{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:17:33Z","timestamp":1760473053695,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100015539","name":"Research Training Program (RTP) Scholarship funded by the Australian Government","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2021.3081258","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T20:23:01Z","timestamp":1621455781000},"page":"3456-3468","source":"Crossref","is-referenced-by-count":12,"title":["DFraud\u00b3: Multi-Component Fraud Detection Free of Cold-Start"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6760-4501","authenticated-orcid":false,"given":"Saeedreza","family":"Shehnepoor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3778-4633","authenticated-orcid":false,"given":"Roberto","family":"Togneri","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6603-3257","authenticated-orcid":false,"given":"Mohammed","family":"Bennamoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2482465"},{"key":"ref33","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref30","first-page":"1631","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","author":"socher","year":"2013","journal-title":"Proc Conf Empirical Methods Natural Lang Process"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825958"},{"key":"ref35","article-title":"ScoreGAN: A fraud review detector based on multi task learning of regulated GAN with data augmentation","author":"shehnepoor","year":"2021","journal-title":"arXiv 2006 06561"},{"key":"ref34","first-page":"1","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","volume":"abs 1906 8237","author":"yang","year":"2019","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2010.5559142"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1381502"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2200\/S00822ED1V01Y201712COV015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"ref14","first-page":"1025","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref15","first-page":"1","article-title":"Deep entity classification: Abusive account detection for online social networks","author":"xu","year":"2021","journal-title":"Proc 30th USENIX Secur Symp (USENIX Security)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243770"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3209542.3209555"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345658"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2975170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2838931.2838932"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2675361"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1034"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75477-2_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3056563"},{"key":"ref8","first-page":"2787","article-title":"Translating embeddings for modeling multi-relational data","volume":"2","author":"bordes","year":"2013","journal-title":"Proc 26th Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref7","first-page":"1884","article-title":"An attribute enhanced domain adaptive model for cold-start spam review detection","author":"you","year":"2018","journal-title":"Proc 27th Int Conf Comput Linguistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191616"},{"journal-title":"How to Fight Fake Reviews Saving Your Business From the Epidemic of Fake Reviews Online","year":"2018","author":"team","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2327026"},{"key":"ref22","first-page":"1","article-title":"Efficient estimation of word representations in vector space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2200\/S00433ED1V01Y201207DMK005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545027"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983730"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398565"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09435380.pdf?arnumber=9435380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:40Z","timestamp":1652194360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9435380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/tifs.2021.3081258","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2021]]}}}