{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:26:31Z","timestamp":1768281991462,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["309994"],"award-info":[{"award-number":["309994"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359810","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"215-228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Detecting organized eCommerce fraud using scalable categorical clustering"],"prefix":"10.1145","author":[{"given":"Samuel","family":"Marchal","sequence":"first","affiliation":[{"name":"Aalto University"}]},{"given":"Sebastian","family":"Szyller","sequence":"additional","affiliation":[{"name":"Aalto University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE\/IAFE Computational Intelligence for Financial Engineering (CIFEr). 220--226","author":"Aleskerov E."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2017.1305278"},{"key":"e_1_3_2_1_4_1","volume-title":"9th International Conf. on Extending DataBase Technology. 123--146","author":"Andritsos Periklis"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584888"},{"key":"e_1_3_2_1_6_1","volume-title":"Efficient Large Scale Clustering Based on Data Partitioning. 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA)","author":"Bendechache Malika","year":"2016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_14"},{"key":"e_1_3_2_1_8_1","article-title":"Statistical Fraud Detection","volume":"17","author":"Bolton Richard J.","year":"2002","journal-title":"A Review. Statist. Sci."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence. IEEE Computer Society, 103--106","author":"Brause R."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Fabrizio Carcillo Andrea Dal Pozzolo Yann-A\u00ebl Le Borgne Olivier Caelen Yannis Mazzer and Gianluca Bontempi. 2018. Scarff: a scalable framework for streaming credit card fraud detection with spark. Information fusion 41 (2018) 182--194.  Fabrizio Carcillo Andrea Dal Pozzolo Yann-A\u00ebl Le Borgne Olivier Caelen Yannis Mazzer and Gianluca Bontempi. 2018. Scarff: a scalable framework for streaming credit card fraud detection with spark. Information fusion 41 (2018) 182--194.","DOI":"10.1016\/j.inffus.2017.09.005"},{"key":"e_1_3_2_1_11_1","first-page":"546","article-title":"Mortgage fraud detection systems and methods","volume":"7","author":"Chmielewski Thomas","year":"2009","journal-title":"US Patent"},{"key":"e_1_3_2_1_12_1","unstructured":"Clearsale. 2017. Are False Declines Hurting Your Online Reputation? last accessed June 3 2019. https:\/\/blog.clear.sale\/false-declines-hurting-your-online-reputation  Clearsale. 2017. Are False Declines Hurting Your Online Reputation? last accessed June 3 2019. https:\/\/blog.clear.sale\/false-declines-hurting-your-online-reputation"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2736643"},{"key":"e_1_3_2_1_14_1","unstructured":"Europol. 2018. 95 e-commerce fraudsters arrested in international operation. last accessed June 3 2019. https:\/\/www.europol.europa.eu\/newsroom\/news\/95-e-commerce-fraudsters-arrested-in-international-operation  Europol. 2018. 95 e-commerce fraudsters arrested in international operation. last accessed June 3 2019. https:\/\/www.europol.europa.eu\/newsroom\/news\/95-e-commerce-fraudsters-arrested-in-international-operation"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312201"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217303"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.08.024"},{"key":"e_1_3_2_1_18_1","unstructured":"Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).  Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198387"},{"key":"e_1_3_2_1_20_1","volume-title":"ROCK: A robust clustering algorithm for categorical attributes. Information systems 25, 5","author":"Guha Sudipto","year":"2000"},{"key":"e_1_3_2_1_21_1","unstructured":"Hassan Halawa Matei Ripeanu Konstantin Beznosov Baris Coskun and Meizhu Liu. 2018. Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. CoRR abs\/1801.08629 (2018). arXiv:1801.08629  Hassan Halawa Matei Ripeanu Konstantin Beznosov Baris Coskun and Meizhu Liu. 2018. Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. CoRR abs\/1801.08629 (2018). arXiv:1801.08629"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Zhexue Huang. 1998. Extensions to the k-means algorithm for clustering large data sets with categorical values. Data mining and knowledge discovery 2 3 (1998) 283--304.  Zhexue Huang. 1998. Extensions to the k-means algorithm for clustering large data sets with categorical values. Data mining and knowledge discovery 2 3 (1998) 283--304.","DOI":"10.1023\/A:1009769707641"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Alice Hutchings and Sergio Pastrana. 2019. Understanding eWhoring. arXiv (2019). arXiv:cs.CR\/1905.04576  Alice Hutchings and Sergio Pastrana. 2019. Understanding eWhoring. arXiv (2019). arXiv:cs.CR\/1905.04576","DOI":"10.1109\/EuroSP.2019.00024"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2006.0030-1299.14714.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Marie-Jeanne Lesot and Adrien Revault d'Allonnes. 2012. Credit-Card Fraud Profiling Using a Hybrid Incremental Clustering Methodology. In Scalable Uncertainty Management Eyke H\u00fcllermeier Sebastian Link Thomas Fober and Bernhard Seeger (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 325--336.  Marie-Jeanne Lesot and Adrien Revault d'Allonnes. 2012. Credit-Card Fraud Profiling Using a Hybrid Incremental Clustering Methodology. In Scalable Uncertainty Management Eyke H\u00fcllermeier Sebastian Link Thomas Fober and Bernhard Seeger (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 325--336.","DOI":"10.1007\/978-3-642-33362-0_25"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748895808096470"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2007.18"},{"key":"e_1_3_2_1_29_1","unstructured":"Sam Maes Karl Tuyls Bram Vanschoenwinkel and Bernard Manderick. 2002. Credit Card Fraud Detection Using Bayesian and Neural Networks. (08 2002) 261--270.  Sam Maes Karl Tuyls Bram Vanschoenwinkel and Bernard Manderick. 2002. Credit Card Fraud Detection Using Bayesian and Neural Networks. (08 2002) 261--270."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Oded Maimon and Lior Rokach. 2005. Data mining and knowledge discovery handbook. Springer.  Oded Maimon and Lior Rokach. 2005. Data mining and knowledge discovery handbook. Springer.","DOI":"10.1007\/b107408"},{"key":"e_1_3_2_1_31_1","unstructured":"Huiying Mao Yung-wen Liu Yuting Jia and Jay Nanduri. 2018. Adaptive Fraud Detection System Using Dynamic Risk Features. arXiv preprint arXiv:1810.04654 (2018).  Huiying Mao Yung-wen Liu Yuting Jia and Jay Nanduri. 2018. Adaptive Fraud Detection System Using Dynamic Risk Features. arXiv preprint arXiv:1810.04654 (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2703808"},{"key":"e_1_3_2_1_33_1","unstructured":"Samuel Marchal and Sebastian Szyller. 2019. Recursive Agglomerative Clustering (RecAgglo) for categorical data. last accessed August 30 2019. https:\/\/github.com\/SSGAalto\/recagglo  Samuel Marchal and Sebastian Szyller. 2019. Recursive Agglomerative Clustering (RecAgglo) for categorical data. last accessed August 30 2019. https:\/\/github.com\/SSGAalto\/recagglo"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ian Molloy Suresh Chari Ulrich Finkler Mark Wiggerman Coen Jonker Ted Habeck Youngja Park Frank Jordens and Ron van Schaik. 2017. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. In Financial Cryptography and Data Security. 22--40.  Ian Molloy Suresh Chari Ulrich Finkler Mark Wiggerman Coen Jonker Ted Habeck Youngja Park Frank Jordens and Ron van Schaik. 2017. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. In Financial Cryptography and Data Security. 