{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:06:14Z","timestamp":1760832374848,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819534586","type":"print"},{"value":"9789819534593","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3459-3_3","type":"book-chapter","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T02:22:29Z","timestamp":1760754149000},"page":"34-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AEFA: An Ensemble Framework for\u00a0Fraud Detection in\u00a0the\u00a0Forex Market"],"prefix":"10.1007","author":[{"given":"Weiyuan","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianke","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhengyi","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mingchen","family":"Ju","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuyue","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinglin","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lifan","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongfei","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Shepherd","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenjie","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,19]]},"reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1086\/503652","volume":"79","author":"RK Aggarwal","year":"2006","unstructured":"Aggarwal, R.K., Wu, G.: Stock market manipulations. J. Bus. 79(4), 1915\u20131953 (2006)","journal-title":"J. Bus."},{"key":"3_CR2","unstructured":"Boris, A.: Real-time threat detection in forex markets using ai and big data analytics (2024)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"6","key":"3_CR4","first-page":"111","volume":"2","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Li, M., Shu, M., Bi, W., Xia, S.: Multi-modal market manipulation detection in high-frequency trading using graph neural networks. J. Ind. Eng. Appl. Sci. 2(6), 111\u2013120 (2024)","journal-title":"J. Ind. Eng. Appl. Sci."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Guo, J., Long, S., Wu, Y., Sun, M., Zhang, R.: Advanced financial fraud detection using gnn-cl model. In: 2024 International Conference on Computers, Information Processing and Advanced Education (CIPAE), pp. 453\u2013460. IEEE (2024)","DOI":"10.1109\/CIPAE64326.2024.00088"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.jfi.2010.03.003","volume":"20","author":"C Comerton-Forde","year":"2011","unstructured":"Comerton-Forde, C., Putni\u0146\u0161, T.J.: Measuring closing price manipulation. J. Financial Intermediation 20(2), 135\u2013158 (2011)","journal-title":"J. Financial Intermediation"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113421","volume":"139","author":"P Craja","year":"2020","unstructured":"Craja, P., Kim, A., Lessmann, S.: Deep learning for detecting financial statement fraud. Decis. Support Syst. 139, 113421 (2020)","journal-title":"Decis. Support Syst."},{"issue":"10","key":"3_CR8","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Dal Pozzolo","year":"2014","unstructured":"Dal Pozzolo, A., Caelen, O., Le Borgne, Y.A., Waterschoot, S., Bontempi, G.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41(10), 4915\u20134928 (2014)","journal-title":"Expert Syst. Appl."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s42484-024-00143-6","volume":"6","author":"N Innan","year":"2024","unstructured":"Innan, N., et al.: Financial fraud detection using quantum graph neural networks. Quantum Mach. Intell. 6(1), 7 (2024)","journal-title":"Quantum Mach. Intell."},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jfineco.2014.03.006","volume":"113","author":"O Kadan","year":"2014","unstructured":"Kadan, O., Liu, F.: Performance evaluation with high moments and disaster risk. J. Financ. Econ. 113(1), 131\u2013155 (2014)","journal-title":"J. Financ. Econ."},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1111\/jofi.12498","volume":"72","author":"A Kirilenko","year":"2017","unstructured":"Kirilenko, A., Kyle, A.S., Samadi, M., Tuzun, T.: The flash crash: high-frequency trading in an electronic market. J. Financ. 72(3), 967\u2013998 (2017)","journal-title":"J. Financ."},{"key":"3_CR13","unstructured":"Li, F., Wang, X., Cheng, D., Zhang, W., Zhang, Y., Lin, X.: Hypergraph self-supervised learning with sampling-efficient signals. arXiv preprint arXiv:2404.11825 (2024)"},{"issue":"11","key":"3_CR14","doi-asserted-by":"publisher","first-page":"5576","DOI":"10.1109\/TKDE.2024.3409869","volume":"36","author":"F Li","year":"2024","unstructured":"Li, F., Xu, Z., Cheng, D., Wang, X.: Adarisk: risk-adaptive deep reinforcement learning for vulnerable nodes detection. IEEE Trans. Knowl. Data Eng. 36(11), 5576\u20135590 (2024)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR15","unstructured":"Li, T., Shin, D., Wang, B.: Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041 (2021)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1016\/j.procs.2024.08.112","volume":"242","author":"Y Li","year":"2024","unstructured":"Li, Y., Fu, B., Tong, Y., Tang, Z., Shang, Z., Li, A.: Abnormal detection of financial fraud in listed companies based on deep learning. Procedia Comput. Sci. 242, 1402\u20131409 (2024)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: Proceedings of the 43rd international ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1569\u20131572 (2020)","DOI":"10.1145\/3397271.3401253"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Z.: A comparative study of machine learning methods in financial fraud detection. In: 2024 2nd International Conference on Finance, Trade and Business Management (FTBM 2024), pp. 389\u2013397. Atlantis Press (2024)","DOI":"10.2991\/978-94-6463-546-1_44"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Mubalaike, A.M., Adali, E.: Deep learning approach for intelligent financial fraud detection system. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), pp. 598\u2013603. IEEE (2018)","DOI":"10.1109\/UBMK.2018.8566574"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Panda, G., Dhal, S.K., Majhi, P.R.: A machine learning-based approach to enhance fraud detection using decision tree. In: International Conference on Biologically Inspired Techniques in Many-Criteria Decision-Making Technologies, pp. 133\u2013143. Springer (2024)","DOI":"10.1007\/978-3-031-82706-8_14"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.procs.2019.01.007","volume":"148","author":"I Sadgali","year":"2019","unstructured":"Sadgali, I., Sael, N., Benabbou, F.: Performance of machine learning techniques in the detection of financial frauds. Procedia Comput. Sci. 148, 45\u201354 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR22","unstructured":"Tian, Y., Liu, G., Wang, J., Zhou, M.: Transaction fraud detection via an adaptive graph neural network. arXiv:2307.05633 (2023)"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"629","DOI":"10.3390\/s23020629","volume":"23","author":"N Ukey","year":"2023","unstructured":"Ukey, N., Yang, Z., Li, B., Zhang, G., Hu, Y., Zhang, W.: Survey on exact knn queries over high-dimensional data space. Sensors 23(2), 629 (2023)","journal-title":"Sensors"},{"key":"3_CR24","unstructured":"Vallarino, D.: Detecting financial fraud with hybrid deep learning: A mix-of-experts approach to sequential and anomalous patterns. arXiv:2504.03750 (2025)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Yu, J., Wang, H., Wang, X., Li, Z., Qin, L., Zhang, W., Liao, J., Zhang, Y.: Group-based fraud detection network on e-commerce platforms. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 5463\u20135475 (2023)","DOI":"10.1145\/3580305.3599836"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3459-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T02:22:38Z","timestamp":1760754158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3459-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"ISBN":["9789819534586","9789819534593"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3459-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,19]]},"assertion":[{"value":"19 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}