{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:56:19Z","timestamp":1760709379940,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651712"},{"type":"electronic","value":"9783319651729"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65172-9_30","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T04:38:54Z","timestamp":1501562334000},"page":"351-362","source":"Crossref","is-referenced-by-count":4,"title":["Using Active Learning Methods for Predicting Fraudulent Financial Statements"],"prefix":"10.1007","author":[{"given":"Stamatis","family":"Karlos","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Kostopoulos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Kotsiantis","sequence":"additional","affiliation":[]},{"given":"Vassilis","family":"Tampakas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Pigott, T.D.: A Review of Methods for Missing Data, vol. 7, no. 4, pp. 353\u2013383 (2001)","DOI":"10.1076\/edre.7.4.353.8937"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, X., Goldberg, A.B.: Introduction to Semi-Supervised Learning, vol. 3, no. 1. Morgan & Claypool, San Rafael (2009)","DOI":"10.1007\/978-3-031-01548-9_1"},{"key":"30_CR3","volume-title":"Pattern recognition","author":"S Theodoridis","year":"2009","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern recognition. Academic Press, Cambridge (2009)"},{"issue":"19","key":"30_CR4","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1016\/j.tcs.2010.12.054","volume":"412","author":"S Dasgupta","year":"2011","unstructured":"Dasgupta, S.: Two faces of active learning. Theor. Comput. Sci. 412(19), 1767\u20131781 (2011)","journal-title":"Theor. Comput. Sci."},{"key":"30_CR5","volume-title":"Computer-Aided Fraud Prevention & Detection","author":"D Coderre","year":"2009","unstructured":"Coderre, D.: Computer-Aided Fraud Prevention & Detection. Wiley, Hoboken (2009)"},{"key":"30_CR6","doi-asserted-by":"crossref","DOI":"10.1201\/b18429","volume-title":"Fraud Identification and Prevention","author":"J Youngblood","year":"2015","unstructured":"Youngblood, J.: Fraud Identification and Prevention. CRC Press, Boca Raton (2015)"},{"key":"30_CR7","volume-title":"Financial Statement Fraud: Prevention and Detection","author":"Z Rezaee","year":"2002","unstructured":"Rezaee, Z.: Financial Statement Fraud: Prevention and Detection. Wiley, Hoboken (2002)"},{"key":"30_CR8","volume-title":"Financial Statement Fraud Prevention and Detection","author":"Z Rezaee","year":"2009","unstructured":"Rezaee, Z., Riley, R.: Financial Statement Fraud Prevention and Detection. Wiley, Hoboken (2009)"},{"issue":"4","key":"30_CR9","first-page":"12","volume":"1","author":"E Koskivaara","year":"2004","unstructured":"Koskivaara, E.: Artificial Neural Networks in Auditing: State of the Art. ICFAI J. Audit Pract. 1(4), 12\u201333 (2004)","journal-title":"ICFAI J. Audit Pract."},{"key":"30_CR10","doi-asserted-by":"crossref","first-page":"1827","DOI":"10.1016\/S2212-5671(15)01485-9","volume":"32","author":"A Banarescu","year":"2015","unstructured":"Banarescu, A.: Detecting and preventing fraud with data analytics. Procedia Econ. Finan. 32, 1827\u20131836 (2015)","journal-title":"Procedia Econ. Finan."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Bao, Y., Ke, B., Li, B., Yu, J., Zhang, J.: Detecting accounting frauds in publicly traded U.S. firms: new perspective and new method, vol. 45, pp. 173\u2013188 (2015)","DOI":"10.2139\/ssrn.2670703"},{"issue":"3","key":"30_CR12","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/0378-4266(94)90007-8","volume":"18","author":"EI Altman","year":"1994","unstructured":"Altman, E.I., Marco, G., Varetto, F.: Corporate distress diagnosis: Comparisons using linear discriminant analysis and neural networks (the Italian experience). J. Bank. Financ. 18(3), 505\u2013529 (1994)","journal-title":"J. Bank. Financ."