Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (4): 1309-1317.DOI: 10.11772/j.issn.1001-9081.2022040546
Special Issue: 前沿与综合应用
• Frontier and comprehensive applications • Previous Articles Next Articles
Yihan WANG, Chen TANG, Lan ZHANG()
Received:
2022-04-24
Revised:
2022-06-09
Accepted:
2022-06-13
Online:
2022-07-26
Published:
2023-04-10
Contact:
Lan ZHANG
About author:
WANG Yihan, born in 1998, M. S. candidate. Her research interests include right confirmation and traceability of data, blockchain application.Supported by:
通讯作者:
张兰
作者简介:
王亦涵(1998—),女,四川广元人,硕士研究生,主要研究方向:数据确权追溯、区块链应用;基金资助:
CLC Number:
Yihan WANG, Chen TANG, Lan ZHANG. Anti-fraud and anti-tampering online trading mechanism for bulk stock[J]. Journal of Computer Applications, 2023, 43(4): 1309-1317.
王亦涵, 唐晨, 张兰. 大宗商品防欺诈抗篡改线上交易机制[J]. 《计算机应用》唯一官方网站, 2023, 43(4): 1309-1317.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022040546
欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 |
---|---|---|---|
商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 |
商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 |
商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 |
Tab. 1 Details of frauds
欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 |
---|---|---|---|
商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 |
商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 |
商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 |
交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 |
---|---|---|---|---|
购买者下单 | ① | √ | ||
② | √ | |||
提供者发货 | ① | √ | ||
② | √ | |||
运输者运输 | ① | √ | √ | |
② | √ | |||
购买者收货 | ① | √ | √ | |
② |
Tab. 2 Stages and types of fraud
交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 |
---|---|---|---|---|
购买者下单 | ① | √ | ||
② | √ | |||
提供者发货 | ① | √ | ||
② | √ | |||
运输者运输 | ① | √ | √ | |
② | √ | |||
购买者收货 | ① | √ | √ | |
② |
偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|---|
0.1 | 0.2 | 242 | 120 | 120 | 100.00 |
0.5 | 1.0 | 44 | 120 | 120 | 100.00 |
1.0 | 2.0 | 22 | 120 | 116 | 96.70 |
2.0 | 4.0 | 11 | 75 | 24 | 32.00 |
3.0 | 6.0 | 6 | 100 | 0 | 0.00 |
Tab. 3 Test results of angle correction
偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|---|
0.1 | 0.2 | 242 | 120 | 120 | 100.00 |
0.5 | 1.0 | 44 | 120 | 120 | 100.00 |
1.0 | 2.0 | 22 | 120 | 116 | 96.70 |
2.0 | 4.0 | 11 | 75 | 24 | 32.00 |
3.0 | 6.0 | 6 | 100 | 0 | 0.00 |
组别 | 尺度 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|
1 | 300 | 257 | 85.67 | |
2 | 300 | 283 | 94.30 | |
3 | 300 | 230 | 76.67 |
Tab. 4 Test results of different scales
组别 | 尺度 | 匹配数 | 成功数 | 准确率/% |
---|---|---|---|---|
1 | 300 | 257 | 85.67 | |
2 | 300 | 283 | 94.30 | |
3 | 300 | 230 | 76.67 |
阶段 | 运行时间 |
---|---|
链下商品外观指纹提取 | 0.1 |
商品外观指纹核验合约 | 1.2 |
链下商品外观指纹比对 | 5.0 |
请求信息记录合约 | 2.0 |
用户可信度查询合约 | 0.3 |
Tab. 5 Running time of different stage
阶段 | 运行时间 |
---|---|
链下商品外观指纹提取 | 0.1 |
商品外观指纹核验合约 | 1.2 |
链下商品外观指纹比对 | 5.0 |
请求信息记录合约 | 2.0 |
用户可信度查询合约 | 0.3 |
1 | 杨璇. 我国大宗商品价格波动溢出效应研究——基于DAG和网络拓扑方法[D]. 广州:暨南大学, 2020:1. |
YANG X. Volatility spillover effects of commodity sectors in China — on DAG and network topologic analysis methods[D]. Guangzhou: Jinan University, 2020:1. | |
2 | 中国物流与采购联合会. 大宗商品电子交易规范: [S]. 北京: 中国标准出版社, 2003:1-16. (China Federation of Logistics & Purchasing. Bulk stock electronic transaction specification: [S]. Beijing: Standards Press of China, 2003:1-16) |
3 | 张武斌. ZC物流公司大宗商品物流服务质量提升策略研究[D]. 郑州:河南财经政法大学, 2020:2. |
ZHANG W B. Research on the strategy of ZC logistics company’s bulk commodity logistics service quality improvement[D]. Zhengzhou: Henan University of Economics and Law, 2020:2. | |
4 | LI X, HUANG G L, LI Q, et al. Detection and analysis of diamond fingerprinting feature and its application[J]. Journal of Physics: Conference Series, 2011, 277: No.012018. 10.1088/1742-6596/277/1/012018 |
5 | MOREIRA D, BHARATI A, BROGAN J, et al. Image provenance analysis at scale[J]. IEEE Transactions on Image Processing, 2018, 27(12): 6109-6123. 10.1109/tip.2018.2865674 |
6 | ARJOVSKY M, CHINTALA S, BOTTOU L. Wasserstein generative adversarial networks[C]// Proceedings of the 34th International Conference on Machine Learning. New York: JMLR.org, 2017: 214-223. |
