{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:20:12Z","timestamp":1762507212773,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FDCT","award":["FDCT\/007\/2016\/AFJ"],"award-info":[{"award-number":["FDCT\/007\/2016\/AFJ"]}]},{"name":"UMAC","award":["MYRG2015-00070-FST"],"award-info":[{"award-number":["MYRG2015-00070-FST"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,6]]},"DOI":"10.1145\/3132847.3132848","type":"proceedings-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T13:30:29Z","timestamp":1509975029000},"page":"1559-1567","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["DeMalC"],"prefix":"10.1145","author":[{"given":"Yuhong","family":"Li","sequence":"first","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Dongmei","family":"Hou","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Aimin","family":"Pan","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Zhiguo","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Macau, Macau, Macao"}]}],"member":"320","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Telephone_numbers_in_China.  https:\/\/en.wikipedia.org\/wiki\/Telephone_numbers_in_China."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Telecommunications_industry_in_China.  https:\/\/en.wikipedia.org\/wiki\/Telecommunications_industry_in_China."},{"key":"e_1_3_2_1_3_1","unstructured":"Annual report of phone fraud. http:\/\/www.china.com.cn\/guoqing\/2016--10\/02\/content_39415879.htm.  Annual report of phone fraud. http:\/\/www.china.com.cn\/guoqing\/2016--10\/02\/content_39415879.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"Telecom fraud call scenarios. http:\/\/transnexus.com\/wp-content\/uploads\/TFS.pdf.  Telecom fraud call scenarios. http:\/\/transnexus.com\/wp-content\/uploads\/TFS.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"whoscall. https:\/\/whoscall.com\/zh-TW\/.  whoscall. https:\/\/whoscall.com\/zh-TW\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-47534-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623751"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685756"},{"key":"e_1_3_2_1_9_1","volume-title":"Black Hat USA","author":"Balasubramaniyan V.","year":"2014","unstructured":"V. Balasubramaniyan , R. Bandyopadhyay , and T. Calhoun . Lifecycle of a phone fraudster: Exposing fraud activity from account reconnaissance to takeover using graph analysis and acoustical anomalies . In Black Hat USA 2014 . V. Balasubramaniyan, R. Bandyopadhyay, and T. Calhoun. Lifecycle of a phone fraudster: Exposing fraud activity from account reconnaissance to takeover using graph analysis and acoustical anomalies. In Black Hat USA 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2009.08136"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864380"},{"key":"e_1_3_2_1_14_1","first-page":"1189","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman J. H.","year":"2001","unstructured":"J. H. Friedman . Greedy function approximation: a gradient boosting machine. Annals of statistics , pages 1189 -- 1232 , 2001 . J. H. Friedman. Greedy function approximation: a gradient boosting machine. Annals of statistics, pages 1189--1232, 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOS537"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.031"},{"issue":"3","key":"e_1_3_2_1_18_1","first-page":"693","article-title":"The elements of statistical learning: data mining, inference, and prediction. Journal of the Royal Statistical Society: Series A (Statistics","volume":"173","author":"John Lu Z.","year":"2010","unstructured":"Z. John Lu . The elements of statistical learning: data mining, inference, and prediction. Journal of the Royal Statistical Society: Series A (Statistics in Society) , 173 ( 3 ): 693 -- 694 , 2010 . Z. John Lu. The elements of statistical learning: data mining, inference, and prediction. Journal of the Royal Statistical Society: Series A (Statistics in Society), 173(3):693--694, 2010.","journal-title":"Society)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494232.2465761"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"e_1_3_2_1_21_1","volume-title":"Crowd labeling: a survey. arXiv preprint arXiv:1301.2774","author":"Muhammadi J.","year":"2013","unstructured":"J. Muhammadi , H. R. Rabiee , and A. Hosseini . Crowd labeling: a survey. arXiv preprint arXiv:1301.2774 , 2013 . J. Muhammadi, H. R. Rabiee, and A. Hosseini. Crowd labeling: a survey. arXiv preprint arXiv:1301.2774, 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"Detecting unusual user profiles with outlier detection techniques","author":"Onderwater M.","year":"2010","unstructured":"M. Onderwater . Detecting unusual user profiles with outlier detection techniques . VU University Amsterdam , 2010 . M. Onderwater. Detecting unusual user profiles with outlier detection techniques. VU University Amsterdam, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_24_1","volume-title":"Towards a unifying approach to diversity measures: bridging the gap between the shannon entropy and rao's quadratic index. Theoretical population biology, 70(3):237--243","author":"Ricotta C.","year":"2006","unstructured":"C. Ricotta and L. Szeidl . Towards a unifying approach to diversity measures: bridging the gap between the shannon entropy and rao's quadratic index. Theoretical population biology, 70(3):237--243 , 2006 . C. Ricotta and L. Szeidl. Towards a unifying approach to diversity measures: bridging the gap between the shannon entropy and rao's quadratic index. Theoretical population biology, 70(3):237--243, 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788623"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2187280"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2002.1024744"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348567"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/5326.897072"}],"event":{"name":"CIKM '17: ACM Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Singapore Singapore","acronym":"CIKM '17"},"container-title":["Proceedings of the 2017 ACM on Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132847.3132848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132847.3132848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:24Z","timestamp":1750212804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132847.3132848"}},"subtitle":["A Feature-rich Machine Learning Framework for Malicious Call Detection"],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":29,"alternative-id":["10.1145\/3132847.3132848","10.1145\/3132847"],"URL":"https:\/\/doi.org\/10.1145\/3132847.3132848","relation":{},"subject":[],"published":{"date-parts":[[2017,11,6]]},"assertion":[{"value":"2017-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}