | √ | |||
购买者收货 | ① | √ | √ | |
② |
Tab. 2 Stages and types of fraud
交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 |
---|---|---|---|---|
购买者下单 | ① | √ | ||
② | √ | |||
提供者发货 | ① | √ | ||
② | √ | |||
运输者运输 | ① | √ | √ | |
② | √ | |||
购买者收货 | ① | √ | √ | |
② |
偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|---|
0.1 | 0.2 | 242 | 120 | 120 | 100.00 |
0.5 | 1.0 | 44 | 120 | 120 | 100.00 |
1.0 | 2.0 | 22 | 120 | 116 | 96.70 |
2.0 | 4.0 | 11 | 75 | 24 | 32.00 |
3.0 | 6.0 | 6 | 100 | 0 | 0.00 |
Tab. 3 Test results of angle correction
偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|---|
0.1 | 0.2 | 242 | 120 | 120 | 100.00 |
0.5 | 1.0 | 44 | 120 | 120 | 100.00 |
1.0 | 2.0 | 22 | 120 | 116 | 96.70 |
2.0 | 4.0 | 11 | 75 | 24 | 32.00 |
3.0 | 6.0 | 6 | 100 | 0 | 0.00 |
组别 | 尺度 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|
1 | 300 | 257 | 85.67 | |
2 | 300 | 283 | 94.30 | |
3 | 300 | 230 | 76.67 |
Tab. 4 Test results of different scales
组别 | 尺度 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|
1 | 300 | 257 | 85.67 | |
2 | 300 | 283 | 94.30 | |
3 | 300 | 230 | 76.67 |
阶段 | 运行时间 |
---|---|
链下商品外观指纹提取 | 0.1 |
商品外观指纹核验合约 | 1.2 |
链下商品外观指纹比对 | 5.0 |
请求信息记录合约 | 2.0 |
用户可信度查询合约 | 0.3 |
Tab. 5 Running time of different stage
阶段 | 运行时间 |
---|---|
链下商品外观指纹提取 | 0.1 |
商品外观指纹核验合约 | 1.2 |
链下商品外观指纹比对 | 5.0 |
请求信息记录合约 | 2.0 |
用户可信度查询合约 | 0.3 |
1 | 杨璇. 我国大宗商品价格波动溢出效应研究——基于DAG和网络拓扑方法[D]. 广州:暨南大学, 2020:1. |
YANG X. Volatility spillover effects of commodity sectors in China — on DAG and network topologic analysis methods[D]. Guangzhou: Jinan University, 2020:1. | |
2 | 中国物流与采购联合会. 大宗商品电子交易规范: [S]. 北京: 中国标准出版社, 2003:1-16. (China Federation of Logistics & Purchasing. Bulk stock electronic transaction specification: [S]. Beijing: Standards Press of China, 2003:1-16) |
3 | 张武斌. ZC物流公司大宗商品物流服务质量提升策略研究[D]. 郑州:河南财经政法大学, 2020:2. |
ZHANG W B. Research on the strategy of ZC logistics company’s bulk commodity logistics service quality improvement[D]. Zhengzhou: Henan University of Economics and Law, 2020:2. | |
4 | LI X, HUANG G L, LI Q, et al. Detection and analysis of diamond fingerprinting feature and its application[J]. Journal of Physics: Conference Series, 2011, 277: No.012018. 10.1088/1742-6596/277/1/012018 |
5 | MOREIRA D, BHARATI A, BROGAN J, et al. Image provenance analysis at scale[J]. IEEE Transactions on Image Processing, 2018, 27(12): 6109-6123. 10.1109/tip.2018.2865674 |
6 | ARJOVSKY M, CHINTALA S, BOTTOU L. Wasserstein generative adversarial networks[C]// Proceedings of the 34th International Conference on Machine Learning. New York: JMLR.org, 2017: 214-223. |
7 | ALZAHRANI N, BULUSU N. Block-supply chain: a new anti-counterfeiting supply chain using NFC and block-chain[C]// Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. New York: ACM, 2018: 30-35. 10.1145/3211933.3211939 |
8 | CAO Y, JIA F, MANOGARAN G. Efficient traceability systems of steel products using blockchain-based industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9): 6004-6012. 10.1109/tii.2019.2942211 |
9 | TSAI Y S, CHEN R S, CHEN Y C, et al. An RFID-based manufacture process control and supply chain management in the semiconductor industry[J]. International Journal of Information Technology and Management, 2013, 12(1/2): 85-105. 10.1504/ijitm.2013.051633 |
10 | VUKATANA K, SEVRANI K, HOXHA E. Wine traceability: a data model and prototype in Albanian context[J]. Foods, 2016, 5(1): No.11. 10.3390/foods5010011 |
11 | 叶云,胡月明,赵小娟,等. 基于改进动态扩展和位置服务的农产品追溯系统优化[J]. 农业工程学报, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 |
YE Y, HU Y M, ZHAO X J, et al. Optimization for agricultural product traceability system based on dynamic expansion improvement and location based service[J]. Transaction of the Chinese Society of Agricultural Engineering, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 | |
12 | DENG J K, GUO J, XUE N N, et al. ArcFace: additive angular margin loss for deep face recognition[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 4685-4694. 10.1109/cvpr.2019.00482 |
13 | NG P C, HENIKOFF S. SIFT: predicting amino acid changes that affect protein function[J]. Nucleic Acids Research, 2003, 31(13): 3812-3814. 10.1093/nar/gkg509 |
14 | FENET S, RICHARD G, GRENIER Y. A scalable audio fingerprint method with robustness to pitch-shifting[C]// Proceedings of the 12th International Society for Music Information Retrieval Conference. [S.l.]: ISMIR, 2011:121-126. 10.1162/comj_r_00058 |
15 | LEE S, YOO C D. Robust video fingerprinting for content-based video identification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(7): 983-988. 10.1109/tcsvt.2008.920739 |
