{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:48Z","timestamp":1726003968273},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_22","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"396-415","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Enhanced Fraud Detection with Bloom Filters"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Arp","sequence":"first","affiliation":[]},{"given":"Erwin","family":"Quiring","sequence":"additional","affiliation":[]},{"given":"Tammo","family":"Krueger","sequence":"additional","affiliation":[]},{"given":"Stanimir","family":"Dragiev","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"issue":"7","key":"22_CR1","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"issue":"7","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"A Bradley","year":"1997","unstructured":"Bradley, A.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145\u20131159 (1997)","journal-title":"Pattern Recogn."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Bursztein, E., et al.: Handcrafted fraud and extortion: manual account hijacking in the wild. In: Proceedings of Conference on Internet Measurement Conference (IMC) (2014)","DOI":"10.1145\/2663716.2663749"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Malyshev, A., Pietraszek, T., Thomas, K.: Picasso: lightweight device class fingerprinting for web clients. In: Proceedings of ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) (2016)","DOI":"10.1145\/2994459.2994467"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Caldeira, E., Brandao, G., Pereira, A.C.M.: Fraud analysis and prevention in e-commerce transactions. In: Proceedings of Latin American Web Congress (LA-WEB) (2014)","DOI":"10.1109\/LAWeb.2014.23"},{"issue":"6","key":"22_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/5254.809570","volume":"14","author":"PK Chan","year":"1999","unstructured":"Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed data mining in credit card fraud detection. IEEE Intell. Syst. 14(6), 67\u201374 (1999)","journal-title":"IEEE Intell. Syst."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"5199","key":"22_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M Damashek","year":"1995","unstructured":"Damashek, M.: Gauging similarity with $$n$$-grams: language-independent categorization of text. Science 267(5199), 843\u2013848 (1995)","journal-title":"Science"},{"key":"22_CR9","volume-title":"Pattern Classification","author":"R Duda","year":"2001","unstructured":"Duda, R., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley, Hoboken (2001)","edition":"2"},{"key":"22_CR10","first-page":"1871","volume":"9","author":"RE Fan","year":"2008","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. (JMLR) 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Fanti, G., Pihur, V., Erlingsson, \u00da.: Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. In: Proceedings of Privacy Enhancing Technologies Symposium (PETS) (2016)","DOI":"10.1515\/popets-2016-0015"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: Phishing and money mules. In: Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS) (2010)","DOI":"10.1109\/WIFS.2010.5711465"},{"key":"22_CR13","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: Proceedings of USENIX Security Symposium (2014)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Hao, S., et al.: Drops for stuff: an analysis of reshipping mule scams. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (2015)","DOI":"10.1145\/2810103.2813620"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Kroll, M., Steinmetzer, S.: Automated cryptanalysis of bloom filter encryptions of health records. In: Proceedings of the International Conference on Health Informatics (HEALTHINF) (2015)","DOI":"10.5220\/0005176000050013"},{"issue":"2","key":"22_CR16","first-page":"59","volume":"6","author":"M Kroll","year":"2014","unstructured":"Kroll, M., Steinmetzer, S., Niedermeyer, F., Schnell, R.: Cryptanalysis of basic bloom filters used for privacy preserving record linkage. J. Priv. Confidentiality 6(2), 59\u201379 (2014)","journal-title":"J. Priv. Confidentiality"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Kantarcioglu, M., Durham, E., Malin, B.: A constraint satisfaction cryptanalysis of bloom filters in private record linkage. In: Proceedings of Privacy Enhancing Technologies Symposium (PETS) (2011)","DOI":"10.1007\/978-3-642-22263-4_13"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Levchenko, K., et al.: Click trajectories: end-to-end analysis of the spam value chain. In: Proceedings of IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.24"},{"key":"22_CR19","unstructured":"LexisNexis: True cost of fraud study (2016)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Maranzato, R., Pereira, A., do Lago, A.P., Neubert, M.: Fraud detection in reputation systems in e-markets using logistic regression. In: Proceedings of ACM Symposium on Applied Computing (SAC) (2010)","DOI":"10.1145\/1774088.1774400"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Mor, N., Riva, O., Nath, S., Kubiatowicz, J.: Bloom cookies: web search personalization without user tracking. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23108"},{"key":"22_CR22","unstructured":"Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in web service abuse. In: Proceedings of USENIX Security Symposium (2011)"},{"issue":"3","key":"22_CR23","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","volume":"50","author":"EWT Ngai","year":"2011","unstructured":"Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50(3), 559\u2013569 (2011)","journal-title":"Decis. Support Syst."},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: NetProbe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the International World Wide Web Conference (WWW) (2007)","DOI":"10.1145\/1242572.1242600"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Perl, H., Yassene, M., Brenner, M., Smith, M.: Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography. In: International Conference on eScience (2012)","DOI":"10.1109\/eScience.2012.6404484"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Preuveneers, D., Goosens, B., Joosen, W.: Enhanced fraud detection as a service supporting merchant-specific runtime customization. In: Proceedings of ACM Symposium on Applied Computing (SAC) (2017)","DOI":"10.1145\/3019612.3019886"},{"key":"22_CR28","unstructured":"Schneier, B.: Applied Cryptography. Wiley, Hoboken (1996)"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/1472-6947-9-41","volume":"9","author":"R Schnell","year":"2009","unstructured":"Schnell, R., Bachteler, T., Reiher, J.: Privacy-preserving record linkage using bloom filters. BMC Med. Inform. Decis. Mak. 9, 41 (2009)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Shay, R., Ion, I., Reeder, R.W., Consolvo, S.: \u201cMy religious aunt asked why I was trying to sell her viagra\u201d: experiences with account hijacking. In: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI) (2014)","DOI":"10.1145\/2556288.2557330"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of IEEE Symposium on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"22_CR33","volume-title":"Principles of Numerical Taxonomy","author":"R Sokal","year":"1963","unstructured":"Sokal, R., Sneath, P.: Principles of Numerical Taxonomy. W.H. Freeman and Company, New York (1963)"},{"key":"22_CR34","unstructured":"Statista: Net sales revenue of Amazon from 2004 to 2017 (2018). https:\/\/www.statista.com\/statistics\/266282\/annual-net-revenue-of-amazoncom\/ . Accessed April 2018"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Thomas, K., Iatskiv, D., Bursztein, E., Pietraszek, T., Grier, C., McCoy, D.: Dialing back abuse on phone verified accounts. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (2014)","DOI":"10.1145\/2660267.2660321"},{"key":"22_CR36","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIS. In: Proceedings of USENIX Security Symposium (2017)"},{"issue":"6","key":"22_CR37","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1016\/j.is.2012.11.005","volume":"38","author":"D Vatsalan","year":"2013","unstructured":"Vatsalan, D., Christen, P., Verykios, V.S.: A taxonomy of privacy-preserving record linkage techniques. Inf. Syst. 38(6), 946\u2013969 (2013)","journal-title":"Inf. Syst."},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Worldpay: Fragmentation of fraud (2014)","DOI":"10.1016\/S1361-3723(14)70471-3"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Feng, T., Naehrig, M., Lauter, K.E.: Privately evaluating decision trees and random forests. In: Proceedings of Privacy Enhancing Technologies Symposium (PETS) (2016)","DOI":"10.1515\/popets-2016-0043"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T06:34:41Z","timestamp":1662705281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}