{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:06:10Z","timestamp":1775225170639,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"COLCIENCIAS","award":["FP44842-anex46-2015"],"award-info":[{"award-number":["FP44842-anex46-2015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3219878","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"215-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach"],"prefix":"10.1145","author":[{"given":"Daniel","family":"de Roux","sequence":"first","affiliation":[{"name":"Universidad de los Andes, Bogot\u00e1, Colombia"}]},{"given":"Boris","family":"Perez","sequence":"additional","affiliation":[{"name":"Universidad de los Andes, Bogot\u00e1 &amp; Univ. Francisco de Paula Santander, C\u00facuta, Colombia"}]},{"given":"Andr\u00e9s","family":"Moreno","sequence":"additional","affiliation":[{"name":"Universidad de los Andes, Bogot\u00e1, Colombia"}]},{"given":"Maria del Pilar","family":"Villamil","sequence":"additional","affiliation":[{"name":"Universidad de los Andes, Bogot\u00e1, Colombia"}]},{"given":"C\u00e9sar","family":"Figueroa","sequence":"additional","affiliation":[{"name":"Secretaria de Hacienda Distrital, Bogot\u00e1, Colombia"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the IEEE\/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr). IEEE","author":"Aleskerov E."},{"key":"e_1_3_2_1_2_1","unstructured":"Investing Answers. 2017. Tax Fraud. http:\/\/www.investinganswers.com\/financial-dictionary\/laws-regulations\/tax-fraud-4116. (2017).  Investing Answers. 2017. Tax Fraud. http:\/\/www.investinganswers.com\/financial-dictionary\/laws-regulations\/tax-fraud-4116. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"Maria Elisabete Neves Ant\u00f3nio Dias Carlos Pinto Jo\u00e3o Batista. 2016. Signaling Tax Evasion Financial Rations and Cluster Analysis. (2016). http:\/\/www.gestaodefraude.eu\/wordpress\/wp-content\/uploads\/2016\/01\/wp051.pdf  Maria Elisabete Neves Ant\u00f3nio Dias Carlos Pinto Jo\u00e3o Batista. 2016. Signaling Tax Evasion Financial Rations and Cluster Analysis. (2016). http:\/\/www.gestaodefraude.eu\/wordpress\/wp-content\/uploads\/2016\/01\/wp051.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"Veronique Van Vlasselaer, and Wouter Verbeke","author":"Baesens Bart","year":"2015"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.051"},{"key":"e_1_3_2_1_7_1","volume-title":"Practical Nonparametric Statistics","author":"Conover W. J."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1628\/001522116X14646834385460"},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Knowledge Discovery and Data Mining, Usama M","author":"Fayyad Usama M."},{"key":"e_1_3_2_1_10_1","volume-title":"The elements of statistical learning","author":"Friedman Jerome"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1998.10480549"},{"key":"e_1_3_2_1_12_1","first-page":"4","article-title":"Predicting repayment of the credit card debt","volume":"39","author":"Ha Sung Ho","year":"2012","journal-title":"Computers &Operations Research"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.119"},{"key":"e_1_3_2_1_15_1","volume-title":"Hybrid approaches for detecting credit card fraud. Expert Systems 34, 2 (4","author":"K\u00fclt\u00fcr Yi\u011fit","year":"2017"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.272"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790755.2790759"},{"key":"e_1_3_2_1_18_1","volume-title":"On Spectral Clustering: Analysis and an algorithm","author":"Ng Andrew Y."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference of. IEEE, IEEE","author":"Rad Mehdi Samee","year":"2016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"e_1_3_2_1_24_1","first-page":"197","article-title":"The L 1 Convergence of Kernel Density Estimates under Dependence","volume":"17","author":"Tran Lanh Tat","year":"1989","journal-title":"The Canadian Journal of Statistics \/ La Revue Canadienne de Statistique"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2006.384550"},{"key":"e_1_3_2_1_27_1","unstructured":"How Stuff Works. 2017. How Tax Evasion Works. https:\/\/money.howstuffworks.com\/personal-finance\/personal-income-taxes\/tax-evasion1.htm. (2017).  How Stuff Works. 2017. How Tax Evasion Works. https:\/\/money.howstuffworks.com\/personal-finance\/personal-income-taxes\/tax-evasion1.htm. (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.204"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"e_1_3_2_1_30_1","first-page":"48","article-title":"CREDIT CARD FRAUD DETECTION USING SELF- ORGANIZING MAPS","volume":"18","author":"Zaslavsky Vladimir","year":"2006","journal-title":"An International Journal"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSIE.2009.73"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3219878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":30,"alternative-id":["10.1145\/3219819.3219878","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3219878","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}