},{"issue":"5","key":"30_CR13","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/0167-9236(94)90021-3","volume":"11","author":"Y Yoon","year":"1994","unstructured":"Yoon, Y., Guimaraes, T., Swales, G.: Integrating artificial neural networks with rule-based expert systems. Decis. Support Syst. 11(5), 497\u2013507 (1994)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"30_CR14","first-page":"14","volume":"16","author":"BP Green","year":"1997","unstructured":"Green, B.P., Choi, J.H.: Assessing the risk of management fraud through neural network technology. Audit. A J. Pract. Theory 16(1), 14\u201328 (1997)","journal-title":"Audit. A J. Pract. Theory"},{"issue":"4","key":"30_CR15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S1467-0895(02)00068-4","volume":"3","author":"TG Calderon","year":"2002","unstructured":"Calderon, T.G., Cheh, J.J.: A roadmap for future neural networks research in auditing and risk assessment. Int. J. Account. Inf. Syst. 3(4), 203\u2013236 (2002)","journal-title":"Int. J. Account. Inf. Syst."},{"issue":"4","key":"30_CR16","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1108\/02686900210424321","volume":"17","author":"CT Spathis","year":"2002","unstructured":"Spathis, C.T.: Detecting false financial statements using published data: some evidence from Greece. Manag. Audit. J. 17(4), 179\u2013191 (2002)","journal-title":"Manag. Audit. J."},{"issue":"3","key":"30_CR17","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1080\/0963818022000000966","volume":"11","author":"C Spathis","year":"2002","unstructured":"Spathis, C., Doumpos, M., Zopounidis, C.: Detecting falsified financial statements: a comparative study using multicriteria analysis and multivariate statistical techniques. Eur. Account. Rev. 11(3), 509\u2013535 (2002)","journal-title":"Eur. Account. Rev."},{"issue":"2","key":"30_CR18","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1108\/JFC-11-2015-0061","volume":"24","author":"N Omar","year":"2017","unstructured":"Omar, N., Amirah Johari, Z., Smith, M.: Predicting fraudulent financial reporting using artificial neural network. J. Financ. Crime Iss. 24(2), 362\u2013387 (2017)","journal-title":"J. Financ. Crime Iss."},{"key":"30_CR19","first-page":"538","volume-title":"Predicting Fraudulent Financial Statements with Machine Learning Techniques","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Koumanakos, E., Tzelepis, D., Tampakas, V.: Predicting Fraudulent Financial Statements with Machine Learning Techniques, pp. 538\u2013542. Springer, Heidelberg (2006)"},{"issue":"5","key":"30_CR20","doi-asserted-by":"crossref","first-page":"24","DOI":"10.2469\/faj.v55.n5.2296","volume":"55","author":"MD Beneish","year":"1999","unstructured":"Beneish, M.D.: The detection of earnings manipulation. Financ. Anal. J. 55(5), 24\u201336 (1999)","journal-title":"Financ. Anal. J."},{"issue":"2","key":"30_CR21","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.dss.2010.11.006","volume":"50","author":"P Ravisankar","year":"2011","unstructured":"Ravisankar, P., Ravi, V., Raghava Rao, G., Bose, I.: Detection of financial statement fraud and feature selection using data mining techniques. Decis. Support Syst. 50(2), 491\u2013500 (2011)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"30_CR22","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.19030\/jabr.v31i4.9330","volume":"31","author":"NA Aris","year":"2015","unstructured":"Aris, N.A., Arif, S.M.M., Othman, R., Zain, M.M.: Fraudulent financial statement detection using statistical techniques: the case of small medium automotive enterprise. J. Appl. Bus. Res. 31(4), 1469\u20131478 (2015)","journal-title":"J. Appl. Bus. Res."},{"key":"30_CR23","first-page":"9","volume":"2014","author":"S Chen","year":"2014","unstructured":"Chen, S., Goo, Y.J., Shen, Z.: A hybrid approach of stepwise regression, logistic regression, support vector machine, and decision tree for forecasting fraudulent financial statements. Sci. World J. 2014, 9 (2014)","journal-title":"Sci. World J."},{"issue":"4","key":"30_CR24","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1080\/01969722.2016.1158553","volume":"47","author":"C-C Yeh","year":"2016","unstructured":"Yeh, C.-C., Chi, D.-J., Lin, T.-Y., Chiu, S.-H.: A hybrid detecting fraudulent financial statements model using rough set theory and support vector machines. Cybern. Syst. 47(4), 261\u2013276 (2016)","journal-title":"Cybern. Syst."