{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T22:23:34Z","timestamp":1762899814497},"reference-count":15,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2020,1,2]]},"DOI":"10.1080\/08839514.2019.1691341","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T11:29:58Z","timestamp":1573730998000},"page":"47-63","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":18,"title":["Semi-supervised Classification of Fraud Data in Commercial Auctions"],"prefix":"10.1080","volume":"34","author":[{"given":"Sulaf","family":"Elshaar","sequence":"first","affiliation":[{"name":"Computer Science Department, University of Regina, Regina, Canada"}]},{"given":"Samira","family":"Sadaoui","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Regina, Regina, Canada"}]}],"member":"301","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Anowar, F., S. Sadaoui, and M. Mouhoub 2018. \u201cAuction Fraud Classification Based on Clustering and Sampling Techniques\u201d. IEEE 17th International Conference on Machine Learning and Applications, ICMLA, Dec. Orlando, FL, USA. doi: doi:10.1109\/ICMLA.2018.00061","DOI":"10.1109\/ICMLA.2018.00061"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.12.003"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Elshaar, S., and S. Sadaoui. 2019. Building High-quality Auction Fraud Dataset. Computer and Information Science; Vol. 12, No. 4; 2019, ISSN 1913-8989, E-ISSN 1913-8997, Canada. doi:10.5539\/cis.v12n4p1","DOI":"10.5539\/cis.v12n4p1"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs025"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Ganguly S., Sadaoui S. 2018. Online Detection of Shill Bidding Fraud based on Machine Learning Techniques. 31st International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems LNCS, Springer, Montreal, Canada. doi:10.1007\/978-3-319-92058-0_29.","DOI":"10.1007\/978-3-319-92058-0_29"},{"key":"CIT0011","unstructured":"I. C. C. Center-IC3. 2015. 2015 internet crime annual report. [Online]. Accessed 04, 2017. https:\/\/pdf.ic3.gov\/2015_IC3Report.pdf."},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0205649"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Narayan, R., J. K. Rout, and S. K. Jena 2018. Review spam detection using semi-supervised technique. Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, 281\u201386. Springer.","DOI":"10.1007\/978-981-10-3376-6_31"},{"key":"CIT0015","first-page":"727","volume":"1","author":"Pelleg D.","year":"2000","journal-title":"In Icml"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0818-7"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2773581"},{"key":"CIT0021","volume-title":"Exploratory data analysis, ser. Addison-Wesley series in behavioral science","author":"Tukey J.","year":"1977"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7010025"},{"key":"CIT0024","doi-asserted-by":"crossref","unstructured":"Xu, H., C. K. Bates, and S. M. Shatz. 2009. Real-time model checking for shill detection in live online auctions. Software Engineering Research and Practice. 134\u201340. doi:10.1177\/17531934097488.","DOI":"10.1177\/17531934097488"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2019.1691341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T23:17:29Z","timestamp":1576624649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2019.1691341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,2]]}},"alternative-id":["10.1080\/08839514.2019.1691341"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2019.1691341","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}