{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:06:32Z","timestamp":1774645592461,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819672370","type":"print"},{"value":"9789819672387","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-96-7238-7_26","type":"book-chapter","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T14:25:34Z","timestamp":1753194334000},"page":"326-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LLM Non-text-focused Data Generation for\u00a0Payroll Fraud Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8961-3051","authenticated-orcid":false,"given":"Farah","family":"Ouesleti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9687-720X","authenticated-orcid":false,"given":"Khaoula","family":"ElBedoui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2123-4992","authenticated-orcid":false,"given":"Walid","family":"Barhoumi","sequence":"additional","affiliation":[]},{"given":"Mohamed Amine","family":"Aissaoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,23]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Ahuja, K., et\u00a0al.: Mega: multilingual evaluation of generative AI (2023). https:\/\/doi.org\/10.48550\/arXiv.2303.12528","DOI":"10.48550\/arXiv.2303.12528"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11831-019-09388-y","volume":"28","author":"H Alqahtani","year":"2019","unstructured":"Alqahtani, H., Kavakli-Thorne, M., Kumar, G.: Applications of generative adversarial networks (GANs): an updated review. Arch. Comput. Methods Eng. 28(2), 525\u2013552 (2019). https:\/\/doi.org\/10.1007\/s11831-019-09388-y","journal-title":"Arch. Comput. Methods Eng."},{"key":"26_CR3","unstructured":"Ba, H.: Improving detection of credit card fraudulent transactions using generative adversarial networks (2019). https:\/\/arxiv.org\/abs\/1907.03355"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Brown, T.B., et\u00a0al.: Language models are few-shot learners (2020). https:\/\/doi.org\/10.48550\/arXiv.2005.14165","DOI":"10.48550\/arXiv.2005.14165"},{"key":"26_CR5","doi-asserted-by":"publisher","unstructured":"Btoush, E.A.L.M., et al.: A systematic review of literature on credit card cyber fraud detection using machine and deep learning (2023). https:\/\/doi.org\/10.7717\/peerj-cs.1278","DOI":"10.7717\/peerj-cs.1278"},{"key":"26_CR6","unstructured":"Cheng, D., et\u00a0al.: Adapting large language models via reading comprehension (2023). https:\/\/arxiv.org\/abs\/2309.09530"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Ding, B., et\u00a0al.: Is GPT-3 a good data annotator? (2023). https:\/\/doi.org\/10.48550\/arXiv.2212.10450","DOI":"10.48550\/arXiv.2212.10450"},{"key":"26_CR8","unstructured":"Eldan, R., Li, Y.: Tinystories: how small can language models be and still speak coherent English? (2023). https:\/\/arxiv.org\/abs\/2305.07759"},{"key":"26_CR9","unstructured":"Frid-Adar, M., et\u00a0al.: Synthetic data augmentation using GAN for improved liver lesion classification (2018). https:\/\/arxiv.org\/abs\/1801.02385"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Guha, N., et\u00a0al.: Legalbench: a collaboratively built benchmark for measuring legal reasoning in large language models (2023). https:\/\/arxiv.org\/abs\/2308.11462","DOI":"10.2139\/ssrn.4583531"},{"key":"26_CR11","unstructured":"Gunasekar, S., et\u00a0al.: Textbooks are all you need (2023). https:\/\/arxiv.org\/abs\/2306.11644"},{"key":"26_CR12","unstructured":"Hu, E.J., et\u00a0al.: Lora: low-rank adaptation of large language models (2021). https:\/\/arxiv.org\/abs\/2106.09685"},{"key":"26_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015600","author":"T Huang","year":"2020","unstructured":"Huang, T., et al.: Using variational auto encoding in credit card fraud detection. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3015600","journal-title":"IEEE Access"},{"key":"26_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2009.12.004","author":"M Jans","year":"2010","unstructured":"Jans, M., et al.: Internal fraud risk reduction: results of a data mining case study. Int. J. Account. Inf. Syst. (2010). https:\/\/doi.org\/10.1016\/j.accinf.2009.12.004","journal-title":"Int. J. Account. Inf. Syst."