{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:08Z","timestamp":1759335608648,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450489","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:48:16Z","timestamp":1621266496000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Learning Transaction Cohesiveness for Online Payment Fraud Detection"],"prefix":"10.1145","author":[{"given":"Jipeng","family":"Cui","sequence":"first","affiliation":[{"name":"Tongji University"}]},{"given":"Chungang","family":"Yan","sequence":"additional","affiliation":[{"name":"Tongji University"}]},{"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Tongji University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Based Big Data Analysis of Fraud Detection for Online Transaction Orders[J]","author":"Yang Q","year":"2015","unstructured":"Yang Q , Hu X , Cheng Z , Based Big Data Analysis of Fraud Detection for Online Transaction Orders[J] . vol. 1 , 2015 . pp. 1 - 10 . Yang Q , Hu X , Cheng Z , Based Big Data Analysis of Fraud Detection for Online Transaction Orders[J]. vol. 1, 2015. pp. 1-10."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033796.2033827"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE","author":"Kou Y","year":"2004","unstructured":"Kou Y , Lu C T , Sirwongwattana S , Survey of fraud detection techniques[C]\/\/ IEEE International Conference on Networking . IEEE , 2004 . Kou Y , Lu C T , Sirwongwattana S , Survey of fraud detection techniques[C]\/\/ IEEE International Conference on Networking. IEEE, 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.026"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.40"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0116-z"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume":"2020","author":"Li Z","unstructured":"Li Z , Liu G , Jiang C , Deep Representation Learning With Full Center Loss for Credit Card Fraud Detection[J] . IEEE Transactions on Computational Social Systems , 2020 : 1 - 11 . Li Z, Liu G, Jiang C, Deep Representation Learning With Full Center Loss for Credit Card Fraud Detection[J]. IEEE Transactions on Computational Social Systems, 2020: 1-11.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.013"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Chengdu","author":"Shen R.","year":"2007","unstructured":"A. Shen , R. Tong and Y. Deng , \" Application of Classification Models on Credit Card Fraud Detection,\" 2007 International Conference on Service Systems and Service Management , Chengdu , 2007 , pp. 1 - 4 . A. Shen, R. Tong and Y. Deng, \"Application of Classification Models on Credit Card Fraud Detection,\" 2007 International Conference on Service Systems and Service Management, Chengdu, 2007, pp. 1-4."},{"key":"e_1_3_2_1_13_1","first-page":"800","volume":"2004","author":"Chen R","unstructured":"Chen R , Chiu M , Huang Y , Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines[C] . Intelligent Data Engineering and Automated Learning , 2004 : 800 - 806 . Chen R, Chiu M, Huang Y, Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines[C]. Intelligent Data Engineering and Automated Learning, 2004: 800-806.","journal-title":"Intelligent Data Engineering and Automated Learning"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V8P225"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Rtayli N Enneya N . Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization[J]. Journal of Information Security and Applications 55.  Rtayli N Enneya N . Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization[J]. Journal of Information Security and Applications 55.","DOI":"10.1016\/j.jisa.2020.102596"},{"key":"e_1_3_2_1_16_1","volume-title":"BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES[C]. soft computing","author":"Dheepa V","year":"2012","unstructured":"Dheepa V , Dhanapal R. BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES[C]. soft computing , 2012 , 2(4): 391-397. Dheepa V, Dhanapal R. BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES[C]. soft computing, 2012, 2(4): 391-397."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"volume-title":"Hawaii International Conference on System Sciences","author":"Ghosh","key":"e_1_3_2_1_18_1","unstructured":"Ghosh , Reilly. Credit card fraud detection with a neural-network[C] . Hawaii International Conference on System Sciences , 1994: 621-630. Ghosh, Reilly. Credit card fraud detection with a neural-network[C]. Hawaii International Conference on System Sciences, 1994: 621-630."},{"volume-title":"International Conference on Machine Learning and Cybernetics","author":"Guo T","key":"e_1_3_2_1_19_1","unstructured":"Guo T , Li G. Neural data mining for credit card fraud detection[C] . International Conference on Machine Learning and Cybernetics , 2008: 3630-3634. Guo T, Li G. Neural data mining for credit card fraud detection[C]. International Conference on Machine Learning and Cybernetics, 2008: 3630-3634."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5120\/16947-6736"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6503459"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Akila S Reddy U S . Risk based bagged ensemble (RBE) for credit card fraud detection[C]\/\/ International Conference on Inventive Computing & Informatics. 2017:670-674.  Akila S Reddy U S . Risk based bagged ensemble (RBE) for credit card fraud detection[C]\/\/ International Conference on Inventive Computing & Informatics. 