{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:40:20Z","timestamp":1762522820731,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/saci58269.2023.10158631","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T17:26:49Z","timestamp":1687886809000},"page":"000353-000358","source":"Crossref","is-referenced-by-count":3,"title":["Examination of Vehicle Fraud Detection Possibilities with the Help of Fuzzy Inference System"],"prefix":"10.1109","author":[{"given":"P\u00e9ter","family":"V\u00e1radi","sequence":"first","affiliation":[{"name":"&#x00D3;buda University,Doctoral School on Safety and Security Sciences,Budapest,Hungary"}]},{"given":"Judit","family":"LUK\u00e1CS","sequence":"additional","affiliation":[{"name":"&#x00D3;buda University,Don&#x00E1;t B&#x00E1;nki Faculty of Mechanical and Safety Engineering,Budapest,Hungary"}]},{"given":"Rich\u00e1rd","family":"Horv\u00e1th","sequence":"additional","affiliation":[{"name":"&#x00D3;buda University,Don&#x00E1;t B&#x00E1;nki Faculty of Mechanical and Safety Engineering,Budapest,Hungary"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/jori.12359"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.7.2022.7.1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2021.100456"},{"key":"ref14","first-page":"2819","article-title":"Using machine learning models to compare various resampling methods in predicting insurance fraud","volume":"99","author":"hanafy","year":"2021","journal-title":"J Theor Appl Inf Technol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.7.2021.7.1"},{"key":"ref10","first-page":"3764","article-title":"Fraud detection in automobile insurance using a data mining based approach","volume":"8","author":"ghorbani","year":"2018","journal-title":"International Journal of Mechatronics Electrical and Computer Technology (IJMEC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/risks9050084"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/risks10080159"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2022.101744"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0272448"},{"key":"ref18","first-page":"341","article-title":"Computational intelligence models for insurance fraud detection: a review of a decade of research","volume":"1","author":"hassan","year":"2013","journal-title":"Journal of Network and Innovative Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2002.1187512"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38893-5_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.10.2022.10.6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.3.2021.3.10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"article-title":"Why trapezoidal and triangular membership functions work so well: Towards a theoretical explanation","year":"2013","author":"barua","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)90003-5"},{"article-title":"Defuzzification methods and new techniques for fuzzy controllers","year":"2004","author":"saade","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/piee.1974.0328"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfds.2016.03.001"},{"key":"ref7","article-title":"Fraud detection in the insurance using decision tree","author":"goleiji","year":"0","journal-title":"na&#x00EF;ve Bayesian and support vector machine data mining algorithms (Case study-automobile&#x2019;s body insurance)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2017.8074258"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2001.1008944"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/risks10100189"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/10683160512331316325"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/1539-6975.00022"}],"event":{"name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2023,5,23]]},"location":"Timisoara, Romania","end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10158523\/10158534\/10158631.pdf?arnumber=10158631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:33:49Z","timestamp":1689615229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10158631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/saci58269.2023.10158631","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}