{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:30:26Z","timestamp":1742934626676,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811952081"},{"type":"electronic","value":"9789811952098"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-5209-8_31","type":"book-chapter","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T23:03:17Z","timestamp":1660086197000},"page":"448-464","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Imbalanced Problem in Initial Coin Offering Fraud Detection"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Maoning","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Bauder, R.A., Khoshgoftaar, T.M.: Medicare fraud detection using machine learning methods. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA) (2017)","DOI":"10.1109\/ICMLA.2017.00-48"},{"key":"31_CR2","unstructured":"Bian, S., et al.: Icorating: a deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670 (2018)"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2021","unstructured":"Carcillo, F., Le Borgne, Y.-A., Caelen, O., Kessaci, Y., Obl\u00e9, F., Bontempi, G.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. 557, 317\u2013331 (2021)","journal-title":"Inf. Sci."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"8","key":"31_CR5","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1049\/iet-rsn.2016.0632","volume":"11","author":"W Chen","year":"2017","unstructured":"Chen, W., Fu, K., Zuo, J., Zheng, X., Ren, W.: Radar emitter classification for large data set based on weighted-Xgboost. IET Radar Sonar? Navigation 11(8), 1203\u20131207 (2017)","journal-title":"Navigation"},{"key":"31_CR6","unstructured":"Diemers, D.: A strategic perspective: Global and Switzerland. PwC strategy& and Crypto Valley Association. https:\/\/cryptovalley.swiss\/wp-content\/uploads\/20171221_PwC-S-CVA-ICO-Report_December_final.pdf. Accessed 9 May 2022"},{"key":"31_CR7","doi-asserted-by":"publisher","unstructured":"Dio, D.D., Tam, N.T.: On leveraging deep learning models to predict the success of ICOs. ResearchGate. unpublished preprint (2019). https:\/\/doi.org\/10.13140\/RG.2.2.27268.99201","DOI":"10.13140\/RG.2.2.27268.99201"},{"key":"31_CR8","unstructured":"Dong, W., Liao, S., Fang, B., Cheng, X., Zhu, C., Fan, W.: The detection of fraudulent financial statements: an integrated language model approach. In: 18th Pacific Asia Conference on Information Systems, PACIS 2014. Pacific Asia Conference on Information Systems (2014)"},{"key":"31_CR9","unstructured":"Dong, W., Liao, S., Liang, L.: Financial statement fraud detection using text mining: a systemic functional linguistics theory perspective. In: 20th Pacific Asia Conference on Information Systems (PACIS 2016). Pacific Asia Conference on Information Systems (2016)"},{"key":"31_CR10","unstructured":"D\u00fcrr, A., Griebel, M., Welsch, G., Thiesse, F.: Predicting Fraudulent Initial Coin Offerings Using Information Extracted from Whitepapers, ECIS (2020)"},{"key":"31_CR11","unstructured":"El-Masri, M., Al-Yafi, K., Samir Sherif, K.: The Digital Transformation of Fintech: Disruptions and Value Paths (2019)"},{"key":"31_CR12","unstructured":"Fan, W., Lin, Y., Fan, W.: Betting on the Horse, the Jockey or the Tips? Evidence from Blockchain-Based Fundraising Via Initial Coin Offerings (2020)"},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11408-020-00366-0","volume":"35","author":"R Fahlenbrach","year":"2020","unstructured":"Fahlenbrach, R., Frattaroli, M.: ICO investors. Fin. Mark. Portfolio Mgmt. 35(1), 1\u201359 (2020). https:\/\/doi.org\/10.1007\/s11408-020-00366-0","journal-title":"Fin. Mark. Portfolio Mgmt."},{"issue":"1","key":"31_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jbusvent.2018.09.007","volume":"34","author":"C Fisch","year":"2019","unstructured":"Fisch, C.: Initial coin offerings (ICOs) to finance new ventures. J. Bus. Ventur. 34(1), 1\u201322 (2019)","journal-title":"J. Bus. Ventur."},{"issue":"4","key":"31_CR15","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/1088868314556539","volume":"19","author":"V Hauch","year":"2015","unstructured":"Hauch, V., Blandon-Gitlin, I., Masip, J., Sporer, S.L.: Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Pers. Soc. Psychol. Rev. 19(4), 307\u2013342 (2015)","journal-title":"Pers. Soc. Psychol. Rev."},{"key":"31_CR16","unstructured":"He, H., Yang, B., Garcia, E. A., Li, S.: Adasyn: adaptive synthetic sampling approach for imbalanced learning. In: Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on (2008)"},{"key":"31_CR17","unstructured":"Heines, R., Dick, C., Pohle, C., Jung, R.: The tokenization of everything: toward a framework for understanding the potentials of tokenized assets. In: PACIS 2021 Proceedings (2021)"},{"issue":"4","key":"31_CR18","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1007\/s11187-021-00471-y","volume":"58","author":"L Hornuf","year":"2021","unstructured":"Hornuf, L., K\u00fcck, T., Schwienbacher, A.: Initial coin offerings, information disclosure, fraud. Small Bus. Econ. 58(4), 1741\u20131759 (2021)","journal-title":"Small Bus. Econ."