{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T12:37:40Z","timestamp":1774615060465,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030415785","type":"print"},{"value":"9783030415792","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41579-2_33","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T16:09:09Z","timestamp":1581955749000},"page":"569-583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels"],"prefix":"10.1007","author":[{"given":"Ruoyu","family":"Deng","sequence":"first","affiliation":[]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Guangsheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"33_CR1","unstructured":"Aerospike: Enabling digital payments transformation (2019). https:\/\/www.aerospike.com\/lp\/enabling-digital-payments-transformation-ebook"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","volume":"55","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Mahmood, A., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278\u2013288 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.eswa.2015.12.030","volume":"51","author":"AC Bahnsen","year":"2016","unstructured":"Bahnsen, A.C., Aouada, D., Stojanovic, A., Ottersten, B.: Feature engineering strategies for credit card fraud detection. Expert Syst. Appl. 51, 134\u2013142 (2016)","journal-title":"Expert Syst. Appl."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Beutel, A., Xu, W., Guruswami, V., Palow, C., Faloutsos, C.: CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In: Proceedings of the 22nd International Conference on World Wide Web (WWW), pp. 119\u2013130. ACM (2013)","DOI":"10.1145\/2488388.2488400"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-030-14234-6_21","volume-title":"Information Security and Cryptology","author":"R Deng","year":"2019","unstructured":"Deng, R., et al.: SpamTracer: manual fake review detection for O2O commercial platforms by using geolocation features. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 384\u2013403. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14234-6_21"},{"key":"33_CR7","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Proceedings of the Advances in Neural Information Processing Systems (NIPS), pp. 2672\u20132680 (2014)"},{"key":"33_CR8","unstructured":"Santosh, K.C., Mukherjee, A.: On the temporal dynamics of opinion spamming: case studies on yelp. In: Proceedings of the 25th International Conference on World Wide Web (WWW), pp. 369\u2013379. ACM (2016)"},{"issue":"12","key":"33_CR9","doi-asserted-by":"publisher","first-page":"3507","DOI":"10.1016\/j.patcog.2013.06.005","volume":"46","author":"M Kemmler","year":"2013","unstructured":"Kemmler, M., Rodner, E., Wacker, E.S., Denzler, J.: One-class classification with Gaussian processes. Pattern Recogn. 46(12), 3507\u20133518 (2013)","journal-title":"Pattern Recogn."},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, S., Spezzano, F., Subrahmanian, V.: VEWS: a wikipedia vandal early warning system. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2015)","DOI":"10.1145\/2783258.2783367"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Lee, S., et al.: Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and Distributed Systems Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23055"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Z., Liu, B., Wei, X., Shao, J.: Spotting fake reviews via collective positive-unlabeled learning. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), pp. 899\u2013904. IEEE (2014)","DOI":"10.1109\/ICDM.2014.47"},{"issue":"Nov","key":"33_CR13","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(Nov), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"33_CR14","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders. arXiv preprint arXiv:1511.05644 (2015)"},{"issue":"2011","key":"33_CR15","first-page":"1","volume":"72","author":"A Ng","year":"2011","unstructured":"Ng, A., et al.: Sparse autoencoder. CS294A Lect. Notes 72(2011), 1\u201319 (2011)","journal-title":"CS294A Lect. Notes"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"de Roux, D., Perez, B., Moreno, A., del Pilar Villamil, M., Figueroa, C.: Tax fraud detection for under-reporting declarations using an unsupervised machine learning approach. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 215\u2013222. ACM (2018)","DOI":"10.1145\/3219819.3219878"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Sun, J., et al.: FraudVis: understanding unsupervised fraud detection algorithms. In: Proceedings of the IEEE Pacific Visualization Symposium (PacificVis), pp. 170\u2013174. IEEE (2018)","DOI":"10.1109\/PacificVis.2018.00029"},{"issue":"9","key":"33_CR18","doi-asserted-by":"publisher","first-page":"3090","DOI":"10.1287\/mnsc.2016.2489","volume":"63","author":"V Van Vlasselaer","year":"2016","unstructured":"Van Vlasselaer, V., Eliassi-Rad, T., Akoglu, L., Snoeck, M., Baesens, B.: Gotcha! Network-based fraud detection for social security fraud. Manag. Sci. 63(9), 3090\u20133110 (2016)","journal-title":"Manag. Sci."},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM) (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"Dec","key":"33_CR20","first-page":"3371","volume":"11","author":"P Vincent","year":"2010","unstructured":"Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., Manzagol, P.A.: Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11(Dec), 3371\u20133408 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"33_CR21","unstructured":"Viswanath, B., et al.: Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX Security Symposium (USENIX Security), pp. 223\u2013238 (2014)"},{"key":"33_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West, J., Bhattacharya, M.: Intelligent financial fraud detection: a comprehensive review. Comput. Secur. 57, 47\u201366 (2016)","journal-title":"Comput. Secur."},{"key":"33_CR23","unstructured":"Xiaojin, Z., Zoubin, G.: Learning from labeled and unlabeled data with label propagation. Technical report, Technical Report CMU-CALD-02-107, Carnegie Mellon University (2002)"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Yao, Y., Viswanath, B., Cryan, J., Zheng, H., Zhao, B.Y.: Automated crowdturfing attacks and defenses in online review systems. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 1143\u20131158. ACM (2017)","DOI":"10.1145\/3133956.3133990"},{"issue":"2015","key":"33_CR25","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.procs.2015.04.201","volume":"48","author":"M Zareapoor","year":"2015","unstructured":"Zareapoor, M., Shamsolmoali, P., et al.: Application of credit card fraud detection: based on bagging ensemble classifier. Procedia Comput. Sci. 48(2015), 679\u2013685 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"33_CR26","unstructured":"Zhang, Y., Liu, G., Zheng, L., Yan, C., Jiang, C.: A novel method of processing class imbalance and its application in transaction fraud detection. In: Proceedings of the IEEE\/ACM 5th International Conference on Big Data Computing Applications and Technologies (BDCAT), pp. 152\u2013159. IEEE (2018)"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Zheng, P., Yuan, S., Wu, X., Li, J., Lu, A.: One-class adversarial nets for fraud detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 1286\u20131293 (2019)","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"33_CR28","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.neunet.2018.02.015","volume":"102","author":"YJ Zheng","year":"2018","unstructured":"Zheng, Y.J., Zhou, X.H., Sheng, W.G., Xue, Y., Chen, S.Y.: Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw. 102, 78\u201386 (2018)","journal-title":"Neural Netw."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41579-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:53:48Z","timestamp":1695776028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41579-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415785","9783030415792"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41579-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"199","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}