{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:11:01Z","timestamp":1775322661849,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100013076","name":"National Major Science and Technology Projects of China","doi-asserted-by":"publisher","award":["No. 2022ZD0116315"],"award-info":[{"award-number":["No. 2022ZD0116315"]}],"id":[{"id":"10.13039\/501100013076","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key R&D Program of Hubei Province","award":["No. 2023BAB077"],"award-info":[{"award-number":["No. 2023BAB077"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No. 2042023kf0219"],"award-info":[{"award-number":["No. 2042023kf0219"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018735","name":"Ant Group","doi-asserted-by":"publisher","award":["Ant Group"],"award-info":[{"award-number":["Ant Group"]}],"id":[{"id":"10.13039\/100018735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Sci. Eng."],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Traditional fraud detection approaches often use linking entities, such as device, email, and address, to identify fraudulent transactions and users. However, as fraud methods continue to evolve and escalate, the fraudsters can fabricate the involved entities and thus hide their real intent. To make fraud detection more robust, we incorporate user behaviors in the pipeline and consider biometric characteristics that are difficult to forge. In this work, we conduct a detailed study of how user behavior data can help identify and prevent fraudulent activity in e-commerce. We present Multi-Modal Behavioral Transformer (<jats:sc>MMBT<\/jats:sc>), where we combine both inner-page behavioral data, such as mouse trajectory, and inter-page behavioral data, such as page view sequences. We propose to construct mouse trajectory data as an image, treat each mouse position as a pixel in the image, convert the image into small patches, and hence transform the mouse trajectory into patch index sequences. Our experimental results on real-word data show that MMBT significantly outperforms baselines \u2014 the precision@recall = 0.1 increases by up to 7%. In addition, we have built an online pipeline to operationalize our model. In production, the 99th percentile latency is maintained below 500 milliseconds, allowing the platform to initiate rapid response measures and prevent potential losses.\n<\/jats:p>","DOI":"10.1007\/s41019-024-00275-6","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T08:28:34Z","timestamp":1736929714000},"page":"24-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Identifying E-Commerce Fraud Through User Behavior Data: Observations and Insights"],"prefix":"10.1007","volume":"10","author":[{"given":"Ziyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Susie Xi","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhurong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yinan","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Ruixuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuhao","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0051-0046","authenticated-orcid":false,"given":"Jiawei","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,15]]},"reference":[{"issue":"3","key":"275_CR1","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S Bhattacharyya","year":"2011","unstructured":"Bhattacharyya S, Jha S, Tharakunnel K, Westland JC (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602\u2013613","journal-title":"Decis Support Syst"},{"key":"275_CR2","doi-asserted-by":"publisher","first-page":"116429","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2022","unstructured":"Hilal W, Gadsden SA, Yawney J (2022) Financial fraud: a review of anomaly detection techniques and recent advances. Expert Syst Appl 193:116429","journal-title":"Expert Syst Appl"},{"key":"275_CR3","doi-asserted-by":"crossref","unstructured":"Breuer A, Eilat R, Weinsberg U (2020) Friend or faux: graph-based early detection of fake accounts on social networks. In: Proceedings of the web conference, pp 1287\u20131297","DOI":"10.1145\/3366423.3380204"},{"key":"275_CR4","unstructured":"Wu J, Yao M, Wu D, Chi M, Wang B, Wu R, Fu X, Meng C, Wang (2023) Dedgat: dual embedding of directed graph attention networks for detecting financial risk. arXiv preprint arXiv:2303.03933"},{"key":"275_CR5","doi-asserted-by":"publisher","first-page":"110038","DOI":"10.1016\/j.knosys.2022.110038","volume":"258","author":"S Li","year":"2022","unstructured":"Li S, Yang J, Liang G, Li T, Zhao K (2022) Sybilflyover: heterogeneous graph-based fake account detection model on social networks. Knowl-Based Syst 258:110038","journal-title":"Knowl-Based Syst"},{"key":"275_CR6","doi-asserted-by":"crossref","unstructured":"Chai Z, Yang Y, Dan J, Tian S, Meng C, Wang W, Sun Y (2023) Towards learning to discover money laundering sub-network in massive transaction network. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, No 12, pp 14153\u201314160","DOI":"10.1609\/aaai.v37i12.26656"},{"key":"275_CR7","doi-asserted-by":"crossref","unstructured":"Li X, Li Y, Mo X, Xiao H, Shen Y, Chen L (2023) Diga: guided diffusion model for graph recovery in anti-money laundering. In: Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining, pp 4404\u20134413","DOI":"10.1145\/3580305.3599806"},{"key":"275_CR8","doi-asserted-by":"crossref","unstructured":"Wang J, Wen R, Wu C, Huang Y, Xiong J (2019) Fdgars: fraudster detection via graph convolutional networks in online app review system. In: Companion proceedings of the world wide web conference, pp 310\u2013316","DOI":"10.1145\/3308560.3316586"},{"key":"275_CR9","doi-asserted-by":"crossref","unstructured":"Shu K, Mahudeswaran D, Wang S, Liu H (2020) Hierarchical propagation networks for fake news detection: investigation and exploitation. In: Proceedings of the international AAAI conference on web and social media, vol 14, No 1, pp 626\u2013637","DOI":"10.1609\/icwsm.v14i1.7329"},{"key":"275_CR10","doi-asserted-by":"crossref","unstructured":"Cao B, Mao M, Viidu S, Philip SY (2017) Hitfraud: a broad learning approach for collective fraud detection in heterogeneous information networks. In: IEEE international conference on data mining, pp 769\u2013774","DOI":"10.1109\/ICDM.2017.90"},{"key":"275_CR11","doi-asserted-by":"crossref","unstructured":"Zhu Y, Xi D, Song B, Zhuang F, Chen S, Gu X, He Q (2020) Modeling user\u2019s behavior sequences with hierarchical explainable network for cross-domain fraud detection. In: Proceedings of the web conference, pp 928\u2013938","DOI":"10.1145\/3366423.3380172"},{"key":"275_CR12","doi-asserted-by":"crossref","unstructured":"Cao S, Yang X, Chen C, Zhou J, Li X, Qi Y (2019) Titant: online real-time transaction fraud detection in ant financial. arXiv preprint arXiv:1906.07407","DOI":"10.14778\/3352063.3352126"},{"key":"275_CR13","doi-asserted-by":"crossref","unstructured":"Li Z, Wang H, Zhang P, Hui P, Huang J, Liao J, Zhang J, Bu J (2021) Live-streaming fraud detection: a heterogeneous graph neural network approach. In: Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining, pp 3670\u20133678","DOI":"10.1145\/3447548.3467065"},{"key":"275_CR14","doi-asserted-by":"crossref","unstructured":"Liu C, Sun L, Ao X, Feng J, He Q, Yang H (2021) Intention-aware heterogeneous graph attention networks for fraud transactions detection. In: Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining, pp 3280\u20133288","DOI":"10.1145\/3447548.3467142"},{"key":"275_CR15","unstructured":"Tian Y, Liu G (2023) Transaction fraud detection via spatial-temporal-aware graph transformer. arXiv preprint arXiv:2307.05121"},{"key":"275_CR16","doi-asserted-by":"crossref","unstructured":"Yin H, Zhang Z, Wang Z, \u00d6zyurt Y, Liang W, Dong W, Zhao Y, Shan Y (2022) Behavioral graph fraud detection in e-commerce. In: IEEE international conference on data mining workshops, pp 1\u20138","DOI":"10.1109\/ICDMW58026.2022.00105"},{"issue":"6","key":"275_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3640311","volume":"56","author":"S Khan","year":"2024","unstructured":"Khan S, Devlen C, Manno M, Hou D (2024) Mouse dynamics behavioral biometrics: a survey. ACM Comput Surv 56(6):1\u201333","journal-title":"ACM Comput Surv"},{"key":"275_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher C, Elovici Y, Moskovitch R, Rokach L, Schclar A (2012) User identity