{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:26Z","timestamp":1750220546241,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,7]]},"DOI":"10.1145\/3466933.3466986","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T14:08:32Z","timestamp":1625753312000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fraud Detection in Social Commerce: combining structured attributes and images"],"prefix":"10.1145","author":[{"given":"Apolo Takeshi Arai","family":"Batista","sequence":"first","affiliation":[{"name":"Instituto Militar de Engenharia"}]},{"given":"Karla Tereza","family":"Figueiredo","sequence":"additional","affiliation":[{"name":"Universidade do Estado do Rio de Janeiro (UERJ)"}]},{"given":"Ronaldo Ribeiro","family":"Goldschmidt","sequence":"additional","affiliation":[{"name":"Instituto Militar de Engenharia"}]}],"member":"320","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.030"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.036"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.02.027"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An introduction to kernel and nearest-neighbor nonparametric regression","volume":"46","author":"Altman S","year":"1992","unstructured":"Naomi\u00a0 S Altman . 1992 . An introduction to kernel and nearest-neighbor nonparametric regression . The American Statistician 46 , 3 (1992), 175 \u2013 185 . Naomi\u00a0S Altman. 1992. An introduction to kernel and nearest-neighbor nonparametric regression. The American Statistician 46, 3 (1992), 175\u2013185.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_6_1","volume-title":"Carros s\u00f3 pra rodar: entenda como funciona. Retrieved","author":"Automotivas Noticias","year":"2019","unstructured":"Noticias Automotivas . 2018. Carros s\u00f3 pra rodar: entenda como funciona. Retrieved June 3, 2019 from www.noticiasautomotivas.com.br\/carros-so-pra-rodar Noticias Automotivas. 2018. Carros s\u00f3 pra rodar: entenda como funciona. Retrieved June 3, 2019 from www.noticiasautomotivas.com.br\/carros-so-pra-rodar"},{"key":"e_1_3_2_1_7_1","article-title":"Utilizing product features for fraud detection on e-commerce platforms in big data transactions","volume":"5","author":"Baig Aashir","year":"2020","unstructured":"Aashir Baig and K\u00a0Nagi Reddy . 2020 . Utilizing product features for fraud detection on e-commerce platforms in big data transactions . Inter. Journal 5 , 11 (2020). Aashir Baig and K\u00a0Nagi Reddy. 2020. Utilizing product features for fraud detection on e-commerce platforms in big data transactions. Inter. Journal 5, 11 (2020).","journal-title":"Journal"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.007"},{"key":"e_1_3_2_1_11_1","volume-title":"Deep Learning-based Online Counterfeit-seller Detection. INFOCOM - IEEE Inter. Conf. on Computer Communications 1","author":"Cheung Ming","year":"2018","unstructured":"Ming Cheung , James She , and Lufi Liu . 2018 . Deep Learning-based Online Counterfeit-seller Detection. INFOCOM - IEEE Inter. Conf. on Computer Communications 1 (2018), 51\u201356. Ming Cheung, James She, and Lufi Liu. 2018. Deep Learning-based Online Counterfeit-seller Detection. INFOCOM - IEEE Inter. Conf. on Computer Communications 1 (2018), 51\u201356."},{"key":"e_1_3_2_1_12_1","volume-title":"Characterizing User Connections in Social Media through User Shared Image","author":"Cheung Ming","year":"2017","unstructured":"Ming Cheung , James She , and Ning Wang . 2017. Characterizing User Connections in Social Media through User Shared Image . IEEE Trans. on Big Data( 2017 ). Ming Cheung, James She, and Ning Wang. 2017. Characterizing User Connections in Social Media through User Shared Image. IEEE Trans. on Big Data(2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2011.14504801096"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Dobreva Ksenia","year":"2018","unstructured":"Ksenia Dobreva . 2018 . Global E-commerce Trends and Statistics . Retrieved April 24, 2018 from www.amasty.com\/blog\/2018\/02\/global-trends-and-statistics.pdf Ksenia Dobreva. 2018. Global E-commerce Trends and Statistics. Retrieved April 24, 2018 from www.amasty.com\/blog\/2018\/02\/global-trends-and-statistics.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"2017 Annual Internet Crime Report","author":"FBI.","year":"2017","unstructured":"FBI. 2017. 2017 Annual Internet Crime Report . Federal Bureau of Investigation - Internet Crime Complaint Center ( 2017 ). FBI. 2017. 2017 Annual Internet Crime Report. Federal Bureau of Investigation - Internet Crime Complaint Center (2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3073807"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs025"},{"volume-title":"Statistical models: theory and practice","author":"Freedman A","key":"e_1_3_2_1_20_1","unstructured":"David\u00a0 A Freedman . 2009. Statistical models: theory and practice . Cambridge University Press . David\u00a0A Freedman. 2009. Statistical models: theory and practice. Cambridge University Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"key":"e_1_3_2_1_22_1","unstructured":"Simon Haykin. 2007. Redes neurais: princ\u00edpios e pr\u00e1tica. Bookman Editora. Simon Haykin. 