7 | ALZAHRANI N, BULUSU N. Block-supply chain: a new anti-counterfeiting supply chain using NFC and block-chain[C]// Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. New York: ACM, 2018: 30-35. 10.1145/3211933.3211939 |
8 | CAO Y, JIA F, MANOGARAN G. Efficient traceability systems of steel products using blockchain-based industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9): 6004-6012. 10.1109/tii.2019.2942211 |
9 | TSAI Y S, CHEN R S, CHEN Y C, et al. An RFID-based manufacture process control and supply chain management in the semiconductor industry[J]. International Journal of Information Technology and Management, 2013, 12(1/2): 85-105. 10.1504/ijitm.2013.051633 |
10 | VUKATANA K, SEVRANI K, HOXHA E. Wine traceability: a data model and prototype in Albanian context[J]. Foods, 2016, 5(1): No.11. 10.3390/foods5010011 |
11 | 叶云,胡月明,赵小娟,等. 基于改进动态扩展和位置服务的农产品追溯系统优化[J]. 农业工程学报, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 |
YE Y, HU Y M, ZHAO X J, et al. Optimization for agricultural product traceability system based on dynamic expansion improvement and location based service[J]. Transaction of the Chinese Society of Agricultural Engineering, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 | |
12 | DENG J K, GUO J, XUE N N, et al. ArcFace: additive angular margin loss for deep face recognition[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 4685-4694. 10.1109/cvpr.2019.00482 |
13 | NG P C, HENIKOFF S. SIFT: predicting amino acid changes that affect protein function[J]. Nucleic Acids Research, 2003, 31(13): 3812-3814. 10.1093/nar/gkg509 |
14 | FENET S, RICHARD G, GRENIER Y. A scalable audio fingerprint method with robustness to pitch-shifting[C]// Proceedings of the 12th International Society for Music Information Retrieval Conference. [S.l.]: ISMIR, 2011:121-126. 10.1162/comj_r_00058 |
15 | LEE S, YOO C D. Robust video fingerprinting for content-based video identification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(7): 983-988. 10.1109/tcsvt.2008.920739 |
16 | HARRIS C, STEPHENS M. A combined corner and edge detector[C]// Proceedings of the 1988 Alvey Vision Conference. [S.l.]: Alvety Vision Club, 1988: No.23. 10.5244/c.2.23 |
17 | BAY H, TUYTELAARS T, van GOOL L. SURF: speeded up robust features[C]// Proceedings of the 2006 European Conference on Computer Vision, LNCS 3951. Berlin: Springer, 2006: 404-417. |
18 | GAO S H, CHENG M M, ZHAO K, et al. Res2Net: a new multi-scale backbone architecture[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 43(2): 652-662. 10.1109/tpami.2019.2938758 |
19 | DOSOVITSKIY A, BEYER L, KOLESNIKOV A, et al. An image is worth 16x16 words: Transformers for image recognition at scale[EB/OL]. (2021-06-03) [2022-03-22].. |
20 | BOCHKOVSKIY A, WANG C Y, LIAO H Y M. YOLOv4: optimal speed and accuracy of object detection[EB/OL]. (2020-04-23) [2022-03-20].. |
21 | LI Y J, CHEN Y C, JI X Y, et al. ScreenID: enhancing QRCode security by fingerprinting screens[C]// Proceedings of the 2021 IEEE Conference on Computer Communications. Piscataway: IEEE, 2021: 1-10. 10.1109/infocom42981.2021.9488859 |
22 | JING H, PINCHIN J, HILL C, et al. Wi-Fi fingerprinting based on collaborative confidence level training[J]. Pervasive and Mobile Computing, 2016, 30: 32-44. 10.1016/j.pmcj.2015.10.005 |
23 | PEI L, LIU J B, CHEN Y W, et al. Evaluation of fingerprinting-based WiFi indoor localization coexisted with Bluetooth[J]. The Journal of Global Positioning Systems, 2017, 15: No.3. 10.1186/s41445-017-0008-x |
24 | WU Y, AbdALMAGEED W, NATARAJAN P. ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 9535-9544. 10.1109/cvpr.2019.00977 |
25 | GKITSAS V, ZIOULIS N, ÁLVAREZ F, et al. Deep lighting environment map estimation from spherical panoramas[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2020: 2719-2728. 10.1109/cvprw50498.2020.00328 |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[7] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[9] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[10] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[11] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[12] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[13] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
[14] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
[15] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||