{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:35:05Z","timestamp":1742920505197,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_2","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"15-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Spark-Based Deep Learning Approach for Fraud Detection Analysis"],"prefix":"10.1007","author":[{"given":"Alae","family":"Chouiekh","sequence":"first","affiliation":[]},{"given":"El Hassane","family":"Ibn El Haj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11280-012-0178-0","volume":"16","author":"W Wei","year":"2013","unstructured":"Wei W, Li J, Cao L, Ou Y, Chen J (2013) Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16:449\u2013475","journal-title":"World Wide Web"},{"issue":"15","key":"2_CR2","doi-asserted-by":"publisher","first-page":"5916","DOI":"10.1016\/j.eswa.2013.05.021","volume":"40","author":"Y Sahin","year":"2013","unstructured":"Sahin Y, Bulkan S, Duman E (2013) A cost-sensitive decision tree approach for fraud detection. Expert Syst Appl 40(15):5916\u20135923","journal-title":"Expert Syst Appl"},{"key":"2_CR3","first-page":"2107","volume-title":"Telecommunications Fraud Detection, Using Social Networks for","author":"C Volinsky","year":"2014","unstructured":"Volinsky C (2014) Telecommunications fraud detection, using social networks for. Encyclopedia of Social Network Analysis and Mining. Springer, New York, pp 2107\u20132111"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Chang YC et al (2017) Mining the networks of telecommunication fraud groups using social network analysis","DOI":"10.1145\/3110025.3119396"},{"issue":"4","key":"2_CR5","first-page":"1709","volume":"9","author":"CS Hilas","year":"2015","unstructured":"Hilas CS, Mastorocostas PA, Rekanos IT (2015) Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study. Appl Math Inf Sci 9(4):1709","journal-title":"Applied Mathematics & Information Sciences"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Murynets I et al (2014) Analysis and detection of SIMbox fraud in mobility networks. INFOCOM, 2014 Proceedings IEEE. IEEE","DOI":"10.1109\/INFOCOM.2014.6848087"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.knosys.2014.07.008","volume":"70","author":"D Olszewski","year":"2014","unstructured":"Olszewski D (2014) Fraud detection using self-organizing map visualizing the user profiles. Knowl-Based Syst 70:324\u2013334","journal-title":"Knowl-Based Syst"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Akoglu L, Christos F (2013) Anomaly, event, and fraud detection in large network datasets. In: Proceedings of the sixth ACM international conference on Web search and data mining. ACM","DOI":"10.1145\/2433396.2433496"},{"key":"2_CR9","unstructured":"Sharma A, Panigrahi PK (2013) A review of financial accounting fraud detection based on data mining techniques. arXiv preprint arXiv:1309.3944"},{"key":"2_CR10","unstructured":"Zaharia M, Chowdhury M, Franklin MJ, Shenker S, Stoica I (2010) Spark: cluster computing with working sets. In: USENIX conference on hot topics in cloud computing, pp 10\u201310"},{"key":"2_CR11","unstructured":"Kaiming H et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition"},{"key":"2_CR12","unstructured":"Mikolov T et al (2013) Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems"},{"key":"2_CR13","unstructured":"Shaoqing R et al (2015) Faster R-CNN: towards real-time object detection with region proposal networks. Advances in neural information processing systems"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Hinton GE, Ruslan RS (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","DOI":"10.1126\/science.1127647"},{"key":"2_CR15","unstructured":"Spark A (2016) Apache spark: lightning-fast cluster computing. http:\/\/spark.apache.org"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.procs.2018.01.107","volume":"127","author":"A Chouiekh","year":"2018","unstructured":"Chouiekh A, Haj EHIE (2018) ConvNets for fraud detection analysis. Procedia Computer Science 127:133\u2013138","journal-title":"Procedia Computer Science"},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu X, Zhu X, Wu GQ, Ding W (2014) Data mining with big data. IEEE Trans Knowl Data Eng 26(1):97\u2013107","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2_CR18","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyperparameter optimization. J Mach Learn Res 281\u2013305"},{"key":"2_CR19","unstructured":"Kaiming H et al (2015) Delving deep into rectifiers: surpassing humanlevel performance on imagenet classification. In: Proceedings of the IEEE international conference on computer vision"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Chouiekh A (2017) Machine learning techniques applied to prepaid subscribers: case study on the telecom industry of Morocco. In:  2017 Intelligent Systems and Computer Vision (ISCV). IEEE","DOI":"10.1109\/ISACV.2017.8054923"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T16:54:57Z","timestamp":1644339297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}