2007. Redes neurais: princ\u00edpios e pr\u00e1tica. Bookman Editora."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_24_1","volume-title":"Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. preprint arXiv:1704.04861(2017).","author":"Howard G","year":"2017","unstructured":"Andrew\u00a0 G Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017 . Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. preprint arXiv:1704.04861(2017). Andrew\u00a0G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. preprint arXiv:1704.04861(2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003147"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2074158.2074196"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.09.002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.04.009"},{"volume-title":"Discriminant analysis and statistical pattern recognition. Vol.\u00a0544","author":"McLachlan J","key":"e_1_3_2_1_29_1","unstructured":"Geoffrey\u00a0 J McLachlan . 2004. Discriminant analysis and statistical pattern recognition. Vol.\u00a0544 . John Wiley & Sons . Geoffrey\u00a0J McLachlan. 2004. Discriminant analysis and statistical pattern recognition. Vol.\u00a0544. John Wiley & Sons."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/inte.2019.1017"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80053-6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.021"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_36_1","volume-title":"Retrieved","author":"SEBRAE.","year":"2017","unstructured":"SEBRAE. 2017 . O que voc\u00ea precisa saber sobre com\u00e9rcio eletr\u00f4nico . Retrieved July 15, 2020 from https:\/\/tinyurl.com\/sebraesbsi SEBRAE. 2017. O que voc\u00ea precisa saber sobre com\u00e9rcio eletr\u00f4nico. Retrieved July 15, 2020 from https:\/\/tinyurl.com\/sebraesbsi"},{"key":"e_1_3_2_1_37_1","volume-title":"Monthly Active Facebook Users Worldwide. Retrieved","author":"Statista Dossier","year":"2018","unstructured":"Dossier Statista . 2017. Monthly Active Facebook Users Worldwide. Retrieved May 3, 2018 from https:\/\/tinyurl.com\/sbsi-2021-facebook Dossier Statista. 2017. Monthly Active Facebook Users Worldwide. Retrieved May 3, 2018 from https:\/\/tinyurl.com\/sbsi-2021-facebook"},{"key":"e_1_3_2_1_38_1","volume-title":"Monthly Active Instagram Users. Retrieved","author":"Statista Dossier","year":"2018","unstructured":"Dossier Statista . 2018. Monthly Active Instagram Users. Retrieved May 6, 2018 from https:\/\/tinyurl.com\/sbsi-2021-instagram Dossier Statista. 2018. Monthly Active Instagram Users. Retrieved May 6, 2018 from https:\/\/tinyurl.com\/sbsi-2021-instagram"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms methods and techniques. Vol.\u00a01. IGI global 242\u2013264. Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms methods and techniques. Vol.\u00a01. IGI global 242\u2013264.","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.016"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Monica\u00a0T Whitty and Tom Buchanan. 2012. The online romance scam: A serious cybercrime. CyberPsychology Behavior and Social Networking 15 3(2012). Monica\u00a0T Whitty and Tom Buchanan. 2012. The online romance scam: A serious cybercrime. CyberPsychology Behavior and Social Networking 15 3(2012).","DOI":"10.1089\/cyber.2011.0352"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.09.005"},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"Detecting Identity Fraud on Social Network Services: A Case Study With Facebook","volume":"11","year":"2015","unstructured":"Shan-hung Wu, Man-ju Chou, Chun-hsiung Tseng, Yuh-jye Lee, and Kuan-ta Chen. 2015 . Detecting Identity Fraud on Social Network Services: A Case Study With Facebook . IEEE Systems Journal 11 , 4 (2015), 1 \u2013 12 . Shan-hung Wu, Man-ju Chou, Chun-hsiung Tseng, Yuh-jye Lee, and Kuan-ta Chen. 2015. Detecting Identity Fraud on Social Network Services: A Case Study With Facebook. IEEE Systems Journal 11, 4 (2015), 1\u201312.","journal-title":"IEEE Systems Journal"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577308"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2012.12"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.11.010"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.04.001"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.04.003"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmdem.2011010102"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380172"}],"event":{"name":"SBSI 2021: XVII Brazilian Symposium on Information Systems","acronym":"SBSI 2021","location":"Uberl\u00e2ndia Brazil"},"container-title":["XVII Brazilian Symposium on Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466986","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466933.3466986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:10Z","timestamp":1750195690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":50,"alternative-id":["10.1145\/3466933.3466986","10.1145\/3466933"],"URL":"https:\/\/doi.org\/10.1145\/3466933.3466986","relation":{},"subject":[],"published":{"date-parts":[[2021,6,7]]},"assertion":[{"value":"2021-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}