Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China

F Wang, X Zhou - Victims & Offenders, 2023 - Taylor & Francis
… a romantic or close relationship to manipulate and/or steal from … reports or posts from social
media platforms or news outlets (eg… , thematic analysis used in this current study is to identify

[HTML][HTML] Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering”(Sha Zhu Pan, 杀猪盘)

JM Whittaker, S Lazarus, T Corcoran - Journal of Economic Criminology, 2024 - Elsevier
… enables fraudsters in their self-identified role as hunters to justify … The victim is then typically
manipulated into investing a small … on dating apps and social media. These profiles often …

[PDF][PDF] 基于动机分析的区块链数字货币异常交易行为识别方法

沈蒙, 桑安琪, 祝烈煌, 孙润庚, 张璨 - 计算机学报, 2021 - cjc.ict.ac.cn
… behind any Bitcoin abnormal transaction behavior, this article designs a novel method for
identifying Bitcoin's abnormal transaction behavior based on the analysis of transaction …

Shanzhai 山寨nationalism 中国民族主义: Reflexive empires and digital commemoration in China from Ah Q to AI

T Sear - After the Armistice, 2021 - taylorfrancis.com
… of people use online social networking sites. Ninety four per … determinant of social identification
and political action. Election … The ‘time axis manipulation’ of a telegraph message and the …

区块链技术专刊序言(中英文)

冯登国, 欧阳永贵 - Journal of Cryptologic Research, 2018 - search.proquest.com
… The security of Bitcoin has attracted more attention, and many attacks have been proposed.
“… in Bitcoin” by Han Jian et al. elaborates the common attacks on Bitcoin mining, analyzes the …

[PDF][PDF] 区块链数据分析: 现状, 趋势与挑战

陈伟利, 郑子彬 - 计算机研究与发展, 2018 - researchgate.net
… corresponding analysis methods. Then, the current research progress in blockchain data
analysis … , privacy disclosure risk analysis, network portrait, network visualization, market effect …

如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… data leakage, in the situation where the manipulated data is randomly split in several shares
(… manual hooking for the analysis to be exact. In general, we identified some flaws which are …

區塊鏈在會計及審計領域之綜合性分析及可行應用

李柏霖 - 2023 - tdr.lib.ntu.edu.tw
… This study also involved a comprehensive analysis of … This study also identified key and
feasible concepts related … and monitoring helps prevent earnings manipulation and other illegal …

NFT 社會網絡分析初探: 以CryptoPunks 為例

鄭敬錞 - 2022 - tdr.lib.ntu.edu.tw
… indicators of the social network analysis method that can … , which can effectively identify
which community an unknown … has a significant possibility of price manipulation; 4. The top ten …

針對爪哇即時編譯器嵌入式系統之區域程式碼分析器與樣式化區間程式碼優化器

黃帥維, 楊武 - 2007 - ir.lib.nycu.edu.tw
… These reasons motivate us to develop a tool to analyze code … optimization techniques
and do manipulation on the IR. … In the process of identifying patterns, we observe that some …