verification via mouse dynamics. Inf Sci 201:19\u201336","journal-title":"Inf Sci"},{"issue":"1","key":"275_CR19","first-page":"3898951","volume":"2019","author":"T Hu","year":"2019","unstructured":"Hu T, Niu W, Zhang X, Liu X, Lu J, Liu Y (2019) An insider threat detection approach based on mouse dynamics and deep learning. Secur Commun Netw 2019(1):3898951","journal-title":"Secur Commun Netw"},{"key":"275_CR20","doi-asserted-by":"crossref","unstructured":"Awad A (2017) Collective framework for fraud detection using behavioral biometrics. Inf Secur Pract Emerg Threats Perspect 29\u201337","DOI":"10.1007\/978-3-319-48947-6_3"},{"key":"275_CR21","doi-asserted-by":"crossref","unstructured":"Almalki S, Chatterjee P, Roy K (2019) Continuous authentication using mouse clickstream data analysis. In: Security, privacy, and anonymity in computation, communication, and storage, pp 76\u201385","DOI":"10.1007\/978-3-030-24900-7_6"},{"key":"275_CR22","unstructured":"Maes S, Tuyls K, Vanschoenwinkel B, Manderick B (2002) Credit card fraud detection using bayesian and neural networks. In: Proceedings of the international Naiso congress on neuro fuzzy technologies, vol 261, p 270"},{"issue":"3","key":"275_CR23","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","volume":"50","author":"EW Ngai","year":"2011","unstructured":"Ngai EW, Hu Y, Wong YH, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis Support Syst 50(3):559\u2013569","journal-title":"Decis Support Syst"},{"issue":"1","key":"275_CR24","first-page":"1","volume":"3","author":"S Dhanalakshmi","year":"2014","unstructured":"Dhanalakshmi S, Subramanian C (2014) An analysis of data mining applications for fraud detection in securities market. Int J Data Min Tech Appl 3(1):1\u20139","journal-title":"Int J Data Min Tech Appl"},{"issue":"2","key":"275_CR25","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.dss.2010.11.006","volume":"50","author":"P Ravisankar","year":"2011","unstructured":"Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decis Support Syst 50(2):491\u2013500","journal-title":"Decis Support Syst"},{"issue":"3","key":"275_CR26","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/j.dss.2010.08.010","volume":"50","author":"FH Glancy","year":"2011","unstructured":"Glancy FH, Yadav SB (2011) A computational model for financial reporting fraud detection. Decis Support Syst 50(3):595\u2013601","journal-title":"Decis Support Syst"},{"key":"275_CR27","unstructured":"Sithic HL, Balasubramanian T (2013) Survey of insurance fraud detection using data mining techniques. arXiv preprint arXiv:1309.0806"},{"issue":"3","key":"275_CR28","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1111\/j.1539-6975.2006.00182.x","volume":"73","author":"J Schiller","year":"2006","unstructured":"Schiller J (2006) The impact of insurance fraud detection systems. J Risk Insur 73(3):421\u2013438","journal-title":"J Risk Insur"},{"issue":"3","key":"275_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474379","volume":"40","author":"G Zhang","year":"2022","unstructured":"Zhang G, Li Z, Huang J, Wu J, Zhou C, Yang J, Gao J (2022) efraudcom: an e-commerce fraud detection system via competitive graph neural networks. ACM Trans Inf Syst 40(3):1\u201329","journal-title":"ACM Trans Inf Syst"},{"key":"275_CR30","doi-asserted-by":"crossref","unstructured":"Wang S, Liu C, Gao X, Qu H, Xu W (2017) Session-based fraud detection in online e-commerce transactions using recurrent neural networks. In: Machine learning and knowledge discovery in databases: european conference, pp 241\u2013252 . Springer","DOI":"10.1007\/978-3-319-71273-4_20"},{"key":"275_CR31","unstructured":"Li L, Liu Z, Chen C, Zhang Y-L, Zhou J, Li X (2019) A time attention based fraud transaction detection framework. arXiv preprint arXiv:1912.11760"},{"key":"275_CR32","unstructured":"Rao SX, Han Z, Yin H, Jiang J, Zhang Z, Zhao Y, Shan Y (2024) Fraud detection at ebay. Emerg Markets Rev 1\u201333"},{"issue":"4","key":"275_CR33","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/TNNLS.2021.3137396","volume":"35","author":"X Su","year":"2022","unstructured":"Su X, Xue S, Liu F, Wu J, Yang J, Zhou C, Hu W, Paris