16 | HARRIS C, STEPHENS M. A combined corner and edge detector[C]// Proceedings of the 1988 Alvey Vision Conference. [S.l.]: Alvety Vision Club, 1988: No.23. 10.5244/c.2.23 |
17 | BAY H, TUYTELAARS T, van GOOL L. SURF: speeded up robust features[C]// Proceedings of the 2006 European Conference on Computer Vision, LNCS 3951. Berlin: Springer, 2006: 404-417. |
18 | GAO S H, CHENG M M, ZHAO K, et al. Res2Net: a new multi-scale backbone architecture[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 43(2): 652-662. 10.1109/tpami.2019.2938758 |
19 | DOSOVITSKIY A, BEYER L, KOLESNIKOV A, et al. An image is worth 16x16 words: Transformers for image recognition at scale[EB/OL]. (2021-06-03) [2022-03-22].. |
20 | BOCHKOVSKIY A, WANG C Y, LIAO H Y M. YOLOv4: optimal speed and accuracy of object detection[EB/OL]. (2020-04-23) [2022-03-20].. |
21 | LI Y J, CHEN Y C, JI X Y, et al. ScreenID: enhancing QRCode security by fingerprinting screens[C]// Proceedings of the 2021 IEEE Conference on Computer Communications. Piscataway: IEEE, 2021: 1-10. 10.1109/infocom42981.2021.9488859 |
22 | JING H, PINCHIN J, HILL C, et al. Wi-Fi fingerprinting based on collaborative confidence level training[J]. Pervasive and Mobile Computing, 2016, 30: 32-44. 10.1016/j.pmcj.2015.10.005 |
23 | PEI L, LIU J B, CHEN Y W, et al. Evaluation of fingerprinting-based WiFi indoor localization coexisted with Bluetooth[J]. The Journal of Global Positioning Systems, 2017, 15: No.3. 10.1186/s41445-017-0008-x |
24 | WU Y, AbdALMAGEED W, NATARAJAN P. ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 9535-9544. 10.1109/cvpr.2019.00977 |
25 | GKITSAS V, ZIOULIS N, ÁLVAREZ F, et al. Deep lighting environment map estimation from spherical panoramas[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2020: 2719-2728. 10.1109/cvprw50498.2020.00328 |
[1] | Juncheng TONG, Bo ZHAO. Review on blockchain smart contract vulnerability detection and automatic repair [J]. Journal of Computer Applications, 2023, 43(3): 785-793. |
[2] | Dong SUN, Biao WANG, Yun XU. Design and implementation of block transmission mechanism based on remote direct memory access [J]. Journal of Computer Applications, 2023, 43(2): 484-489. |
[3] | Shumin TANG, Yu JIN. Consensus mechanism of voting scheme in blockchain based on Chinese remainder theorem [J]. Journal of Computer Applications, 2023, 43(2): 458-466. |
[4] | Jindong WANG, Qiang LI. Improved practical Byzantine fault tolerance consensus algorithm based on Raft algorithm [J]. Journal of Computer Applications, 2023, 43(1): 122-129. |
[5] | Xiaoqiong PANG, Yunting WANG, Wenjun CHEN, Pan JIANG, Yanan GAO. Fair and verifiable multi-keyword ranked search over encrypted data based on blockchain [J]. Journal of Computer Applications, 2023, 43(1): 130-139. |
[6] | Yangnan GUO, Wenbao JIANG, Shuai YE. Supervisable blockchain anonymous transaction system model [J]. Journal of Computer Applications, 2022, 42(9): 2757-2764. |
[7] | Wei LIU, Cong ZHANG, Wei SHE, Xuan SONG, Zhao TIAN. Data trusted traceability method based on Merkle mountain range [J]. Journal of Computer Applications, 2022, 42(9): 2765-2771. |
[8] | Hongliang TIAN, Jiayue WANG, Chenxi LI. Data storage scheme based on hybrid algorithm blockchain and node identity authentication [J]. Journal of Computer Applications, 2022, 42(8): 2481-2486. |
[9] | Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG. Data management method for building internet of things based on Hashgraph [J]. Journal of Computer Applications, 2022, 42(8): 2471-2480. |
[10] | Jie ZHANG, Shanshan XU, Lingyun YUAN. Internet of things access control model based on blockchain and edge computing [J]. Journal of Computer Applications, 2022, 42(7): 2104-2111. |
[11] | Chunming TANG, Yuqing CHEN, Zidi ZHANG. Improved consensus algorithm based on binomial swap forest and HotStuff [J]. Journal of Computer Applications, 2022, 42(7): 2112-2117. |
[12] | Yang LI, Long XU, Yanqiang LI, Shaopeng LI. Smart contract-based access control architecture and verification for internet of things [J]. Journal of Computer Applications, 2022, 42(6): 1922-1931. |
[13] | Zheng DI, Yifan CAO, Chao QIU, Tao LUO, Xiaofei WANG. New computing power network architecture and application case analysis [J]. Journal of Computer Applications, 2022, 42(6): 1656-1661. |
[14] | Yuntao XU, Junwu ZHU, Binwen SUN, Maosheng SUN, Sihai CHEN. Election-based supply chain: a supply chain autonomy framework based on blockchain [J]. Journal of Computer Applications, 2022, 42(6): 1770-1775. |
[15] | Xiuli REN, Lei ZHANG. Improved multi-primary-node consensus mechanism based on practical Byzantine fault tolerance [J]. Journal of Computer Applications, 2022, 42(5): 1500-1507. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||