{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T12:12:17Z","timestamp":1768306337933,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032093172","type":"print"},{"value":"9783032093189","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-09318-9_32","type":"book-chapter","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T06:22:35Z","timestamp":1762582955000},"page":"464-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Light and\u00a0Efficient Framework for\u00a0E-Commerce Fraud Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2701-4321","authenticated-orcid":false,"given":"Minh-Hoa","family":"Doan","sequence":"first","affiliation":[]},{"given":"Arunabha","family":"Sen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1368-8724","authenticated-orcid":false,"given":"Thach V.","family":"Bui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"key":"32_CR1","unstructured":"Basu, K., Sen, A.: Epidemiological model independent misinformation source identification. In: Proceedings of ICWSM Workshops (2021)"},{"issue":"1","key":"32_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.endm.2006.08.005","volume":"26","author":"E Charbit","year":"2006","unstructured":"Charbit, E., Charon, I., Cohen, G., Hudry, O.: Discriminating codes in bipartite graphs. Electron. Notes Discrete Math. 26, 29\u201335 (2006)","journal-title":"Electron. Notes Discrete Math."},{"key":"32_CR4","unstructured":"Das, S.: Filters, wrappers and a boosting-based hybrid for feature selection. In: Proceedings of ICML, pp. 74\u201381 (2001)"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Ge, D., Gu, J., Chang, S., Cai, J.: Credit card fraud detection using lightgbm model. In: Proceedings of the ECIT, pp. 232\u2013236. IEEE (2020)","DOI":"10.1109\/ECIT50008.2020.00060"},{"issue":"1","key":"32_CR6","first-page":"43","volume":"3","author":"S Gravier","year":"2008","unstructured":"Gravier, S., Klasing, R., Moncel, J.: Hardness results and approximation algorithms for identifying codes and locating-dominating codes in graphs. Algorithmic Oper. Res. 3(1), 43\u201350 (2008)","journal-title":"Algorithmic Oper. Res."},{"key":"32_CR7","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Research 3(Mar), 1157\u20131182 (2003)"},{"key":"32_CR8","unstructured":"Hall, M.A.: Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of ICML, pp. 359\u2013366 (2000)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Hasan, I., Rizvi, S.A.M.: AI-driven fraud detection and mitigation in e-commerce transactions. In: Proceedings of Data Analytics and Management: ICDAM 2021, vol. 1, pp. 403\u2013414. Springer, Singapore (2022)","DOI":"10.1007\/978-981-16-6289-8_34"},{"key":"32_CR10","unstructured":"Howard, A., Bouchon-Meunier, B., Lei, J., Abbass, H.: IEEE-CIS fraud detection (2019). https:\/\/www.kaggle.com\/c\/ieee-fraud-detection, Accessed 04 June 2025"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Kewei, X., Peng, B., Jiang, Y., Lu, T.: A hybrid deep learning model for online fraud detection. In: Proceedings of the ICCECE, pp. 431\u2013434. IEEE (2021)","DOI":"10.1109\/ICCECE51280.2021.9342110"},{"issue":"1\u20132","key":"32_CR12","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1\u20132), 273\u2013324 (1997)","journal-title":"Artif. Intell."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., Mai, Y., Lin, Z., Liang, S.: Online transaction detection method using catboost model. In: Proceedings of the CISCE, pp. 236\u2013240. IEEE (2020)","DOI":"10.1109\/CISCE50729.2020.00053"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Nguyen, N., et al.: A proposed model for card fraud detection based on catboost and deep neural network. IEEE Access 10, 96852\u201396861 (2022)","DOI":"10.1109\/ACCESS.2022.3205416"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Reddy, S.R.B., Kanagala, P., Ravichandran, P., Pulimamidi, R., Sivarambabu, P.V., Polireddi, N.S.A.: Effective fraud detection in e-commerce: Leveraging machine learning and big data analytics. Measurement: Sensors 33, 101138 (2024)","DOI":"10.1016\/j.measen.2024.101138"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Rodrigues, V.F., et al.: Fraud detection and prevention in e-commerce: a systematic literature review. Electron. Commerce Res. Appl. 56, 101207 (2022)","DOI":"10.1016\/j.elerap.2022.101207"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Song, Z.: A data mining based fraud detection hybrid algorithm in e-bank. In: Proceedings of the ICBAIE, pp. 44\u201347. IEEE (2020)","DOI":"10.1109\/ICBAIE49996.2020.00016"},{"key":"32_CR18","unstructured":"Statista: Retail e-commerce sales worldwide from 2014 to 2027 (2024). https:\/\/www.statista.com\/statistics\/379046\/worldwide-retail-e-commerce-sales\/, Accessed 04 June 2025"},{"key":"32_CR19","unstructured":"Statista: Value of e-commerce losses to online payment fraud worldwide from 2020 to 2023 (2024). https:\/\/www.statista.com\/statistics\/1273177\/ecommerce-payment-fraud-losses-globally\/, Accessed 04 Apr 2024"},{"key":"32_CR20","unstructured":"Statista: ecommerce \u2013 worldwide (2025) (2025). https:\/\/www.statista.com, Accessed 04 June 2025"},{"issue":"1","key":"32_CR21","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","volume":"58","author":"R Tibshirani","year":"1996","unstructured":"Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Roy. Stat. Soc. 58(1), 267\u2013288 (1996)","journal-title":"J. Roy. Stat. Soc."},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Xiao, Z.: IEEE-CIS fraud detection based on XGB. In: Proceedings of the International Conference on Economic Management and Green Development, pp. 1785\u20131796. Springer Nature, Singapore (2023)","DOI":"10.1007\/978-981-97-0523-8_159"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-09318-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:02:48Z","timestamp":1768280568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-09318-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"ISBN":["9783032093172","9783032093189"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-09318-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"9 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}