Tag

e‑commerce security

0 views collected around this technical thread.

DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

data leakagedatabase watermarkdigital watermarking
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Nov 30, 2022 · Information Security

Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic

The article outlines Xiaohongshu’s comprehensive anti‑fraud strategy—defining fake traffic, exposing three service‑provider models, detailing identification and governance challenges, and recommending engine‑based risk‑control, a five‑step process, and AI‑driven behavior, clustering, and graph analyses that have already eliminated billions of fraudulent likes.

anti-fraude‑commerce securityfraud detection
0 likes · 22 min read
Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic
Tencent Cloud Developer
Tencent Cloud Developer
Nov 28, 2019 · Information Security

E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI

Tencent’s Tianyu platform uses big‑data pipelines and AI‑driven behavior analysis to detect and block sophisticated black‑grey market attacks—real‑person wool‑pullers, automated captcha solving, and coupon‑grabbing—protecting e‑commerce giants during events like Double 12, saving billions in marketing costs.

AIbig datablack-grey market
0 likes · 16 min read
E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI
JD Tech
JD Tech
Feb 19, 2019 · Information Security

Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security

The article explains what threat intelligence is, classifies it into strategic, tactical, and operational categories, illustrates its critical role in modern cyber‑warfare and e‑commerce defense, and discusses the challenges of timeliness, accuracy, and sharing within the security ecosystem.

e‑commerce securityinformation securityoperational intelligence
0 likes · 8 min read
Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security