{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:11:34Z","timestamp":1775913094326,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702447"],"award-info":[{"award-number":["61702447"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1109\/tkde.2019.2924431","type":"journal-article","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T17:18:28Z","timestamp":1561483108000},"page":"169-179","source":"Crossref","is-referenced-by-count":43,"title":["Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks"],"prefix":"10.1109","volume":"33","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3705-4945","authenticated-orcid":false,"given":"Yuhong","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1812-6843","authenticated-orcid":false,"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6092-2002","authenticated-orcid":false,"given":"Yuxiao","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2139-8807","authenticated-orcid":false,"given":"Fei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yueting","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.17918\/etd-179","article-title":"Finding groups of graphs in databases","author":"peabody","year":"2002"},{"key":"ref38","volume":"24","author":"bunke","year":"2007","journal-title":"A Graph-Theoretic Approach to Enterprise Network Dynamics"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.896497"},{"key":"ref32","first-page":"1692","article-title":"Exacting social events for tweets using a factor graph","author":"liu","year":"2012","journal-title":"Proc 26th AAAI Conf Artif Intell"},{"key":"ref31","first-page":"2","article-title":"Opinion fraud detection in online reviews by network effects","author":"akoglu","year":"2013","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref30","article-title":"Detecting unusual user profiles with outlier detection techniques","author":"onderwater","year":"2010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433479"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/sam.102"},{"key":"ref35","first-page":"440","article-title":"Eigenspace-based anomaly detection in computer systems","author":"id\u00e9","year":"2004","journal-title":"Proc 10th ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref34","first-page":"77","article-title":"Event detection in time series of mobile communication graphs","author":"akoglu","year":"2010","journal-title":"Proc Army Sci Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623703"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1142\/S0219265902000562"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398449"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0908800106"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"ref14","article-title":"Markov fields on finite graphs and lattices","author":"hammersley","year":"1971"},{"key":"ref15","first-page":"467","article-title":"Loopy belief propagation for approximate inference: An empirical study","author":"murphy","year":"1999","journal-title":"Proc Conf Uncertainty Artif Intell"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/345966.345982"},{"key":"ref17","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2016","journal-title":"arXiv 1609 02907"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2009.08136"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2013.6716681"},{"key":"ref27","first-page":"576","article-title":"Combating web spam with trustrank","author":"gy\u00f6ngyi","year":"2004","journal-title":"Proc 13th Int Conf Very Large Data Bases"},{"key":"ref3","first-page":"3","article-title":"Behaviour mining for fraud detection","volume":"39","author":"xu","year":"2007","journal-title":"J Res Practice Inf Technol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765910"},{"key":"ref29","article-title":"Propagating trust and distrust to demote web spam","volume":"190 of ceur workshop proceedings","author":"wu","year":"2006","journal-title":"Proc Workshop Models Trust Web (MTW) 15th int World Wide Web Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5254.809570"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186144"},{"key":"ref7","first-page":"507","article-title":"Urban dreams of migrants: A case study of migrant integration in Shanghai","author":"yang","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788623"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3051127"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0642-2_10"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281266"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10729-007-9045-4"},{"key":"ref21","first-page":"152","article-title":"Analysis on credit card fraud detection methods","author":"raj","year":"2011","journal-title":"Proc Int Conf Comput Commun Elect Technol"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623682"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.08.018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835907"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2002.1024744"},{"key":"ref44","first-page":"2914","article-title":"Detecting change points in the large-scale structure of evolving networks","author":"peel","year":"2015","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547453"},{"key":"ref25","first-page":"15","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"2012","journal-title":"Proc 9th USENIX Conf Netw Syst Des Implementation"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/9285350\/08744319.pdf?arnumber=8744319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T21:51:11Z","timestamp":1663797071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8744319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":45,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2019.2924431","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}