%PDF-1.5
%
1 0 obj
<>stream
application/pdfIEEE2019 Amity International Conference on Artificial Intelligence (AICAI);2019; ; ; Online manipulationuser unawarenesscognitive hackingsemantic social engineering attackmedia disinformationcustomized contentAIDetection of Online Manipulation to Prevent Users VictimizationSandhya JavaFathima Linsha BasheerSadia RiazManindar Jeet KaurArif Mushtaq
2019 Amity International Conference on Artificial Intelligence (AICAI)593 Feb. 2019599
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>
endobj
5 0 obj
<>
endobj
4 0 obj
<>stream
hTMo0>v!@@%1Ua!4B~Nº
Iul^NQU8C4^B5 4_
p
nӌI#9f{cm;XTWcp@=CE
Ҽuo!x)clp2RCȓ|O濏!nէ,܌"2,Hϛ6LXG3FKݏVEːo!MFɊp pzi(L8Ѭ]F٢ǺyۧRg|\zѸ}0 sO
endstream
endobj
6 0 obj
<>stream
hޜX{#u͌&
aGE| 00NwtRgtRJ=RI<9*#Xeqݳ¦=太~~{F߆
.[m7]sO ;_xک;_]^~ꗇR
zBw#z|gj.>}|O||>߷.O}6'@10վG7\
Ome{e'/f./Bo~@pӅxw]z٥}gO\Vŷ.-G_z/cw I8+&$JTj|i֊
V)k-2Z!O,;0*Fn
Nj41. RPa l(u}u/`g˥pw_
HC٦qN_pqrnMA"Ǒx'I y<39Vk 9Db`Fb9eĖ9郋Ǡ+Q_lܽ Ix`J֪\)֚U#u>}lJ7ɣ<%IrgT] (N"G8#ӄy9֞ܿktTSOSkEkb*fONkg^
>^N,|_3 ߸9fݴFh&~#_u}PI,s'Dq&⋑ke6h|,!#qRuna~Hzu~T{qR_5ZCzv#p4¡CC\ckLhrxe?J
Ntp7~X8Mr8_[ øs>8OGJ
MUjX.\DE-*P%T-Db[6r_s{4#lDɡ}ޭMPty;ѢqtdVXn`g:7K1 (gR
Y3j3L:C(CJ2f8I@2٩|'
?RQc7K'P
8IXXUTЙ﵎aE/`@QxqwN=֗D}1 %ElZN cݫP'G]س_y>LΡsxEXK_CZ2ԪT&bY"c1xޅһpbO,$T@Z5H
;& xTK Ay}dijNϘgf"p(Ns$*cph(Ieĩ6f50it
-"۷C۰Cv
Gn13qo2ݚ'
,-!KD,5ï{]?,'S1X41`8Au/mLae426&У(5GLlح[}a'&Fzi6u-L^=%G &ULnRyW)LƣF6
~sߵߎC,H"&bR1cV3Ϡg'Z
,"P (n
.K|ծ-@vKkP%DMF{!7cl&67h(r^]W,9IZsn(4]Y5DOfsX>3 qexfΣ|єK
a`&T(x!lA
n뿕3$+@"ʌ#wYngHd3xDϤlvj*e.WUTUsEd/*SRxxZb)*0%eK
i9ujW۫s/-97q,L}< &RcPj#Z̞@DX&R)(EpuwQ+w}$'Q;6DG<^
ZcP$9AރR{(C\hbU8]*UrZ:ZV ,2eNǺv_af)Np)DI|H߯;1,@BŴQn-[JMq#upQRDd30jʓ8쩕pǟL~?2,fYBosȓ*@iic3I3$ ,ed9Z /r<\[*ׯ(Mn4ESZ
ILl3nwozwoz E R6R#ԑlͩkFm*%DJ(\wg1״wJ
Cڥ"!/Lg|42\$eD5Au}eoY ٌIP^ʉ7ϭVϮNwcgFLM N4ܑU
BFP)*3PnU{v,[
V+LZ5 '&R^`yRH
tÝ]~ C^_Do"x`7k` NGESB}jJE0$Y]{.u ^9"~Uk2[
Yd('du=`O/*˭Wv*#Ouw/ ,V_gzبWgg7ڶ].r: ;f(Q~.*=á-`8qmfBx,fdi&
eIًdL\q@?~o,4