{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:31:00Z","timestamp":1742967060802,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_25","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"177-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Risk Analysis in Online Peer-to-Peer Loaning Based on Machine Learning: A Decision Tree Implementation on PPDai.com"],"prefix":"10.1007","author":[{"given":"Chengxun","family":"Wu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"25_CR1","first-page":"63","volume":"24","author":"C Deng","year":"2019","unstructured":"Deng, C.: A comparative research on online peer-to-peer lending risk analysis models: an analysis of prosper and PPDai.com (title translated by the author of this paper). China J. Commer. 24, 63\u201366 (2019)","journal-title":"China J. Commer."},{"key":"25_CR2","first-page":"242","volume":"16","author":"Y Feng","year":"2015","unstructured":"Feng, Y., Fan, X., Yoon, Y.: Lenders and borrowers\u2019 strategies in online peer-to-peer lending market: an empirical analysis of PPDai.com. J. Electron. Commer. Res. 16, 242\u2013260 (2015)","journal-title":"J. Electron. Commer. Res."},{"issue":"2","key":"25_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.2753\/JEC1086-4415150204","volume":"15","author":"ME Greiner","year":"2010","unstructured":"Greiner, M.E., Wang, H.: Building consumer-to-consumer trust in e-finance marketplaces: an empirical analysis. Int. J. Electron. Commer. 15(2), 105\u2013136 (2010)","journal-title":"Int. J. Electron. Commer."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.ejor.2015.05.050","volume":"249","author":"Y Guo","year":"2015","unstructured":"Guo, Y., Zhou, W., Luo, C., Liu, C., Xiong, H.: Instance-based credit risk assessment for investment decisions in P2P lending. Eur. J. Oper. Res. 249, 417\u2013426 (2015)","journal-title":"Eur. J. Oper. Res."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Ha, S., Ld, N., Choi, G., Nguyen, H.-N., Yoon, B.: Improving credit risk prediction in online peer-to-peer (P2P) lending using feature selection with deep learning. In: 21st International Conference on Advanced Communication Technology (ICACT), pp. 511\u2013515 (2019)","DOI":"10.23919\/ICACT.2019.8701943"},{"issue":"04","key":"25_CR6","first-page":"67","volume":"34","author":"X Jiang","year":"2020","unstructured":"Jiang, X., Zhang, Q., Cheng, J.: Research on credit risk identification of peer-to-peer lending market. China Bus. Market. 34(04), 67\u201375 (2020)","journal-title":"China Bus. Market."},{"key":"25_CR7","unstructured":"Vinod, L., Subramanyam, N., Keerthana, S., Chinmayi, M., Lakshmi, N.: Credit risk analysis in peer-to-peer lending system. In: 2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA), pp. 193\u2013194 (2016)"},{"key":"25_CR8","first-page":"117","volume":"34","author":"J Sun","year":"2019","unstructured":"Sun, J.: The analysis of profit model of online loaning platforms. Modern Bus. 34, 117\u2013118 (2019)","journal-title":"Modern Bus."},{"issue":"6","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TCSS.2019.2938575","volume":"6","author":"J Zhu","year":"2019","unstructured":"Zhu, J., Ghosh, S., Wu, W.: Group influence maximization problem in social networks. IEEE Trans. Comput. Soc. Syst. 6(6), 1156\u20131164 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"25_CR10","first-page":"108","volume":"3","author":"L Liu","year":"2020","unstructured":"Liu, L., Zhao, J.: Research on the effects of borrowers\u2019 active uploading photos in online peer-to-peer lending market. China Price 3, 108\u2013113 (2020)","journal-title":"China Price"}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:29:02Z","timestamp":1604384942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}