{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:28:43Z","timestamp":1740148123883,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003711","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["MOST 103-2911-I-002-001"],"award-info":[{"award-number":["MOST 103-2911-I-002-001"]}],"id":[{"id":"10.13039\/501100003711","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006477","name":"National Taiwan University","doi-asserted-by":"publisher","award":["NTU-ICRP-104R7501"],"award-info":[{"award-number":["NTU-ICRP-104R7501"]}],"id":[{"id":"10.13039\/501100006477","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["NTU-ICRP-104R7501-1"],"award-info":[{"award-number":["NTU-ICRP-104R7501-1"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/jsyst.2015.2504102","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T19:12:07Z","timestamp":1450811527000},"page":"2432-2443","source":"Crossref","is-referenced-by-count":9,"title":["Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook"],"prefix":"10.1109","volume":"11","author":[{"given":"Shan-Hung","family":"Wu","sequence":"first","affiliation":[]},{"given":"Man-Ju","family":"Chou","sequence":"additional","affiliation":[]},{"given":"Chun-Hsiung","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Yuh-Jye","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kuan-Ta","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2007.02.013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2075927"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1117\/12.847886"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"ref37","first-page":"1027","article-title":"Looking at, looking up or keeping up with people? Motives and use of Facebook","author":"joinson","year":"0","journal-title":"Proc SIGHI Conf Human Factors Comput Syst"},{"journal-title":"Social Networking Sites and Our Lives Part 2 Who are Social Networking Site Users?","year":"2011","author":"hampton","key":"ref36"},{"key":"ref35","article-title":"COMPA: Detecting compromised accounts on social networks","author":"egele","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534505"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"ref12","first-page":"344","article-title":"What&#x2019;s in a name: A study of names, gender inference, and gender behavior in facebook","author":"tang","year":"2011","journal-title":"Database Syst Adv Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943520"},{"article-title":"Privacy protection for social networking APIs","year":"2008","author":"felt","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470519"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197512"},{"journal-title":"Facebook Security","year":"2015","key":"ref18"},{"journal-title":"Facebook&#x2019;s Privacy Policy&#x2014;2 Information We Receive","year":"2009","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44853-5_6"},{"journal-title":"Stored Passwords Add to Mobile Security Risks","year":"2011","author":"mah","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/32.241771"},{"journal-title":"Phone Data Makes 4 2 Million* Brits Vulnerable to Id Theft","year":"2012","key":"ref3"},{"journal-title":"Most Consumers Don&#x2019;t Lock Mobile Phone Via Pin","year":"2011","author":"hansberry","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950480"},{"journal-title":"Lost Cellphones Added Up Fast in 2011","year":"2012","author":"yu","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011215321374"},{"journal-title":"Removal of Offline_Access Permission","year":"2012","key":"ref7"},{"journal-title":"Facebook Asks Every User for a Verified Phone Number to Prevent Security Disaster","year":"2012","author":"constine","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401980"},{"journal-title":"Facebook has Users Identify Friends in Photos to Verify Accounts Prevent Unauthorized Access","year":"2010","author":"constine","key":"ref1"},{"article-title":"IDES: The enhanced prototype-a real-time intrusion-detection expert system","year":"0","author":"lunt","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.59"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_51"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437817"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"tibshirani","year":"1996","journal-title":"J R Statist Soc B (Methodological)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956901"},{"key":"ref41","first-page":"49","article-title":"1-norm support vector machines","volume":"16","author":"zhu","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354849"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_14"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.910281"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35501-6_12"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8118221\/07362137.pdf?arnumber=7362137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:07Z","timestamp":1633919707000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7362137\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2015.2504102","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}