22--40.","DOI":"10.1007\/978-3-662-54970-4_2"},{"key":"e_1_3_2_1_35_1","unstructured":"David Montague. 2014. The Fraud Practice. last accessed June 3 2019. http:\/\/fraudpractice.com\/gl-manual.html  David Montague. 2014. The Fraud Practice. last accessed June 3 2019. http:\/\/fraudpractice.com\/gl-manual.html"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323407"},{"key":"e_1_3_2_1_37_1","unstructured":"Xuetong Niu Li Wang and Xulei Yang. 2019. A Comparison Study of Credit Card Fraud Detection: Supervised versus Unsupervised. arXiv (2019). arXiv:cs.LG\/1904.10604  Xuetong Niu Li Wang and Xulei Yang. 2019. A Comparison Study of Credit Card Fraud Detection: Supervised versus Unsupervised. arXiv (2019). arXiv:cs.LG\/1904.10604"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01230"},{"key":"e_1_3_2_1_39_1","unstructured":"Aaron Orendorf. 2019. What Is the Future of eCommerce? 10 Insights on the Evolution of an Industry. last accessed May 25 2019. https:\/\/www.shopify.com\/enterprise\/the-future-of-ecommerce  Aaron Orendorf. 2019. What Is the Future of eCommerce? 10 Insights on the Evolution of an Industry. last accessed May 25 2019. https:\/\/www.shopify.com\/enterprise\/the-future-of-ecommerce"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"e_1_3_2_1_42_1","unstructured":"PyPi. 2019. Kmodes clustering. https:\/\/pypi.org\/project\/kmodes\/  PyPi. 2019. Kmodes clustering. https:\/\/pypi.org\/project\/kmodes\/"},{"key":"e_1_3_2_1_43_1","first-page":"110","article-title":"Survey of Clustering based Financial Fraud Detection Research","volume":"16","author":"Sabau Andrei Sorin","year":"2012","journal-title":"Informatica Economica"},{"key":"e_1_3_2_1_44_1","first-page":"917","article-title":"Secure multiparty PageRank algorithm for collaborative fraud detection","volume":"2018","author":"Sangers Alex","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Edward H Simpson. 1949. Measurement of diversity. Nature 163 4148 (1949) 688.  Edward H Simpson. 1949. Measurement of diversity. Nature 163 4148 (1949) 688.","DOI":"10.1038\/163688a0"},{"key":"e_1_3_2_1_46_1","unstructured":"Guillermo Suarez-Tangil Matthew Edwards Claudia Peersman Gianluca Stringhini Awais Rashid and Monica Whitty. 2019. Automatically Dismantling Online Dating Fraud. (05 2019).  Guillermo Suarez-Tangil Matthew Edwards Claudia Peersman Gianluca Stringhini Awais Rashid and Monica Whitty. 2019. Automatically Dismantling Online Dating Fraud. (05 2019)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12079-4_49"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.4192\/1577-8517-v11_4"},{"key":"e_1_3_2_1_49_1","unstructured":"Zalando website. 2019. last accessed June 3 2019. https:\/\/www.zalando.com  Zalando website. 2019. last accessed June 3 2019. https:\/\/www.zalando.com"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081965"},{"key":"e_1_3_2_1_51_1","unstructured":"Zalando. 2015. Half-year report January-June 2015. last accessed August 16 2019. https:\/\/corporate.zalando.com\/sites\/default\/files\/media-download\/zalando_se_half-year_report_2015_e_s.pdf  Zalando. 2015. Half-year report January-June 2015. last accessed August 16 2019. https:\/\/corporate.zalando.com\/sites\/default\/files\/media-download\/zalando_se_half-year_report_2015_e_s.pdf"},{"key":"e_1_3_2_1_52_1","unstructured":"Zalando. 2019. Annual Report 2018 - Key figures. Technical Report. Zalando. https:\/\/corporate.zalando.com\/en\/investor-relations\/key-figures-2018  Zalando. 2019. Annual Report 2018 - Key figures. Technical Report. Zalando. https:\/\/corporate.zalando.com\/en\/investor-relations\/key-figures-2018"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359810","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":50,"alternative-id":["10.1145\/3359789.3359810","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359810","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}