{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:38:04Z","timestamp":1773967084737,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":49,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789811989902","type":"print"},{"value":"9789811989919","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8991-9_8","type":"book-chapter","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T08:04:02Z","timestamp":1674029042000},"page":"91-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research Hotspots, Emerging Trend and Front of Fraud Detection Research: A Scientometric Analysis (1984\u20132021)"],"prefix":"10.1007","author":[{"given":"Li","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zili","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Fraud: Detection, Prevention, and Analytics! In: Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques, pp. 1\u201336. John Wiley and Sons, Inc., Hoboken (2015)","DOI":"10.1002\/9781119146841.ch1"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-319-25159-2_51","volume-title":"Knowledge Science, Engineering and Management","author":"C Sun","year":"2015","unstructured":"Sun, C., Li, Q., Cui, L., Yan, Z., Li, H., Wei, W.: An effective hybrid fraud detection method. In: Zhang, S., Wirsing, M., Zhang, Z. (eds.) KSEM 2015. LNCS (LNAI), vol. 9403, pp. 563\u2013574. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25159-2_51"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1017\/S0022109011000457","volume":"46","author":"F Yu","year":"2011","unstructured":"Yu, F., Yu, X.: Corporate lobbying and fraud detection. J. Financ. Quant. Anal. 46, 1865\u20131891 (2011)","journal-title":"J. Financ. Quant. Anal."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1111\/1539-6975.00023","volume":"69","author":"S Viaene","year":"2002","unstructured":"Viaene, S., Derrig, R.A., Baesens, B., Dedene, G.: A comparison of state-of-the-art classification techniques for expert automobile insurance claim fraud detection. J. Risk Insur. 69, 373\u2013421 (2002). https:\/\/doi.org\/10.1111\/1539-6975.00023","journal-title":"J. Risk Insur."},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1287\/mnsc.1100.1174","volume":"56","author":"M Cecchini","year":"2010","unstructured":"Cecchini, M., Aytug, H., Koehler, G.J., Pathak, P.: Detecting management fraud in public companies. Manage. Sci. 56, 1146\u20131160 (2010). https:\/\/doi.org\/10.1287\/mnsc.1100.1174","journal-title":"Manage. Sci."},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10742-016-0154-8","volume":"17","author":"R Bauder","year":"2016","unstructured":"Bauder, R., Khoshgoftaar, T.M., Seliya, N.: A survey on the state of healthcare upcoding fraud analysis and detection. Health Serv. Outcomes Res. Method. 17(1), 31\u201355 (2016). https:\/\/doi.org\/10.1007\/s10742-016-0154-8","journal-title":"Health Serv. Outcomes Res. Method."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"R Bolton","year":"2002","unstructured":"Bolton, R., Hand, D.: Statistical fraud detection: a review. Stat. Sci. 17, 235\u2013249 (2002)","journal-title":"Stat. Sci."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Kou, Y., et al.: Survey of fraud detection techniques. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, vol. 2, pp. 749\u2013754 (2004)","DOI":"10.1109\/ICNSC.2004.1297040"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West, J., Bhattacharya, M.: Intelligent financial fraud detection: a comprehensive review. Comput. Secur. 57, 47\u201366 (2016)","journal-title":"Comput. Secur."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"72504","DOI":"10.1109\/ACCESS.2021.3096799","volume":"10","author":"MN Ashtiani","year":"2022","unstructured":"Ashtiani, M.N., Raahemi, B.: Intelligent fraud detection in financial statements using machine learning and data mining: a systematic literature review. IEEE Access 10, 72504\u201372525 (2022)","journal-title":"IEEE Access"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.foodcont.2017.11.034","volume":"86","author":"MP Callao","year":"2018","unstructured":"Callao, M.P., Ruisanchez, I.: An overview of multivariate qualitative methods for food fraud detection. Food Control 86, 283\u2013293 (2018)","journal-title":"Food Control"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"26893","DOI":"10.1109\/ACCESS.2020.2971604","volume":"8","author":"B Omair","year":"2020","unstructured":"Omair, B., Alturki, A.: A systematic literature review of fraud detection metrics in business processes. IEEE Access 8, 26893\u201326903 (2020)","journal-title":"IEEE Access"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi, T., et al.: Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis. Support Syst. 133, 113303 (2020)","journal-title":"Decis. Support Syst."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, S., Mehta, S.K.: Data mining-based financial statement fraud detection: systematic literature review and meta-analysis to estimate data sample mapping of fraudulent companies against non-fraudulent companies. Glob. Bus. Rev. (2021). 