Research Article

Detecting Fake Reviews with Generative Adversarial Networks for Mobile Social Networks

Figure 1

The flow of a Sybil attack.