C, Nepal S, Jin D et al (2022) A comprehensive survey on community detection with deep learning. IEEE Trans Neural Netw Learn Syst 35(4):4682\u20134702","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"275_CR34","doi-asserted-by":"crossref","unstructured":"Weng H, Li Z, Ji S, Chu C, Lu H, Du T, He Q (2018) Online e-commerce fraud: a large-scale detection and analysis. In: IEEE International conference on data engineering, pp 1435\u20131440 . IEEE","DOI":"10.1109\/ICDE.2018.00162"},{"key":"275_CR35","unstructured":"Min W, Liang W, Yin H, Wang Z, Li M, Lal A (2021) Explainable deep behavioral sequence clustering for transaction fraud detection. arXiv preprint arXiv:2101.04285"},{"key":"275_CR36","unstructured":"Ma J, Zhang D, Wang Y, Zhang Y, Pozdnoukhov A (2018) Graphrad: a graph-based risky account detection system. In: Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining, vol 9, pp 1\u20139"},{"issue":"24","key":"275_CR37","doi-asserted-by":"publisher","first-page":"13121","DOI":"10.3390\/app132413121","volume":"13","author":"MT Aras","year":"2023","unstructured":"Aras MT, Guvensan MA (2023) A multi-modal profiling fraud-detection system for capturing suspicious airline ticket activities. Appl Sci 13(24):13121","journal-title":"Appl Sci"},{"issue":"7","key":"275_CR38","doi-asserted-by":"publisher","first-page":"800","DOI":"10.3390\/electronics10070800","volume":"10","author":"J Park","year":"2021","unstructured":"Park J, Kim M-H, Choi D-G (2021) Correspondence learning for deep multi-modal recognition and fraud detection. Electronics 10(7):800","journal-title":"Electronics"},{"key":"275_CR39","doi-asserted-by":"crossref","unstructured":"Park J, Kim M-H, Choi S, Kweon IS, Choi D-G (2019) Fraud detection with multi-modal attention and correspondence learning. In: International conference on electronics, information, and communication, pp 1\u20137 . IEEE","DOI":"10.23919\/ELINFOCOM.2019.8706354"},{"key":"275_CR40","doi-asserted-by":"publisher","first-page":"113913","DOI":"10.1016\/j.dss.2022.113913","volume":"167","author":"G Wang","year":"2023","unstructured":"Wang G, Ma J, Chen G (2023) Attentive statement fraud detection: distinguishing multimodal financial data with fine-grained attention. Decis Support Syst 167:113913","journal-title":"Decis Support Syst"},{"key":"275_CR41","doi-asserted-by":"publisher","first-page":"101207","DOI":"10.1016\/j.elerap.2022.101207","volume":"56","author":"VF Rodrigues","year":"2022","unstructured":"Rodrigues VF, Policarpo LM, Silveira DE, Rosa Righi R, Costa CA, Barbosa JLV, Antunes RS, Scorsatto R, Arcot T (2022) Fraud detection and prevention in e-commerce: a systematic literature review. Electron Commer Res Appl 56:101207","journal-title":"Electron Commer Res Appl"},{"key":"275_CR42","doi-asserted-by":"crossref","unstructured":"Zheng N, Paloski A, Wang H (2011) An efficient user verification system via mouse movements. In: Proceedings of the ACM conference on computer and communications security, pp 139\u2013150","DOI":"10.1145\/2046707.2046725"},{"key":"275_CR43","unstructured":"Mondal S, Bours P (2013) Continuous authentication using mouse dynamics. In: International conference of the BIOSIG special interest group, pp 1\u201312 . IEEE"},{"issue":"2","key":"275_CR44","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TDSC.2017.2771295","volume":"17","author":"C Shen","year":"2017","unstructured":"Shen C, Chen Y, Guan X, Maxion RA (2017) Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE Trans Dependable Secure Comput 17(2):335\u2013349","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"275_CR45","doi-asserted-by":"crossref","unstructured":"Tan YXM, Binder A, Roy A (2017) Insights from curve fitting models in mouse dynamics authentication systems. In: IEEE conference on application, information and network security, pp 42\u201347","DOI":"10.1109\/AINS.2017.8270422"},{"key":"275_CR46","doi-asserted-by":"crossref","unstructured":"Gao L, Lian Y, Yang H, Xin R, Yu Z, Chen W, Liu W, Zhang Y, Zhu Y, Xu S, et al (2020) Continuous authentication of mouse dynamics based on decision level fusion. In: International wireless communications and mobile computing, pp 210\u2013214 . IEEE","DOI":"10.1109\/IWCMC48107.2020.9148499"},{"issue":"3","key":"275_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2893185","volume":"18","author":"N Zheng","year":"2016","unstructured":"Zheng N, Paloski A, Wang H (2016) An efficient user verification system using angle-based mouse movement biometrics. ACM Trans Inf Syst Secur 18(3):1\u201327","journal-title":"ACM Trans Inf Syst Secur"},{"key":"275_CR48","doi-asserted-by":"crossref","unstructured":"Chong P, Tan YXM, Guarnizo J, Elovici Y, Binder A (2018) Mouse authentication without the temporal aspect\u2013what does a 2d-CNN learn? In: IEEE security and privacy workshops, pp 15\u201321 . IEEE","DOI":"10.1109\/SPW.2018.00011"},{"key":"275_CR49","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TIFS.2019.2930429","volume":"15","author":"P Chong","year":"2019","unstructured":"Chong P, Elovici Y, Binder A (2019) User authentication based on mouse dynamics using deep neural networks: a comprehensive study. IEEE Trans Inf Forensics Secur 15:1086\u20131101","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"275_CR50","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2478\/ausi-2020-0003","volume":"12","author":"M Antal","year":"2020","unstructured":"Antal M, Fej\u00e9r N (2020) Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae, Informatica 12(1):39\u201350","journal-title":"Acta Universitatis Sapientiae, Informatica"},{"key":"275_CR51","doi-asserted-by":"crossref","unstructured":"Lin W, Sun L, Zhong Q, Liu C, Feng J, Ao X, Yang H (2021) Online credit payment fraud detection via structure-aware hierarchical recurrent neural network. In: Proceedings of the thirtieth international joint conference on artificial intelligence, pp 3670\u20133676","DOI":"10.24963\/ijcai.2021\/505"},{"key":"275_CR52","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"275_CR53","doi-asserted-by":"crossref","unstructured":"Stragapede G, Delgado-Santos P, Tolosana R, Vera-Rodriguez R, Guest R, Morales A (2023) Mobile keystroke biometrics using transformers. In: IEEE international conference on automatic face and gesture recognition, pp 1\u20136 . IEEE","DOI":"10.1109\/FG57933.2023.10042710"},{"key":"275_CR54","first-page":"42","volume":"3","author":"M Havrylovych","year":"2023","unstructured":"Havrylovych M, Danylov V (2023) Research on hybrid transformer-based autoencoders for user biometric verification. Syst Res Inf Technol 3:42\u201353","journal-title":"Syst Res Inf Technol"},{"key":"275_CR55","doi-asserted-by":"crossref","unstructured":"Yoon J, Park J, Wagata K, Park H, Teoh ABJ (2023) Pretrained implicit-ensemble transformer for open-set authentication on multimodal mobile biometrics. In: Proceedings of the ACM international conference on multimedia, pp 5909\u20135922","DOI":"10.1145\/3581783.3612467"},{"issue":"16","key":"275_CR56","first-page":"4102","volume":"12","author":"SA Alasadi","year":"2017","unstructured":"Alasadi SA, Bhaya WS (2017) Review of data preprocessing techniques in data mining. J Eng Appl Sci 12(16):4102\u20134107","journal-title":"J Eng Appl Sci"},{"key":"275_CR57","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2015.7298594"},{"issue":"8","key":"275_CR58","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to roc analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"275_CR59","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980"}],"container-title":["Data Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-024-00275-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41019-024-00275-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-024-00275-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T04:17:57Z","timestamp":1740802677000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41019-024-00275-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,15]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["275"],"URL":"https:\/\/doi.org\/10.1007\/s41019-024-00275-6","relation":{},"ISSN":["2364-1185","2364-1541"],"issn-type":[{"value":"2364-1185","type":"print"},{"value":"2364-1541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,15]]},"assertion":[{"value":"31 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}