{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T17:48:40Z","timestamp":1748627320816},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10650128","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["TFD-GCL: Telecommunications Fraud Detection Based on Graph Contrastive Learning with Adaptive Augmentation"],"prefix":"10.1109","author":[{"given":"Jingkang","family":"Cao","sequence":"first","affiliation":[{"name":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"}]},{"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[{"name":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"}]},{"given":"Chengliang","family":"Zheng","sequence":"additional","affiliation":[{"name":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"}]}],"member":"263","reference":[{"volume-title":"Truecaller Insights 2022 U.S. Spam Scam Report\u2014Truecaller Blog","year":"2022","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119153"},{"article-title":"Class-Imbalanced Learning on Graphs: A Survey","year":"2023","author":"Ma","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3341640"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch80"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3269303"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3170559"},{"key":"ref9","first-page":"21","article-title":"Mixhop: Higher-order graph convolutional architectures via sparsified neighborhood mixing","volume-title":"international conference on machine learning","author":"Abu-El-Haija"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2010.05.009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0008-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3874-7_60"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2912817"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00028"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.10.019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2023.3302651"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8853468"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110888"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449802"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3323274"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22086-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07299-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30678-5_30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad123"},{"article-title":"Graph attention networks","year":"2017","author":"Veli\u010dkovi\u0107","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.07.020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10650128.pdf?arnumber=10650128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:17:14Z","timestamp":1725952634000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10650128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10650128","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}