{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:33:12Z","timestamp":1753875192800,"version":"3.41.2"},"reference-count":48,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2024,12,31]]},"DOI":"10.1080\/08839514.2024.2385854","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T11:30:17Z","timestamp":1724758217000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Fraud Detection Based on Credit Review Texts with Dual Channel Memory Networks"],"prefix":"10.1080","volume":"38","author":[{"given":"Yansong","family":"Wang","sequence":"first","affiliation":[{"name":"Science and Technology Innovation Center, Chery Huiyin Motor Finance Service Co, Ltd, Wuhu, China"},{"name":"School of Data Science, University of Science and Technology of China, Hefei, China"}]},{"given":"Defu","family":"Lian","sequence":"additional","affiliation":[{"name":"School of Data Science, University of Science and Technology of China, Hefei, China"}]},{"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Data Science, University of Science and Technology of China, Hefei, China"}]}],"member":"301","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.12.012"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102335"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106975"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.04.057"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.95"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121643"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5371"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.042"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46675-0_53"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDSA55874.2022.9862930"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/risks6030101"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.19030\/jabr.v2i4.6564"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140438"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211306"},{"key":"e_1_3_4_21_1","unstructured":"Kipf T. N. and M. Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv: 1609.02907 1\u201314."},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT2.2019.8824930"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.199"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/systems11110539"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i15.17569"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.54691\/bcpbm.v21i.1255"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.126"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACIA.2010.5709916"},{"issue":"6","key":"e_1_3_4_29_1","first-page":"905","article-title":"Study on kcore-gcn anti-fraud algorithm fusing multi-source graph features","volume":"51","author":"Liu W.","year":"2024","unstructured":"Liu, W., Y. Song, and P. Zhuo. 2024. Study on kcore-gcn anti-fraud algorithm fusing multi-source graph features. Computer Science 51 (6A):905\u201311.","journal-title":"Computer Science"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/aaai.12136"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/3007263.3007285"},{"key":"e_1_3_4_32_1","first-page":"1","volume-title":"The 5th International Conference on Artificial Intelligence and Computer Science (AICS)","author":"Ming P.","year":"2023","unstructured":"Ming, P. 2023. Trajectory classification-based car loan collection scoring model using a hierarchical CNN-LSTM method. The 5th International Conference on Artificial Intelligence and Computer Science (AICS), 1\u20138, Wuhan, China."},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DICCT56244.2023.10110188"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2736643"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTMOD59086.2023.10438120"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00854-y"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00684-w"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988588"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122156"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA62361.2024.10532788"},{"key":"e_1_3_4_41_1","first-page":"84","article-title":"Exploration of derivative scenarios in automotive finance","volume":"9","author":"Tong X.","year":"2024","unstructured":"Tong, X. 2024. Exploration of derivative scenarios in automotive finance. Chinese Finance 9:84\u201385.","journal-title":"Chinese Finance"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12748"},{"key":"e_1_3_4_43_1","first-page":"207","article-title":"Fintech and enterprise digital transformation","volume":"5","author":"Xiang H. L.","year":"2023","unstructured":"Xiang, H. L., D. Zijia, and X. SiYang. 2023. Fintech and enterprise digital transformation. China Soft Science 5:207\u201315.","journal-title":"China Soft Science"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.196"},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345385"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2739-2"},{"key":"e_1_3_4_47_1","first-page":"1","article-title":"Credit card fraud detection model based on graph attention transformation neural network","volume":"2024","author":"Yang F.","year":"2024","unstructured":"Yang, F., Y. Zou, and M. Zhu. 2024. Credit card fraud detection model based on graph attention transformation neural network. Computer Applications 2024:1\u20138.","journal-title":"Computer Applications"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6077540"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.3390\/info14090499"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127108"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2024.2385854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T16:15:21Z","timestamp":1734365721000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2024.2385854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1080\/08839514.2024.2385854"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2024.2385854","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"type":"print","value":"0883-9514"},{"type":"electronic","value":"1087-6545"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-04-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-26","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2385854"}}