{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:59:03Z","timestamp":1773827943361,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030233662","type":"print"},{"value":"9783030233679","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23367-9_2","type":"book-chapter","created":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T17:02:51Z","timestamp":1560963771000},"page":"13-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Constrained GAN with Hybrid Encoding in Predicting Financial Behavior"],"prefix":"10.1007","author":[{"given":"Yuhang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wensi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wanlin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Kejiang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cheng-Zhong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"key":"2_CR1","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research, arXiv preprint arXiv:1009.6119 (2010)"},{"key":"2_CR2","unstructured":"Kou, Y., Lu, C.-T., Sirwongwattana, S., Huang, Y.-P.: Survey of fraud detection techniques. In: IEEE International Conference on Networking, Sensing and Control, 2004, vol. 2, pp. 749\u2013754. IEEE (2004)"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1015608814486","volume":"12","author":"E Hung","year":"2002","unstructured":"Hung, E., Cheung, D.W.: Parallel mining of outliers in large database. Distrib. Parallel Databases 12(1), 5\u201326 (2002)","journal-title":"Distrib. Parallel Databases"},{"key":"2_CR4","unstructured":"Williams, G., Baxter, R., He, H., Hawkins, S., Gu, L.: A comparative study of RNN for outlier detection in data mining. In: Proceedings of the 2002 IEEE International Conference on Data Mining, ICDM 2003, pp. 709\u2013712. IEEE (2002)"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","volume":"50","author":"EW Ngai","year":"2011","unstructured":"Ngai, E.W., Hu, Y., Wong, Y., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50(3), 559\u2013569 (2011)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1111\/1539-6975.00027","volume":"69","author":"PL Brockett","year":"2002","unstructured":"Brockett, P.L., Derrig, R.A., Golden, L.L., Levine, A., Alpert, M.: Fraud classification using principal component analysis of ridits. J. Risk Insur. 69(3), 341\u2013371 (2002)","journal-title":"J. Risk Insur."},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-319-45477-1_18","volume-title":"Computer Safety, Reliability, and Security","author":"M Zanetti","year":"2016","unstructured":"Zanetti, M., Jamhour, E., Pellenz, M., Penna, M.: A new SVM-based fraud detection model for AMI. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 226\u2013237. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_18"},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/64.539016","volume":"11","author":"KJ Ezawa","year":"1996","unstructured":"Ezawa, K.J., Norton, S.W.: Constructing bayesian networks to predict uncollectible telecommunications accounts. IEEE Expert 11(5), 45\u201351 (1996)","journal-title":"IEEE Expert"},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.eswa.2005.04.030","volume":"29","author":"S Viaene","year":"2005","unstructured":"Viaene, S., Dedene, G., Derrig, R.A.: Auto claim fraud detection using bayesian learning neural networks. Expert Syst. Appl. 29(3), 653\u2013666 (2005)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TKDE.2004.1277822","volume":"16","author":"S Viaene","year":"2004","unstructured":"Viaene, S., Derrig, R.A., Dedene, G.: A case study of applying boosting naive bayes to claim fraud diagnosis. IEEE Trans. Knowl. Data Eng. 16(5), 612\u2013620 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Das, K., Moore, A., Schneider, J.: Belief state approaches to signaling alarms in surveillance systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 539\u2013544. ACM (2004)","DOI":"10.1145\/1014052.1014116"},{"key":"2_CR12","unstructured":"Sharma, A., Panigrahi, P.K.: A review of financial accounting fraud detection based on data mining techniques. arXiv preprint arXiv:1309.3944 (2013)"},{"key":"2_CR13","unstructured":"Bolton, R.J., Hand, D.J., et al.: Unsupervised profiling methods for fraud detection, Credit Scoring and Credit Control VII, pp. 235\u2013255 (2001)"},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.12720\/jait.7.1.34-38","volume":"7","author":"MR Lepoivre","year":"2016","unstructured":"Lepoivre, M.R., Avanzini, C.O., Bignon, G., Legendre, L., Piwele, A.K.: Credit card fraud detection with unsupervised algorithms. J. Adv. Inf. Technol. 7(1), 34\u201338 (2016)","journal-title":"J. Adv. Inf. Technol."},{"issue":"5","key":"2_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(99)80015-3","volume":"1999","author":"MJ Cerullo","year":"1999","unstructured":"Cerullo, M.J., Cerullo, V.: Using neural networks to predict financial reporting fraud: Part 1. Comput. Fraud Secur. 1999(5), 14\u201317 (1999)","journal-title":"Comput. Fraud Secur."},{"issue":"4","key":"2_CR16","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/72.595879","volume":"8","author":"JR Dorronsoro","year":"1997","unstructured":"Dorronsoro, J.R., Ginel, F., S\u00e1nchez, C.R., Santa Cruz, C.: Neural fraud detection in credit card operations. IEEE Trans. Neural Networks 8(4), 827\u2013834 (1997)","journal-title":"IEEE Trans. Neural Networks"},{"issue":"8","key":"2_CR17","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1108\/02686900310495151","volume":"18","author":"JW Lin","year":"2003","unstructured":"Lin, J.W., Hwang, M.I., Becker, J.D.: A fuzzy neural network for assessing the risk of fraudulent financial reporting. Manag. Auditing J. 18(8), 657\u2013665 (2003)","journal-title":"Manag. Auditing J."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Roy, A., Sun, J., Mahoney, R., Alonzi, L., Adams, S., Beling, P.: Deep learning detecting fraud in credit card transactions. In: 2018 Systems and Information Engineering Design Symposium (SIEDS), pp. 129\u2013134. IEEE (2018)","DOI":"10.1109\/SIEDS.2018.8374722"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.dss.2017.11.001","volume":"105","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Xu, W.: Leveraging deep learning with lda-based text analytics to detect automobile insurance fraud. Decis. Support Syst. 105, 87\u201395 (2018)","journal-title":"Decis. Support Syst."