Tagged articles
5 articles
Page 1 of 1
DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

Steganographydata leakagedatabase watermark
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Nov 30, 2022 · Information Security

Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic

The article outlines Xiaohongshu’s comprehensive anti‑fraud strategy—defining fake traffic, exposing three service‑provider models, detailing identification and governance challenges, and recommending engine‑based risk‑control, a five‑step process, and AI‑driven behavior, clustering, and graph analyses that have already eliminated billions of fraudulent likes.

anti-fraude-commerce securityfraud detection
0 likes · 22 min read
Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic
Tencent Cloud Developer
Tencent Cloud Developer
Nov 28, 2019 · Information Security

E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI

Tencent’s Tianyu platform uses big‑data pipelines and AI‑driven behavior analysis to detect and block sophisticated black‑grey market attacks—real‑person wool‑pullers, automated captcha solving, and coupon‑grabbing—protecting e‑commerce giants during events like Double 12, saving billions in marketing costs.

aiblack-grey markete-commerce security
0 likes · 16 min read
E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI
Suning Technology
Suning Technology
Aug 26, 2019 · Information Security

Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software

The Suning technology risk‑control team teamed with Nanjing police to dismantle a sophisticated network‑scalper operation, revealing how custom coupon‑snatching software harms consumers and platforms, and showcasing advanced anti‑bot techniques such as emulator fingerprinting, captcha automation blocking, and data‑driven fraud models.

Fraud Preventionbot detectione-commerce security
0 likes · 5 min read
Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software
JD Tech
JD Tech
Feb 19, 2019 · Information Security

Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security

The article explains what threat intelligence is, classifies it into strategic, tactical, and operational categories, illustrates its critical role in modern cyber‑warfare and e‑commerce defense, and discusses the challenges of timeliness, accuracy, and sharing within the security ecosystem.

e-commerce securityinformation securityoperational intelligence
0 likes · 8 min read
Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security