Papers which have plagiarized Resilient Identity Crime Detection
In early 2013, there were two published papers which blatantly copied my TKDE journal paper titled "Resilient Identity Crime Detection" and passed the contents off as their own work. I emailed the authors and they eventually retracted their publications. Recently, I have discovered many more of such publications. Unfortunately, there is no time for me to actively pursue this. The list below is maintained so that (1) offending authors can do the right thing and (2) future authors can avoid doing this.
N. V. Sharma, G. Singh, and M. Kumbharde (2014). Resilient Identity Crime Detection by Multilayer Data Mining Approach. International Journal of Advanced Software Engineering. Volume 9, Number 1, Pages 1-8.
T. P. Latchoumi and V. M. Vijay Kannan. (July 2013). Synthetic Identity of Crime Detection. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 7, Pages 551-560.
J. R. Jayapriya and A. Karthikeyan. (July 2013). Game Theory Approach for Identity Crime Detection. IOSR Journal of Computer Engineering. Volume 12, Issue 3, Pages 14-19.
Lina Dinesh and S. Sivakumari. (2013). An Efficient Resilient Identity Crime Detection Using Adaptive Spike Detection. Publication Unknown.
P. Sandeepani and V. Anandam. (September 2013). Robust Identity Crime Detection. International Journal of Computer Science and Mobile Applications. Volume 1, Issue 3, Pages 50-55.
V. Priyadharshini and G. Adiline Macriga. (December 2012). An Efficient Data Mining for Credit Card Fraud Detection using Finger Print Recognition. International Journal of Advanced Computer Research. Volume 2, Number 4, Issue 7, Pages 58-61.
K. Rachel Praveena, G. Venkata Rami Reddy, K. Suresh Babu, and G. Sudhakar. (November 2013). A Secure Mechanism for Resilient of Data Mining-Based Fraud Detection. International Journal of Computer Science and Network Solutions. Volume 1, Number 3, Pages 76-88.
K. Rachel Praveena, G. Venkata Rami Reddy, K. Suresh Babu, G. Sudhakar. (March 2013). Resilient of Data Mining-based Fraud Detection by using Secure Mechanism. International Journal of Advanced Engineering Applications. Volume 2, Issue 5, Pages 38-47.
M. Swathi and K. Kalpana. (June 2013). Spirit of Identity Fraud and Counterfeit Detection. International Journal of Computer Trends and Technology. Volume 4, Issue 6, Pages 1891-1895.
M. Ganga Devi and B. Peda Narayana. (July 2013). Identity Crime Detection Using Enhanced Layers in Online Commerce. International Journal of Computer Science Engineering and Scientific Technology.
E. Ramkumar & P. Kavitha (February 2013). Online Credit Card Application and Identity Crime Detection. International Journal of Engineering Research and Technology. Volume 2, Issue 2, Pages 1-5.
Chandana Suresh and Betam Suresh (August 2013). Resilient Data Stream Mining using Spike Detection. International Journal of Computer Trends and Technology. Volume 4, Issue 8, Pages 2641-2645.
Jeya Christy C. and N. Mookhambika (2013). A Noval Approach to Crime Detection Using Communal and Spike Detection. International Journal of Information Technology and Computer Sciences Perspectives. Volume 2, Number 1.