097215092098485","DOI":"10.1177\/0972150920984857"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"100402","DOI":"10.1016\/j.cosrev.2021.100402","volume":"40","author":"KG Al-Hashedi","year":"2021","unstructured":"Al-Hashedi, K.G., Magalingam, P.: Financial fraud detection applying data mining techniques: a comprehensive review from 2009 to 2019. Comput. Sci. Rev. 40, 100402 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"8_CR16","unstructured":"Nana, W., Wang, F.: Comparative analysis on domestic and foreign financial fraud research based on knowledge map-web of science core collection. In: Proceedings of the 2017 4th International Conference on Management Innovation and Business Innovation (ICMIBI 2017), vol. 81, no. 2017, pp. 81\u201390 (2017)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1108\/jfc-03-2021-0052","volume":"29","author":"AZ Mansour","year":"2021","unstructured":"Mansour, A.Z., Ahmi, A., Popoola, O.M.J., Znaimat, A.: Discovering the global landscape of fraud detection studies: a bibliometric review. J. Financ. Crime 29, 701\u2013720 (2021). https:\/\/doi.org\/10.1108\/jfc-03-2021-0052","journal-title":"J. Financ. Crime"},{"key":"8_CR18","series-title":"Studies in Classification, Data Analysis, and Knowledge Organization","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-540-70981-7_34","volume-title":"Advances in Data Analysis","author":"NJ van Eck","year":"2007","unstructured":"van Eck, N.J., Waltman, L.: VOS: a new method for visualizing similarities between objects. In: Decker, R., Lenz, H.-J. (eds.) Advances in Data Analysis. SCDAKO, pp. 299\u2013306. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70981-7_34"},{"key":"8_CR19","unstructured":"Li, Z., Li, Z., Zhao, Z., et al.: Landscapes and emerging trends of virtual reality in recent 30 years: a bibliometric analysis. In: Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI). IEEE (2018)"},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","volume":"11","author":"M Aria","year":"2017","unstructured":"Aria, M., Cuccurullo, C.: Bibliometrix\u202f: an R-tool for comprehensive science mapping analysis. J. Informet. 11(4), 959\u2013975 (2017)","journal-title":"J. Informet."},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1002\/asi.20317","volume":"57","author":"C Chen","year":"2006","unstructured":"Chen, C.: CiteSpace II: detecting and visualizing emerging trends and transient patterns in scientific literature. J. Am. Soc. Inform. Sci. Technol. 57(3), 359\u2013377 (2006)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: Bursty and hierarchical structure in streams. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2002. ACM Press (2002)","DOI":"10.1145\/775047.775061"},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1037\/0033-2909.92.3.726","volume":"92","author":"D Rogosa","year":"1982","unstructured":"Rogosa, D., Brandt, D., Zimowski, M.: A growth curve approach to the measurement of change. Psychol. Bull. 92(3), 726\u2013748 (1982)","journal-title":"Psychol. Bull."},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11192-006-0144-7","volume":"69","author":"L Egghe","year":"2006","unstructured":"Egghe, L.: Theory and practise of the g-index. Scientometrics 69, 131\u2013152 (2006)","journal-title":"Scientometrics"},{"issue":"10","key":"8_CR25","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)","journal-title":"J. Stat. Mech: Theory Exp."},{"issue":"2","key":"8_CR26","first-page":"334","volume":"65","author":"C Chen","year":"2013","unstructured":"Chen, C., Leydesdorff, L.: Patterns of connections and movements in dual-map overlays: A new method of publication portfolio analysis. J. Am. Soc. Inf. Sci. 65(2), 334\u2013351 (2013)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1009700419189","volume":"1","author":"T Fawcett","year":"1997","unstructured":"Fawcett, T., Provost, F.: Adaptive fraud detection. Data Min. Knowl. Discovery 1, 291\u2013316 (1997). https:\/\/doi.org\/10.1023\/A:1009700419189","journal-title":"Data Min. Knowl. Discovery"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","volume":"50","author":"EWT Ngai","year":"2011","unstructured":"Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50, 559\u2013569 (2011). https:\/\/doi.org\/10.1016\/j.dss.2010.08.006","journal-title":"Decis. Support Syst."},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/5254.809570","volume":"14","author":"P Chan","year":"1999","unstructured":"Chan, P., Fan, W., Prodromidis, A., Stolfo, S.: Distributed data mining in credit card fraud detection. IEEE Intell. Syst. Their Appl. 14, 67\u201374 (1999). https:\/\/doi.org\/10.1109\/5254.809570","journal-title":"IEEE Intell. Syst. Their Appl."},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.007","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TDSC.2007.70228","volume":"5","author":"A Srivastava","year":"2008","unstructured":"Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit card fraud detection using hidden Markov model. IEEE Trans. Dependable Secure Comput. 5, 37\u201348 (2008). https:\/\/doi.org\/10.1109\/TDSC.2007.70228","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"5916","DOI":"10.1016\/j.eswa.2013.05.021","volume":"40","author":"Y Sahin","year":"2013","unstructured":"Sahin, Y., Bulkan, S., Duman, E.: A cost-sensitive decision tree approach for fraud detection. Expert Syst. Appl. 40, 5916\u20135923 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2013.05.021","journal-title":"Expert Syst. Appl."},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Dal Pozzolo","year":"2014","unstructured":"Dal Pozzolo, A., Caelen, O., Le Borgne, Y.-A., Waterschoot, S., Bontempi, G.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41, 4915\u20134928 (2014). https:\/\/doi.org\/10.1016\/j.eswa.2014.02.026","journal-title":"Expert Syst. Appl."