{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T03:53:45Z","timestamp":1771646025276,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100003223","name":"Orange","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003223","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336578","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Community Detection for Mobile Money Fraud Detection"],"prefix":"10.1109","author":[{"given":"Safa El","family":"Ayeb","sequence":"first","affiliation":[{"name":"Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC,Caen,France,14000"}]},{"given":"Baptiste","family":"Hemery","sequence":"additional","affiliation":[{"name":"Orange,Caen,France"}]},{"given":"Fabrice","family":"Jeanne","sequence":"additional","affiliation":[{"name":"Orange,Caen,France"}]},{"given":"Estelle","family":"Cherrier","sequence":"additional","affiliation":[{"name":"Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC,Caen,France,14000"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09421-5"},{"key":"ref38","article-title":"How to evaluate clustering techniques","author":"delling","year":"2007","journal-title":"Universitat Karlsruhe Germany"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117461"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956831"},{"key":"ref31","first-page":"543","author":"omar","year":"2014","journal-title":"Understanding Social Network Analysis (SNA) in fraud detection"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/450"},{"key":"ref37","first-page":"249","article-title":"Paysim: A financial mobile money simulator for fraud detection","author":"lopez-rojas","year":"0","journal-title":"The 28th European Modeling and Simulation Symposium-EMSS"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.143"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.080"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.2481"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.79.066107"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.025101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.5211"},{"key":"ref16","first-page":"12","article-title":"A comparative study of modularity-based community detection methods for online social networks","author":"karatas","year":"0","journal-title":"CEUR Workshop Proceedings Proceedings of the 12th Turkish National Software Engineering Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-007-9033-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/0611030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21136\/CMJ.1973.101168"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2017.06.018"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"girvan","year":"0","journal-title":"Proceedings of the National Academy of Sciences Section Physical Sciences"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"98902","DOI":"10.1088\/1674-1056\/23\/9\/098902","article-title":"Detecting community structure using label propagation with consensus weight in complex network","volume":"23","author":"zong-wen","year":"2014","journal-title":"Chinese Physics B"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2005.10.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0400054101"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1850 062","DOI":"10.1142\/S0217979218500625","article-title":"LP-LPA: A link influence-based label propagation algorithm for discovering community structures in networks","volume":"32","author":"berahmand","year":"2018","journal-title":"International Journal of Modern Physics B"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2015.05.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"ref2","author":"barab\u00e1si","year":"2016","journal-title":"Network Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4330060203"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.25"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"ref24","article-title":"Community detection in networks: The leader-follower algorithm","volume":"abs 1011 774","author":"shah","year":"2010","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104"},{"key":"ref26","article-title":"D&#x00E9;tection de communaut&#x00E9;s dans les grands graphes d'interactions (multiplexes): &#x00E9;tat de l'art","author":"kanawati","year":"2013","journal-title":"Laboratoire d'Informatique de Paris-Nord (LIPN)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036106"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Paris, France","start":{"date-parts":[[2020,12,14]]},"end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336578.pdf?arnumber=9336578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:14:26Z","timestamp":1656602066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336578","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}