{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T05:31:54Z","timestamp":1778045514509,"version":"3.51.4"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB4501704"],"award-info":[{"award-number":["2022YFB4501704"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472317"],"award-info":[{"award-number":["62472317"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Science and Technology Innovation Action Plan","award":["22YS1400600"],"award-info":[{"award-number":["22YS1400600"]}]},{"name":"Shanghai Science and Technology Innovation Action Plan","award":["22511100700"],"award-info":[{"award-number":["22511100700"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tbdata.2024.3499338","type":"journal-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T13:50:40Z","timestamp":1731678640000},"page":"1945-1958","source":"Crossref","is-referenced-by-count":3,"title":["Parallel Graph Learning With Temporal Stamp Encoding for Fraudulent Transactions Detections"],"prefix":"10.1109","volume":"11","author":[{"given":"Jiacheng","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1454-8240","authenticated-orcid":false,"given":"Sheng","family":"Xiang","sequence":"additional","affiliation":[{"name":"Australian Artificial Intelligence Institute, University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Liangyu","family":"Yuan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5877-7387","authenticated-orcid":false,"given":"Dawei","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0637-9317","authenticated-orcid":false,"given":"Changjun","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.005"},{"key":"ref2","article-title":"A comprehensive survey of data mining-based fraud detection research","author":"Phua","year":"2010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359810"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3272396"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/int.4550070709"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2004.1297040"},{"key":"ref9","article-title":"Your guide to machine learning for fraud prevention","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1994.323314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6975.2006.00182.x"},{"key":"ref12","first-page":"32","article-title":"Credit card fraud detection using neural network","volume":"1","author":"Patidar","year":"2011","journal-title":"Int. J. Soft Comput. Eng."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108218"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5371"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40017-9_12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.00-48"},{"issue":"5","key":"ref17","first-page":"18","article-title":"Credit card fraud detection using deep learning","volume":"8","author":"Pandey","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090103"},{"key":"ref19","article-title":"New benchmarks for learning on non-homophilous graphs","author":"Lim","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26702"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/618"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16582"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3162339"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-020-00430-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0111265"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10346-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017913413"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102596"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6407-6_3"},{"key":"ref31","first-page":"3149","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Ke"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46675-0_53"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.037"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"ref37","first-page":"21076","article-title":"Rethinking graph neural networks for anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tang"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.29067"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191526"},{"key":"ref41","article-title":"Temporal graph networks for deep learning on dynamic graphs","author":"Rossi"},{"key":"ref42","article-title":"Inductive representation learning on temporal graphs","author":"Xu"},{"key":"ref43","article-title":"Credit card transactions fraud detection dataset","author":"Shenoy","year":"2020"},{"key":"ref44","article-title":"Healthcare provider fraud detection analysis","author":"Gupta","year":"2020"},{"key":"ref45","article-title":"IEEE-CIS fraud detection","author":"Addison","year":"2019"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref47","article-title":"DropEdge: Towards deep graph convolutional networks on node classification","author":"Rong"},{"key":"ref48","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107"},{"key":"ref49","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462944"},{"key":"ref51","article-title":"Representation learning over dynamic graphs","author":"Trivedi"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687317\/11077791\/10753618.pdf?arnumber=10753618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T17:45:46Z","timestamp":1752255946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10753618\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":52,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2024.3499338","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}