{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:51Z","timestamp":1750220871374,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3377713.3377735","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T10:07:26Z","timestamp":1581070046000},"page":"112-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Stacked-SVM"],"prefix":"10.1145","author":[{"given":"Qingqing","family":"Chang","sequence":"first","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Shaofu","family":"Lin","sequence":"additional","affiliation":[{"name":"Beijing Institute of Smart City, Beijing University of Technology, Beijing, China"}]},{"given":"Xiliang","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Smart City, Beijing University of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2017 Global Fraud Loss Surveys","author":"Communications Fraud Control Association (CFCA).","year":"2017","unstructured":"Communications Fraud Control Association (CFCA). 2017 Global Fraud Loss Surveys , 2017 . Communications Fraud Control Association (CFCA). 2017 Global Fraud Loss Surveys, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234943"},{"key":"e_1_3_2_1_3_1","unstructured":"360\n    Internet security center. 2016 China telecom fraud situation analysis report. http:\/\/zt.360.cn\/1101061855.php?dtid=1101061451&did=490024605  360 Internet security center. 2016 China telecom fraud situation analysis report. http:\/\/zt.360.cn\/1101061855.php?dtid=1101061451&did=490024605"},{"key":"e_1_3_2_1_4_1","first-page":"5","article-title":"Manikandan, Imbalanced dataset classification and solutions: a review.","author":"Ramyachitra D.","year":"2014","unstructured":"D. Ramyachitra , P . Manikandan, Imbalanced dataset classification and solutions: a review. Int. J. Comput. Bus. Res. 5 , 2014 . D. Ramyachitra, P. Manikandan, Imbalanced dataset classification and solutions: a review.Int. J. Comput. Bus. Res. 5, 2014.","journal-title":"Int. J. Comput. Bus. Res."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007326"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_8_1","volume-title":"Li. ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. In: IEEE International Joint Conference on Neural Networks, 1322--1328","author":"He H","year":"2008","unstructured":"H He , Y Bai , E A Garcia , and S Li. ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. In: IEEE International Joint Conference on Neural Networks, 1322--1328 , 2008 . H He, Y Bai, E A Garcia, and S Li. ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. In: IEEE International Joint Conference on Neural Networks, 1322--1328, 2008."},{"key":"e_1_3_2_1_9_1","article-title":"Asymptotic properties of nearest neighbor rules using edited data. Systems, Man and Cybernetics","author":"Wilson D.","year":"1972","unstructured":"D. Wilson . Asymptotic properties of nearest neighbor rules using edited data. Systems, Man and Cybernetics , IEEE Transactions on, 408--421 , 1972 . D. Wilson. Asymptotic properties of nearest neighbor rules using edited data. Systems, Man and Cybernetics, IEEE Transactions on, 408--421, 1972.","journal-title":"IEEE Transactions on, 408--421"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1977.4309660"},{"key":"e_1_3_2_1_11_1","volume-title":"ICML '2003","author":"Zhang J","year":"2003","unstructured":"J Zhang and I Mani . KNN Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction . In: ICML '2003 , 2003 . J Zhang and I Mani. KNN Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction. In: ICML '2003, 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.088"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.119"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312285"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2009.08136"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0222-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.088"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.09.010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0463-6"},{"key":"e_1_3_2_1_20_1","volume-title":"Total Margin Based Adaptive Fuzzy Support Vector Machines for Multiview Face Recognition. In: Proc. Int'l Conf. Systems, Man and Cybernetics, 1704--1711","author":"Liu Y.H.","year":"2005","unstructured":"Y.H. Liu and Y.T. Chen . Total Margin Based Adaptive Fuzzy Support Vector Machines for Multiview Face Recognition. In: Proc. Int'l Conf. Systems, Man and Cybernetics, 1704--1711 , 2005 . Y.H. Liu and Y.T. Chen. Total Margin Based Adaptive Fuzzy Support Vector Machines for Multiview Face Recognition. In: Proc. Int'l Conf. Systems, Man and Cybernetics, 1704--1711, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.07.089"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2015.7385940"},{"key":"e_1_3_2_1_23_1","volume-title":"ICDM'08","author":"Tony Fei","year":"2008","unstructured":"Liu, Fei Tony , Kai Ming Ting , and Zhi-Hua Zhou . Isolation forest . In: ICDM'08 , 2008 . Liu, Fei Tony, Kai Ming Ting, and Zhi-Hua Zhou. Isolation forest. In: ICDM'08, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.12.003"},{"key":"e_1_3_2_1_27_1","volume-title":"Ren Yang. SHE: Stepwise Heterogeneous Ensemble Method for Citywide Traffic Analysis. In: Proceedings of the 1st ACM SIGSPATIAL Workshop on Prediction of Human Mobility (PredictGIS'17)","author":"Liu Xiliang","year":"2017","unstructured":"Xiliang Liu , Kang Liu , Mingxiao Li , Feng Lu , Mengdi Liao , and Ren Yang. SHE: Stepwise Heterogeneous Ensemble Method for Citywide Traffic Analysis. In: Proceedings of the 1st ACM SIGSPATIAL Workshop on Prediction of Human Mobility (PredictGIS'17) . ACM, New York, NY, USA , 2017 . Xiliang Liu, Kang Liu, Mingxiao Li, Feng Lu, Mengdi Liao, and Ren Yang. SHE: Stepwise Heterogeneous Ensemble Method for Citywide Traffic Analysis. In: Proceedings of the 1st ACM SIGSPATIAL Workshop on Prediction of Human Mobility (PredictGIS'17). ACM, New York, NY, USA, 2017."},{"key":"e_1_3_2_1_28_1","unstructured":"https:\/\/www.in.gov\/oucc\/2418.htm.  https:\/\/www.in.gov\/oucc\/2418.htm."},{"key":"e_1_3_2_1_29_1","unstructured":"https:\/\/www.telegraph.co.uk\/business\/business-reporter\/tollring\/  https:\/\/www.telegraph.co.uk\/business\/business-reporter\/tollring\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2246188"},{"issue":"01","key":"e_1_3_2_1_31_1","article-title":"Telecommunication System Based on Fuzzy Graphs","volume":"03","author":"Pal Madhumangal","year":"2013","unstructured":"SovanSamanta, Madhumangal Pal . Telecommunication System Based on Fuzzy Graphs . J TelecommunSyst Manage , 03 ( 01 ), 2013 . SovanSamanta, Madhumangal Pal. Telecommunication System Based on Fuzzy Graphs. J TelecommunSyst Manage, 03(01), 2013.","journal-title":"J TelecommunSyst Manage"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2002.1024744"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.08.018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIDS.2017.8272643"}],"event":{"name":"ACAI 2019: 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence","sponsor":["Chinese Univ. of Hong Kong Chinese University of Hong Kong"],"location":"Sanya China","acronym":"ACAI 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377713.3377735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:55Z","timestamp":1750202635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377735"}},"subtitle":["A Dynamic SVM Framework for Telephone Fraud Identification from Imbalanced CDRs"],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":34,"alternative-id":["10.1145\/3377713.3377735","10.1145\/3377713"],"URL":"https:\/\/doi.org\/10.1145\/3377713.3377735","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}