{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T19:08:57Z","timestamp":1763147337820,"version":"3.45.0"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372328"],"award-info":[{"award-number":["62372328"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2025CXGC010107"],"award-info":[{"award-number":["2025CXGC010107"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["22120240357","2024-1-ZD-04"],"award-info":[{"award-number":["22120240357","2024-1-ZD-04"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012247","name":"Program of Shanghai Academic Research Leader","doi-asserted-by":"publisher","award":["22XD1423700"],"award-info":[{"award-number":["22XD1423700"]}],"id":[{"id":"10.13039\/501100012247","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFB4501704"],"award-info":[{"award-number":["2022YFB4501704"]}]},{"name":"Leadership Project under the Eastern Talent Program"},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2024ZD001"],"award-info":[{"award-number":["2024ZD001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3599992","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:18:29Z","timestamp":1755627509000},"page":"7818-7834","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6814-3456","authenticated-orcid":false,"given":"Hao","family":"Tang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4752-0316","authenticated-orcid":false,"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-5064","authenticated-orcid":false,"given":"Hongzi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352126"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3262681"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3120415"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21465"},{"key":"ref5","first-page":"166","article-title":"Online banking fraud detection based on local and global behavior","volume-title":"Proc. 5th Int. Conf. Digit. Soc.","author":"Kovach"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.08.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488679"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488883"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3257546"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP49062.2020.9231703"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108466"},{"key":"ref14","first-page":"9782","article-title":"DynaBERT: Dynamic bert with adaptive width and depth","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hou"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973777"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2020.3040950"},{"key":"ref17","first-page":"14068","article-title":"Group knowledge transfer: Federated learning of large CNNs at the edge","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"He"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA49311.2020.9139638"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5195\/emaj.2020.203"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2020.08.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2021.2006781"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327853"},{"article-title":"Model inversion attacks: A survey of approaches and countermeasures","year":"2024","author":"Zhou","key":"ref24"},{"issue":"2","key":"ref25","first-page":"6","article-title":"DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis","volume":"1","author":"Thakur","year":"2011","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IFOST.2011.6021216"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT52121.2021.9616671"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3275220"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3160699"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539086"},{"issue":"11","key":"ref31","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref32","first-page":"605","article-title":"OpenDrift: Online evolving fraud detection for open-category and concept-drift transactions","volume-title":"Proc. Int. Conf. Web Serv.","author":"Cheng"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00228"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.069"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155219"},{"key":"ref36","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref37","first-page":"22593","article-title":"Distributed distillation for on-device learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bistritz"},{"article-title":"Federated learning with personalization layers","year":"2019","author":"Arivazhagan","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00494"},{"key":"ref40","first-page":"11056","article-title":"A decentralized parallel algorithm for training generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Liu"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00405"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421284"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3127450"},{"issue":"4s","key":"ref44","first-page":"2277","article-title":"Secured cryptosystem using blowfish and RSA algorithm for the data in public cloud","volume":"7","author":"Kumar","year":"2018","journal-title":"Int. J. Recent Technol. Eng."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT52121.2021.9616671"},{"key":"ref46","first-page":"489","article-title":"Replication: Why we still can\u2019t browse in peace: On the uniqueness and reidentifiability of web browsing histories","volume-title":"Proc. 16th Symp. Usable Privacy Secur.","author":"Bird"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref49","first-page":"169","article-title":"Using association rules for fraud detection in web advertising networks","volume-title":"Proc. 31st Int. Conf. Very Large Data Bases","author":"Metwally"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236244"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14778\/3007263.3007285"},{"key":"ref52","first-page":"2183","article-title":"ET-RNN: Applying deep learning to credit loan applications","volume-title":"Proc. 25th ACM SIGKDD Int. Conf. Knowl. Discov. Data Mining","author":"Babaev"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/505"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403361"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"article-title":"Federated learning with non-IID data","year":"2018","author":"Zhao","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796841"},{"key":"ref59","first-page":"7232","article-title":"Evaluating gradient inversion attacks and defenses in federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Huang"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref61","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Jayaraman"},{"key":"ref62","first-page":"11883","article-title":"An uncertainty principle is a price of privacy-preserving microdata","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Abowd"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690191"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3090959"},{"key":"ref66","first-page":"8721","article-title":"Progressive memory banks for incremental domain adaptation","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Asghar"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11129899.pdf?arnumber=11129899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:52:36Z","timestamp":1763146356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11129899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":66,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3599992","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}