},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Karlos, S., Fazakis, N., Kotsiantis, S., Sgarbas, K.: Semi-supervised forecasting of fraudulent financial statements. In: Proceedings of the 20th Pan-Hellenic Conference on Informatics, Article No. 34, pp. 1\u20136 (2016)","DOI":"10.1145\/3003733.3003740"},{"issue":"2\u20133","key":"30_CR26","first-page":"255","volume":"17","author":"J Alcal\u00e1-Fdez","year":"2011","unstructured":"Alcal\u00e1-Fdez, J., Fern\u00e1ndez, A., Luengo, J., Derrac, J., Garc\u00eda, S., S\u00e1nchez, L., Herrera, F.: KEEL data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. J. Mult. Log. Soft Comput. 17(2\u20133), 255\u2013287 (2011)","journal-title":"J. Mult. Log. Soft Comput."},{"key":"30_CR27","first-page":"5","volume-title":"Learning with Unlabeled Data and Its Application to Image Retrieval","author":"Z-H Zhou","year":"2006","unstructured":"Zhou, Z.-H.: Learning with Unlabeled Data and Its Application to Image Retrieval, pp. 5\u201310. Springer, Heidelberg (2006)"},{"issue":"4","key":"30_CR28","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1002\/widm.1132","volume":"4","author":"J Kremer","year":"2014","unstructured":"Kremer, J., Steenstrup Pedersen, K., Igel, C.: Active learning with support vector machines. Wiley Interdiscip. Rev Data Min. Knowl. Discov. 4(4), 313\u2013326 (2014)","journal-title":"Wiley Interdiscip. Rev Data Min. Knowl. Discov."},{"key":"30_CR29","unstructured":"Settles, B.: Active learning literature survey. Univ. Wis. Madison 52(55\u201366), 11 (2010)"},{"key":"30_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-74958-5_15","volume-title":"Machine Learning: ECML 2007","author":"K Dwyer","year":"2007","unstructured":"Dwyer, K., Holte, R.: Decision tree instability and active learning. In: Kok, Joost N., Koronacki, J., Mantaras, RLd, Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) ECML 2007. LNCS, vol. 4701, pp. 128\u2013139. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74958-5_15"},{"issue":"2","key":"30_CR31","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10618-016-0469-7","volume":"31","author":"ME Ramirez-Loaiza","year":"2017","unstructured":"Ramirez-Loaiza, M.E., Sharma, M., Kumar, G., Bilgic, M.: Active learning: an empirical study of common baselines. Data Min. Knowl. Discov. 31(2), 287\u2013313 (2017)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"30_CR32","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(1), 3 (2001)","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"30_CR33","unstructured":"Kotsianits, S., Koumanakos, E., Tzelepis, D., Tampakas, V.: Forecasting fraudulent financial statements using data mining. IT Prof. 1(12) (2007)"},{"key":"30_CR34","unstructured":"Sikonja, M.R., Kononenko, I.: An adaptation of Relief for attribute estimation in regression. In: Proceedings of 14th International Conference on Machine Learning, pp. 296\u2013304 (1997)"},{"issue":"1","key":"30_CR35","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11(1), 10 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"30_CR36","first-page":"1","volume":"17","author":"O Reyes","year":"2016","unstructured":"Reyes, O., P\u00e9rez, E., Del, M., Rodr\u00edguez-Hern\u00e1ndez, C., Fardoun, H.M., Ventura, S.: JCLAL: a Java framework for active learning. J. Mach. Learn. Res. 17, 1\u20135 (2016)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"30_CR37","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"38","author":"J Friedman","year":"1998","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting. Ann. Stat. 38(2), 337\u2013374 (1998)","journal-title":"Ann. Stat."}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65172-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T17:30:07Z","timestamp":1659288607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65172-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651712","9783319651729"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65172-9_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}