@incollection{, 6745FE59D8E096B3335D7FE17CBFB0CB , author={{AntoninaLawson}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2321722 } @book{b0, , title={{Machine Learning for Fraud Detection}} , author={{ BobAnderson }} , year={2021} , publisher={Tech Publishers} } @incollection{b1, , title={{Exploring the potential of gpt-2 for generating fake reviews of research papers}} , author={{ AlbertoBartoli } and { EricMedvet }} , booktitle={{th International Conference on Fuzzy Systems and Data Mining (FSDM), ELECTR NETWORK, NOV}} , editor={ BallesterosAj Tallon } , year={2020. 2020} 331 , note={FUZZY SYSTEMS AND DATA MINING VI} } @incollection{b2, , title={{Addressing data imbalance in fraud detection}} , author={{ LiChen }} , booktitle={{Proceedings of the 5th International Conference on Data Science}} the 5th International Conference on Data Science , year={2022} } @incollection{b3, , title={{Effective synthetic data generation for fake user detection}} , author={{ ArefehEsmaili } and { SaeedFarzi }} MAR 03-04 , booktitle={{2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC). Comp Soc Iran, 2021. 26th International Computer Conference of the Computer-Society-of-Iran}} , publisher={ELECTR NET-WORK} , year={2021} } @incollection{b4, , title={{Improving fraud detection with synthetic identities}} , author={{ HyunKim }} , booktitle={{Proceedings of the 10th International Conference on Machine Learning}} the 10th International Conference on Machine Learning , year={2022} } @incollection{b5, , title={{Privacy preservation improvement by learning optimal profile generation rate}} , author={{ Kuflik } and { YShapira } and { Elovici } and { Maschiach }} , booktitle={{USER MODELING 2003, PROCEEDINGS, volume 2702 of LECTURE NOTES IN ARTIFICIAL INTELLIGENCE}} , editor={ Brusilovsky and Corbett and Derosis } JOHNSTOWN, PENNSYLVANIA , publisher={User Modeling Inc} , year={2003. JUN 22-26, 2003} Univ Pittsburgh , note={th International Conference on User Modeling} } @incollection{b6, , title={{Blackhole attack: user identity and password seize attack using honeypot}} , author={{ Hyung-JinMun } and { Kun-HeeHan }} , journal={{JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES}} 12 , year={AUG 2016} } @incollection{b7, , title={{A study on data privacy in the age of big data}} , author={{ NishaPatel }} , journal={{Data Privacy and Security Review}} 25 4 , year={2023} } @incollection{b8, , title={{Choonghyun Seo, and Eul Gyu Im. Detection method for randomly generated user ids: Lift the curse of dimensionality}} , author={{ InwooRo } and { BoojoongKang }} , journal={{IEEE ACCESS}} 10 , year={2022} } @incollection{b9, , title={{The synthetic identity generation: An overview}} , author={{ JohnSmith }} , journal={{Journal of Data Privacy}} 15 2 , year={2022} }