},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Humpherys, S.L., Moffitt, K.C., Burns, M.B., Burgoon, J.K., Felix, W.F.: Identification of fraudulent financial statements using linguistic credibility analysis. Decis. Supp. Syst. 50(3), 585\u2013594 (2019). Kim, K., Lee, S.-Y. T., Assar, S.: Coin market behavior using social sentiment Markov chains (2011)","DOI":"10.1016\/j.dss.2010.08.009"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Karimov, B., Wojcik, P.: Identification of scams in initial coin offerings with machine learning. Front. Artif. Intell. 4, 718450 (2021)","DOI":"10.3389\/frai.2021.718450"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Li, F., Zhang, X., Zhang, X., Du, C., Xu, Y., Tian, Y.C.: Cost-sensitive and hybrid-attribute measure multi-decision tree over imbalanced data sets. Inf. Sci. S0020025517304784 (2018)","DOI":"10.1016\/j.ins.2017.09.013"},{"key":"31_CR22","doi-asserted-by":"publisher","unstructured":"Liebau, D., Schueffel, P.: Cryptocurrencies & initial coin offerings: are they scams \u2013 an empirical study. J. Br. Blockch. Assoc. 2(1), 1\u20137 (2019). https:\/\/doi.org\/10.31585\/jbba-2-1-(5)2019","DOI":"10.31585\/jbba-2-1-(5)2019"},{"key":"31_CR23","first-page":"2999","volume":"99","author":"TY Lin","year":"2017","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell 99, 2999\u20133007 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y., Sheng, J., Wang, W.: Technology and Cryptocurrency Valuation: Evidence from Machine Learning (2021). https:\/\/ssrn.com\/abstract=3577208","DOI":"10.2139\/ssrn.3657986"},{"key":"31_CR25","unstructured":"Reff, N.: How to Identify Cryptocurrency and ICO Scams (2022). https:\/\/www.investopedia.com\/tech\/how-identify-cryptocurrency-and-ico-scams\/. Accessed 9 May 2022"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Saner, C.B., Kesici, M., Yaslan, Y., Genc, V.: Improving the performance of transient stability prediction using resampling methods. In: 2019 11th International Conference on Electrical and Electronics Engineering (ELECO) (2019)","DOI":"10.23919\/ELECO47770.2019.8990567"},{"key":"31_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2019.02.062","volume":"487","author":"X Tao","year":"2019","unstructured":"Tao, X., et al.: Self-adaptive cost weights-based support vector machine cost-sensitive ensemble for imbalanced data classification. Inf. Sci. 487, 31\u201356 (2019)","journal-title":"Inf. Sci."},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3389\/frai.2020.00018","volume":"3","author":"AM Toma","year":"2020","unstructured":"Toma, A.M., Cerchiello, P.: Initial coin offerings: risk or opportunity? Front. Artif. Intell. 3, 18 (2020). https:\/\/doi.org\/10.3389\/frai.2020.00018","journal-title":"Front. Artif. Intell."},{"key":"31_CR29","unstructured":"U.S. Securities and Exchange Commission. SEC Emergency Action Halts ICO Scam (2017). https:\/\/www.sec.gov\/news\/press-release\/2017-219"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Vrij, A.: A cognitive approach to lie detection. In: Granhag, P.A., Vrij, A., Verschuere, B. (Eds.): Detecting Deception: Current Challenges and Cognitive Approaches, pp. 205\u2013229. Wiley-Blackwell (2015)","DOI":"10.1002\/9781118510001.ch9"},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 598\u2013607 (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"31_CR32","unstructured":"Xuan, M., Zhu, X., Zhao, J.L.: Impact of social media on fundraising success in initial coin offering (Ico): an empirical investigation. In: 24th Pacific Asia Conference on Information Systems (PACIS 2020). Association for Information Systems (2020)"},{"issue":"2","key":"31_CR33","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1080\/07421222.2016.1205907","volume":"33","author":"D Zhang","year":"2016","unstructured":"Zhang, D., Zhou, L., Kehoe, J.L., Kilic, I.Y.: What online reviewer behaviors really matter? Effects of verbal and nonverbal behaviors on detection of fake online reviews. J. Manag. Inf. Syst. 33(2), 456\u2013481 (2016)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"31_CR34","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou, L., Burgoon, J.K., Nunamaker, J.F., Twitchell, D.: Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis. Negot. 13(1), 81\u2013106 (2004)","journal-title":"Group Decis. Negot."},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Zou, S., Sun, H., Xu, G., Quan, R.: Ensemble strategy for insider threat detection from user activity logs. Comput. Mater. Continua 11, 14 (2020)","DOI":"10.32604\/cmc.2020.09649"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5209-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:21:39Z","timestamp":1710350499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5209-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811952081","9789811952098"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5209-8_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}