{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T04:14:24Z","timestamp":1760328864496,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71621002,71602184,71472175"],"award-info":[{"award-number":["71621002,71602184,71472175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004572","name":"Ministry of Health of China","doi-asserted-by":"publisher","award":["2017YFC1200302,2017ZX10303401-002"],"award-info":[{"award-number":["2017YFC1200302,2017ZX10303401-002"]}],"id":[{"id":"10.13039\/501100004572","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0108401,2019QY(Y)0101,2016QY02D0305"],"award-info":[{"award-number":["2020AAA0108401,2019QY(Y)0101,2016QY02D0305"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,5]]},"DOI":"10.1109\/cybconf47073.2019.9436573","type":"proceedings-article","created":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T20:56:18Z","timestamp":1622494578000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["A Graph-Based Semi-Supervised Fraud Detection Framework"],"prefix":"10.1109","author":[{"given":"Rongrong","family":"Jing","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xingwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiyun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dash Desheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Daniel Dajun","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"721","article-title":"A graph-based, semi-supervised, credit card fraud detection system","author":"lebichot","year":"2016","journal-title":"Third International Workshop on Complex Networks and their Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref12","first-page":"32","article-title":"Representation learning in graphs for credit card fraud detection","author":"van belle","year":"2019","journal-title":"Data Mining for Financial Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/ijsptm.2012.1501"},{"key":"ref14","first-page":"1025","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"journal-title":"Correlation coefficient","year":"2006","author":"weisstein","key":"ref15"},{"journal-title":"Logistic Regression","year":"2002","author":"kleinbaum","key":"ref16"},{"key":"ref17","article-title":"Making large-scale SVM learning practical","volume":"28","author":"joachims","year":"1998","journal-title":"Technical Report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSSM.2007.4280163"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280510"},{"journal-title":"Detecting credit card fraud by decision trees and support vector machines","year":"2011","author":"sahin","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"ref8","article-title":"Fraud detection: Discovering connections with graph databases","volume":"13","author":"sadowski","year":"2014","journal-title":"White Paper-Neo Technology-Graphs are Everywhere"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70228"},{"key":"ref2","first-page":"402","article-title":"A comparative analysis of various credit card fraud detection techniques","volume":"7","author":"jain","year":"2019","journal-title":"Int J Recent Technol Eng"},{"key":"ref1","first-page":"57","article-title":"Credit card fraud and detection techniques: a review","volume":"4","author":"delamaire","year":"2009","journal-title":"Banks and bank Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.013"}],"event":{"name":"2019 4th IEEE International Conference on Cybernetics (Cybconf)","start":{"date-parts":[[2019,7,5]]},"location":"Beijing, China","end":{"date-parts":[[2019,7,7]]}},"container-title":["2019 4th IEEE International Conference on Cybernetics (Cybconf)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9436548\/9436530\/09436573.pdf?arnumber=9436573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:47:58Z","timestamp":1658094478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9436573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cybconf47073.2019.9436573","relation":{},"subject":[],"published":{"date-parts":[[2019,7,5]]}}}