{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:21:38Z","timestamp":1768778498145,"version":"3.49.0"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91118005"],"award-info":[{"award-number":["91118005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91218301"],"award-info":[{"award-number":["91218301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91018011"],"award-info":[{"award-number":["91018011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472315"],"award-info":[{"award-number":["61472315"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004567","name":"MoE","doi-asserted-by":"publisher","award":["IRT13035"],"award-info":[{"award-number":["IRT13035"]}],"id":[{"id":"10.13039\/501100004567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tkde.2016.2571686","type":"journal-article","created":{"date-parts":[[2016,6,8]],"date-time":"2016-06-08T14:17:34Z","timestamp":1465395454000},"page":"2651-2664","source":"Crossref","is-referenced-by-count":47,"title":["Mining Suspicious Tax Evasion Groups in Big Data"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7888-0587","authenticated-orcid":false,"given":"Feng","family":"Tian","sequence":"first","affiliation":[]},{"given":"Tian","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Kuo-Ming","family":"Chao","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Godwin","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Nazaraf","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2012.05.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0730(07)01010-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.257"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676711"},{"key":"ref14","article-title":"Gephi: An open source software for exploring and manipulating networks","author":"bastian","year":"0","journal-title":"AAAI Int'l Conf Weblogs and Social Media"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1693042.1693068"},{"key":"ref16","year":"2013","journal-title":"Practical Manual on Transfer Pricing for Developing Countries"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jwb.2006.08.008"},{"key":"ref18","article-title":"Transfer pricing and developing countries-final report, Tech. Rep. 0038","year":"2011","journal-title":"European Commission Geneva"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2010.05.002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2373385"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jinteco.2011.08.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6574671"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.07.027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.2395"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacceco.2013.12.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.12.006"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1016\/j.eswa.2012.08.051","article-title":"Characterization and detection of taxpayers with false invoices using data mining techniques","volume":"40","author":"gonz\u00b4l\u00b4cleza","year":"2013","journal-title":"Expert Syst Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1329125.1329381"},{"key":"ref9","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref1","first-page":"1092","article-title":"Seven reasons why trade secrets are increasingly important","volume":"27","author":"almeling","year":"2012","journal-title":"Berkeley Technol Law J"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpa.2010.02.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.labeco.2004.02.010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556496"},{"key":"ref24","first-page":"43","article-title":"An application on association rules data mining in the tax audit system","volume":"13","author":"xu","year":"2011","journal-title":"Economic Supervision"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.204"},{"key":"ref26","first-page":"146","article-title":"Depth first search and linear graph algorithms","volume":"1","author":"robert","year":"1972","journal-title":"Soc Ind Appl Math J Comput"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481248"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7563937\/07487062.pdf?arnumber=7487062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:39Z","timestamp":1641987759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7487062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":28,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2571686","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}