2017:670-674.","DOI":"10.1109\/ICICI.2017.8365220"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.201"},{"key":"e_1_3_2_1_25_1","volume-title":"Pacific Asia Conference on Information Systems","author":"Bian Y","year":"2016","unstructured":"Bian Y , Cheng M , Yang C , Financial fraud detection: A new ensemble learning approach for imbalanced data[C] . Pacific Asia Conference on Information Systems , 2016 . Bian Y, Cheng M, Yang C, Financial fraud detection: A new ensemble learning approach for imbalanced data[C]. Pacific Asia Conference on Information Systems, 2016."},{"key":"e_1_3_2_1_26_1","volume-title":"A Cost-sensitive weighted Random Forest Technique for Credit Card Fraud Detection[C]\/\/ 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","author":"Devi D","year":"2019","unstructured":"Devi D , Biswas S K , Purkayastha B . A Cost-sensitive weighted Random Forest Technique for Credit Card Fraud Detection[C]\/\/ 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) . 2019 . Devi D , Biswas S K , Purkayastha B . A Cost-sensitive weighted Random Forest Technique for Credit Card Fraud Detection[C]\/\/ 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 2019."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_20"},{"key":"e_1_3_2_1_28_1","volume-title":"ICONIP","author":"Fu K.","year":"2016","unstructured":"Fu K. , Cheng D. , Tu Y. , Zhang L. ( 2016 ) Credit Card Fraud Detection Using Convolutional Neural Networks. In: Hirose A., Ozawa S., Doya K., Ikeda K., Lee M., Liu D. (eds) Neural Information Processing . ICONIP 2016. Lecture Notes in Computer Science, vol 9949. Springer, Cham. Fu K., Cheng D., Tu Y., Zhang L. (2016) Credit Card Fraud Detection Using Convolutional Neural Networks. In: Hirose A., Ozawa S., Doya K., Ikeda K., Lee M., Liu D. (eds) Neural Information Processing. ICONIP 2016. Lecture Notes in Computer Science, vol 9949. Springer, Cham."},{"volume-title":"International Conference on Advances in Electrical Electronics Information Communication and Bio Informatics","author":"Malini N","key":"e_1_3_2_1_29_1","unstructured":"Malini N , Pushpa M. Analysis on credit card fraud identification techniques based on KNN and outlier detection[C] . International Conference on Advances in Electrical Electronics Information Communication and Bio Informatics , 2017: 255-258. Malini N, Pushpa M. Analysis on credit card fraud identification techniques based on KNN and outlier detection[C]. International Conference on Advances in Electrical Electronics Information Communication and Bio Informatics, 2017: 255-258."},{"key":"e_1_3_2_1_30_1","volume-title":"International Journal on Computer ence & Engineering","author":"Ganji V R","year":"2012","unstructured":"Ganji V R . Credit card fraud detection using anti-k nearest neighbor algorithm[J] . International Journal on Computer ence & Engineering , 2012 , 4(6):1035. Ganji V R . Credit card fraud detection using anti-k nearest neighbor algorithm[J]. International Journal on Computer ence & Engineering, 2012, 4(6):1035."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.7.1.34-38"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(95)00033-X"},{"key":"e_1_3_2_1_33_1","first-page":"48","article-title":"Credit Card Fraud Detection Using Self-Organizing Maps[J]","volume":"2006","author":"Zaslavsky V","unstructured":"Zaslavsky V , Strizhak A . Credit Card Fraud Detection Using Self-Organizing Maps[J] . Information & Security: An International Journal , 2006 : 48 - 63 . Zaslavsky V, Strizhak A. Credit Card Fraud Detection Using Self-Organizing Maps[J]. Information & Security: An International Journal, 2006: 48-63.","journal-title":"Information & Security: An International Journal"},{"key":"e_1_3_2_1_34_1","volume-title":"Deep Learning for Anomaly Detection: A Survey[J]. arXiv: Learning","author":"Chalapathy R","year":"2019","unstructured":"Chalapathy R , Chawla S. Deep Learning for Anomaly Detection: A Survey[J]. arXiv: Learning , 2019 . Chalapathy R, Chawla S. Deep Learning for Anomaly Detection: A Survey[J]. arXiv: Learning, 2019."},{"key":"e_1_3_2_1_35_1","volume-title":"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks[J]. arXiv: Learning","author":"Schreyer M","year":"2017","unstructured":"Schreyer M , Sattarov T , Borth D , Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks[J]. arXiv: Learning , 2017 . Schreyer M, Sattarov T, Borth D, Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks[J]. arXiv: Learning, 2017."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090103"},{"volume-title":"International Conference on Information Processing","author":"Schlegl T","key":"e_1_3_2_1_37_1","unstructured":"Schlegl T , Seebock P , Waldstein S M , Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery[C]. International Conference on Information Processing , 2017: 146-157. Schlegl T, Seebock P, Waldstein S M, Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery[C]. International Conference on Information Processing, 2017: 146-157."},{"key":"e_1_3_2_1_38_1","volume-title":"Stochastic Gradient Descent[M]\/\/ Deep Learning with Python","author":"Theodoridis S .","year":"2017","unstructured":"Theodoridis S . Stochastic Gradient Descent[M]\/\/ Deep Learning with Python . Apress , 2017 . Theodoridis S . Stochastic Gradient Descent[M]\/\/ Deep Learning with Python. Apress, 2017."}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:37Z","timestamp":1750193257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":38,"alternative-id":["10.1145\/3448734.3450489","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450489","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}