{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T21:02:43Z","timestamp":1760821363575,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928001","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T14:43:02Z","timestamp":1670942582000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Financial Fraud Detection Based on Ensemble Machine Learning"],"prefix":"10.1109","author":[{"given":"Jinyue","family":"Wang","sequence":"first","affiliation":[{"name":"Shanghai University,Shanghai,China"}]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Lixin University of Accounting and Finance,Shanghai,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TNSE.2022.3144699"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TII.2021.3088057"},{"key":"ref12","first-page":"1","article-title":"Intelligent fraudulent detection system based SVM and optimized by danger theory Computer, Communication and Control (IC4)[C]","author":"rajak","year":"0","journal-title":"2015 IEEE International Conference on IEEE"},{"key":"ref13","first-page":"679","article-title":"Application of credit card fraud detection: Based on bagging ensemble classifier Procedia Computer[J]","volume":"48","author":"zareapoor","year":"2015","journal-title":"Sci"},{"key":"ref14","first-page":"1","article-title":"One-class support vector machine based under-sampling: Application to churn prediction and insurance fraud detection[C]","author":"sundarkumar","year":"2015","journal-title":"Computational Intelligence and Comput Research (ICCIC) 2015 IEEE International Conference on IEEE"},{"key":"ref4","first-page":"2094","article-title":"A Survey on Decision Tree Algorithms of Classification in Data Mining[J]","author":"sharma","year":"2016","journal-title":"International Journal of Science and Research (IJSR)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-981-16-8248-3_40"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICVES.2019.8906396"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35289-8_25","article-title":"Stochastic Gradient Descent Tricks[M]","volume":"7700","author":"bottou","year":"2012","journal-title":"Neural Networks Tricks of the Trade Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s00521-007-0131-9"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICCCNT45670.2019.8944867"},{"year":"0","article-title":"Consumer Sentinel Network Data Book 2019[R]","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s44230-022-00004-0"},{"key":"ref9","article-title":"The financial time series forecasting based on proposed ARMA-GRNN model","volume":"4","author":"li","year":"2005","journal-title":"2005 International Conference on Machine Learning and Cybernetics"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09928001.pdf?arnumber=9928001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T15:12:26Z","timestamp":1674486746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9928001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928001","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}