},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1002\/asi.4630240406","volume":"24","author":"H Small","year":"1973","unstructured":"Small, H.: Co-citation in the scientific literature: a new measure of the relationship between two documents. J. Am. Soc. Inform. Sci. 24, 265\u2013269 (1973). https:\/\/doi.org\/10.1002\/asi.4630240406","journal-title":"J. Am. Soc. Inform. Sci."},{"key":"8_CR35","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.eswa.2015.12.030","volume":"51","author":"A Correa Bahnsen","year":"2016","unstructured":"Correa Bahnsen, A., Aouada, D., Stojanovic, A., Ottersten, B.: Feature engineering strategies for credit card fraud detection. Expert Syst. Appl. 51, 134\u2013142 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2015.12.030","journal-title":"Expert Syst. Appl."},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","volume":"75","author":"V Van Vlasselaer","year":"2015","unstructured":"Van Vlasselaer, V., et al.: APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support Syst. 75, 38\u201348 (2015). https:\/\/doi.org\/10.1016\/j.dss.2015.04.013","journal-title":"Decis. Support Syst."},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.eswa.2018.01.037","volume":"100","author":"J Jurgovsky","year":"2018","unstructured":"Jurgovsky, J., et al.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234\u2013245 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.01.037","journal-title":"Expert Syst. Appl."},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.eswa.2018.06.011","volume":"110","author":"S Nami","year":"2018","unstructured":"Nami, S., Shajari, M.: Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors. Expert Syst. Appl. 110, 381\u2013392 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.06.011","journal-title":"Expert Syst. Appl."},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Rushin, G., Stancil, C., Sun, M., Adams, S., Beling, P.: Horse race analysis in credit card fraud\u2014deep learning, logistic regression, and gradient boosted tree. In: Proceedings of the 2017 Systems and Information Engineering Design Symposium (SIEDS). IEEE (2017)","DOI":"10.1109\/SIEDS.2017.7937700"},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/tcss.2018.2856910","volume":"5","author":"L Zheng","year":"2018","unstructured":"Zheng, L., Liu, G., Yan, C., Jiang, C.: Transaction fraud detection based on total order relation and behavior diversity. IEEE Trans. Comput. Soc. Syst. 5, 796\u2013806 (2018). https:\/\/doi.org\/10.1109\/tcss.2018.2856910","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, USA (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"8_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0138-3","volume":"5","author":"M Herland","year":"2018","unstructured":"Herland, M., Khoshgoftaar, T.M., Bauder, R.A.: Big Data fraud detection using multiple medicare data sources. J. Big Data 5(1), 1\u201321 (2018). https:\/\/doi.org\/10.1186\/s40537-018-0138-3","journal-title":"J. Big Data"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.dss.2017.11.001","volume":"105","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Xu, W.: Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud. Decis. Support Syst. 105, 87\u201395 (2018)","journal-title":"Decis. Support Syst."},{"key":"8_CR44","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10462-004-4304-y","volume":"22","author":"A Hodge","year":"2004","unstructured":"Hodge, A.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85\u2013126 (2004). https:\/\/doi.org\/10.1007\/s10462-004-4304-y","journal-title":"Artif. Intell. Rev."},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Maranzato, R., Pereira, A., Neubert, M., do Lago, A.P.: Fraud detection in reputation systems in e-markets using logistic regression and stepwise optimization. ACM SIGAPP Appl. Comput. Rev. 11, 14\u201326 (2010)","DOI":"10.1145\/1869687.1869689"},{"key":"8_CR46","doi-asserted-by":"publisher","first-page":"77","DOI":"10.2308\/aud.2005.24.1.77","volume":"24","author":"R Cleary","year":"2005","unstructured":"Cleary, R., Thibodeau, J.C.: Applying digital analysis using Benford\u2019s law to detect fraud: the dangers of type I errors. Auditing J. Pract. Theory 24, 77\u201381 (2005). https:\/\/doi.org\/10.2308\/aud.2005.24.1.77","journal-title":"Auditing J. Pract. Theory"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Yang, X., Zhou, J., Li, X., Song, L.: Heterogeneous graph neural networks for malicious account detection. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management. ACM, New York (2018)","DOI":"10.1145\/3269206.3272010"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: Proceedings of the 2019 IEEE International Conference on Data Mining (ICDM). IEEE (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York (2020)","DOI":"10.1145\/3397271.3401253"}],"container-title":["Communications in Computer and Information Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8991-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T11:41:20Z","timestamp":1728733280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8991-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811989902","9789811989919"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8991-9_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"135","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}