},{"key":"26_CR15","unstructured":"Jiang, A.Q., et\u00a0al.: Mistral 7b (2023). https:\/\/arxiv.org\/abs\/2310.06825"},{"key":"26_CR16","unstructured":"Kurakin, A., et\u00a0al.: Harnessing large-language models to generate private synthetic text (2024). https:\/\/arxiv.org\/abs\/2306.01684"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Li, H.: Financial fraud detection by using grammar-based multiobjective genetic programming with ensemble learning (2015). https:\/\/doi.org\/10.1109\/CEC.2015.7257014","DOI":"10.1109\/CEC.2015.7257014"},{"key":"26_CR18","unstructured":"Li, Z., et\u00a0al.: Synthetic data generation with large language models for text classification: potential and limitations (2023). https:\/\/arxiv.org\/abs\/2310.07849"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., et\u00a0al.: G-eval: NLG evaluation using GPT-4 with better human alignment (2023). https:\/\/arxiv.org\/abs\/2303.16634","DOI":"10.18653\/v1\/2023.emnlp-main.153"},{"key":"26_CR20","unstructured":"Long, L., et\u00a0al.: On LLMs-driven synthetic data generation, curation, and evaluation: a survey (2024). https:\/\/arxiv.org\/abs\/2406.15126"},{"key":"26_CR21","doi-asserted-by":"publisher","unstructured":"Mohiuddin, A., et\u00a0al.: A novel approach for outlier detection and clustering improvement. In: 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA) (2013). https:\/\/doi.org\/10.1109\/ICIEA.2013.6566435","DOI":"10.1109\/ICIEA.2013.6566435"},{"key":"26_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.006","author":"P Ravisankar","year":"2011","unstructured":"Ravisankar, P., et al.: Detection of financial statement fraud and feature selection using data mining techniques. Decis. Support Syst. (2011). https:\/\/doi.org\/10.1016\/j.dss.2010.11.006","journal-title":"Decis. Support Syst."},{"key":"26_CR23","unstructured":"Scao, T., et\u00a0al.: Bloom: a 176b-parameter open-access multilingual language model (2023). https:\/\/arxiv.org\/abs\/2211.05100"},{"key":"26_CR24","doi-asserted-by":"publisher","unstructured":"Sengar, S.S., et\u00a0al.: Generative artificial intelligence: a systematic review and applications (2024). https:\/\/doi.org\/10.48550\/arXiv.2405.11029","DOI":"10.48550\/arXiv.2405.11029"},{"key":"26_CR25","doi-asserted-by":"publisher","unstructured":"S\u00e1nchez-Aguayo, M., et al.: Fraud detection using the fraud triangle theory and data mining techniques: a literature review. Computers (2021). https:\/\/doi.org\/10.3390\/computers10100121","DOI":"10.3390\/computers10100121"},{"key":"26_CR26","unstructured":"Tang, R., et\u00a0al.: Does synthetic data generation of LLMs help clinical text mining? (2023). https:\/\/arxiv.org\/abs\/2303.04360"},{"key":"26_CR27","unstructured":"Touvron, H., et\u00a0al.: Llama: open and efficient foundation language models (2023). https:\/\/arxiv.org\/abs\/2302.13971"},{"key":"26_CR28","unstructured":"Wang, Q., et\u00a0al.: Learning from synthetic data for crowd counting in the wild (2019). https:\/\/arxiv.org\/abs\/1903.03303"},{"key":"26_CR29","unstructured":"Wei, J., et\u00a0al.: Chain-of-thought prompting elicits reasoning in large language models (2023). https:\/\/arxiv.org\/abs\/2201.11903"},{"key":"26_CR30","unstructured":"Wu, S., et\u00a0al.: Bloomberggpt: a large language model for finance (2023). https:\/\/arxiv.org\/abs\/2303.17564"},{"key":"26_CR31","unstructured":"Xu, C., et\u00a0al.: Wizardlm: empowering large language models to follow complex instructions (2023). https:\/\/arxiv.org\/abs\/2304.12244"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Yang, H., et\u00a0al.: Fingpt: open-source financial large language models (2023). https:\/\/arxiv.org\/abs\/2306.06031","DOI":"10.2139\/ssrn.4489826"},{"key":"26_CR33","doi-asserted-by":"publisher","unstructured":"Yaya, H., et\u00a0al.: Learning temporal representation of transaction amount for fraudulent transaction recognition using CNN, stacked LSTM, and CNN-LSTM. In: 2017 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) (2017). https:\/\/doi.org\/10.1109\/CYBERNETICSCOM.2017.8311689","DOI":"10.1109\/CYBERNETICSCOM.2017.8311689"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-7238-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:34:21Z","timestamp":1774643661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-7238-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,23]]},"ISBN":["9789819672370","9789819672387"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-7238-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,23]]},"assertion":[{"value":"23 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunis","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc2024.redcad.tn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}