},{"key":"2_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"Z-H Zhou","year":"2012","unstructured":"Zhou, Z.-H.: Ensemble Methods: Foundations and Algorithms. Chapman and Hall\/CRC, New York (2012)"},{"key":"2_CR21","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in neural information processing systems, pp. 2672\u20132680 (2014)"},{"issue":"11","key":"2_CR22","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1109\/LGRS.2017.2752750","volume":"14","author":"D Lin","year":"2017","unstructured":"Lin, D., Fu, K., Wang, Y., Xu, G., Sun, X.: Marta gans: unsupervised representation learning for remote sensing image classification. IEEE Geosci. Remote Sens. Lett. 14(11), 2092\u20132096 (2017)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"2_CR23","unstructured":"Cassel, M., Lima, F.: Evaluating one-hot encoding finite state machines for SEU reliability in SRAM-based FPGAs. In: 12th IEEE International On-Line Testing Symposium, IOLTS 2006, pp. 6-pp. IEEE (2006)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Sikora, R., et al.: A modified stacking ensemble machine learning algorithm using genetic algorithms. In Handbook of Research on Organizational Transformations Through Big Data Analytics, pp. 43\u201353. IGi Global (2015)","DOI":"10.4018\/978-1-4666-7272-7.ch004"},{"key":"2_CR25","unstructured":"Golson, S.: One-hot state machine design for FPGAs. In Proceedings 3rd Annual PLD Design Conference & Exhibit, vol. 1, no. 3 (1993)"},{"key":"2_CR26","unstructured":"Duvenaud, D.K., et al.: Convolutional networks on graphs for learning molecular fingerprints. In: Advances in Neural Information Processing Systems, pp. 2224\u20132232 (2015)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Song, Y., et al.: Vital: Visual tracking via adversarial learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8990\u20138999 (2018)","DOI":"10.1109\/CVPR.2018.00937"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. arXiv preprint arXiv:1812.04948 (2018)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"2_CR29","unstructured":"Mahalanobis, P.C.: On the generalized distance in statistics. National Institute of Science of India (1936)"},{"key":"2_CR30","unstructured":"Rojas, R.: Adaboost and the super bowl of classifiers a tutorial introduction to adaptive boosting. Freie University, Berlin, Technical report (2009)"},{"key":"2_CR31","first-page":"3371","volume":"11","author":"P Vincent","year":"2010","unstructured":"Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., Manzagol, P.-A.: Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11, 3371\u20133408 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Yu, D., Yao, K., Su, H., Li, G., Seide, F.: Kl-divergence regularized deep neural network adaptation for improved large vocabulary speech recognition. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 7893\u20137897. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6639201"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Xiong, H., Cheng, W., Fu, Y., Hu, W., Bian, J., Guo, Z.: De-biasing covariance-regularized discriminant analysis. In: IJCAI, pp. 2889\u20132897 (2018)","DOI":"10.24963\/ijcai.2018\/401"},{"issue":"3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"1","key":"2_CR35","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10100-017-0479-6","volume":"26","author":"B Kami\u0144ski","year":"2018","unstructured":"Kami\u0144ski, B., Jakubczyk, M., Szufel, P.: A framework for sensitivity analysis of decision trees. CEJOR 26(1), 135\u2013159 (2018)","journal-title":"CEJOR"},{"issue":"3","key":"2_CR36","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M., et al.: Classification and regression by randomforest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"key":"2_CR37","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3389\/fnbot.2013.00021","volume":"7","author":"A Natekin","year":"2013","unstructured":"Natekin, A., Knoll, A.: Gradient boosting machines, a tutorial. Front. Neurorobotics 7, 21 (2013)","journal-title":"Front. Neurorobotics"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794. ACM (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"2_CR39","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West, J., Bhattacharya, M.: Intelligent financial fraud detection: a comprehensive review. Comput. Secur. 57, 47\u201366 (2016)","journal-title":"Comput. Secur."},{"issue":"2","key":"2_CR40","first-page":"256","volume":"6","author":"TR Patil","year":"2013","unstructured":"Patil, T.R., Sherekar, S.: Performance analysis of naive bayes and j48 classification algorithm for data classification. Int. J. Comput. Sci. Appl. 6(2), 256\u2013261 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"2_CR41","doi-asserted-by":"publisher","DOI":"10.1142\/6986","volume-title":"Linear Regression Analysis: Theory and Computing","author":"X Yan","year":"2009","unstructured":"Yan, X., Su, X.: Linear Regression Analysis: Theory and Computing. World Scientific, Singapore (2009)"},{"issue":"4","key":"2_CR42","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/0167-4048(90)90103-Z","volume":"9","author":"LC Mercer","year":"1990","unstructured":"Mercer, L.C.: Fraud detection via regression analysis. Comput. Secur. 9(4), 331\u2013338 (1990)","journal-title":"Comput. Secur."},{"key":"2_CR43","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-7908-2604-3_16","volume-title":"Proceedings of COMPSTAT'2010","author":"L\u00e9on Bottou","year":"2010","unstructured":"Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Lechevallier, Y., Saporta G. (eds) Proceedings of COMPSTAT 2010, pp. 176\u2013186. Physica, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-7908-2604-3_16"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Mobile Services \u2013 AIMS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23367-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:06:26Z","timestamp":1687133186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23367-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030233662","9783030233679"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23367-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on AI and Mobile Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aimse2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ai1000.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}