{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:30:36Z","timestamp":1767007836878,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3638584.3638669","type":"proceedings-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T11:15:19Z","timestamp":1710414919000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection of Financial Fraudulent Activities with Machine Learning:A Case Study of Detecting Potential Tax and Invoice Fraud"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4196-3044","authenticated-orcid":false,"given":"Maohong","family":"Tian","sequence":"first","affiliation":[{"name":"ChongQing Institute of Engineering, China and Intelligent Application of Financial Big Data Chongqing Colleges and Universities Engineering Research Center, China and Shu Yi Xin Credit Management Co,LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5648-541X","authenticated-orcid":false,"given":"Jian","family":"Liang","sequence":"additional","affiliation":[{"name":"ChongQing Institute of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8998-8718","authenticated-orcid":false,"given":"Dequan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shu Yi Xin Credit Management Co,LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0626-5590","authenticated-orcid":false,"given":"Xintong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shu Yi Xin Credit Management Co,LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0668-4991","authenticated-orcid":false,"given":"Zuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Shu Yi Xin Credit Management Co,LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9536-3477","authenticated-orcid":false,"given":"Hualin","family":"Li","sequence":"additional","affiliation":[{"name":"ChongQing Institute of Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577530.3577588"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553963"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9121114"},{"key":"e_1_3_2_1_4_1","first-page":"394","article-title":"Insurance fraud detection using big data analytics","volume":"91","author":"Lin X","year":"2018","unstructured":"[4]Lin X, Li Y, Li X, and Li Y. 2018. Insurance fraud detection using big data analytics. Expert Systems with Applications, Vol.91, 394-404.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_2_1_5_1","first-page":"198","article-title":"Detecting money laundering using machine learning techniques","volume":"124","author":"Liu Y","year":"2019","unstructured":"[5] [4]Liu Y, Li Y, Li X, and Li Y. 2019. Detecting money laundering using machine learning techniques. Expert Systems with Applications, Vol.124, 198-207.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_2_1_6_1","first-page":"144","article-title":"Detecting tax fraud using big data analytics and machine learning techniques","volume":"49","author":"Al-Awal M H","year":"2019","unstructured":"[6] Al-Awal M H, Al-Awal M A, & Al-Shammari, A. (2019). Detecting tax fraud using big data analytics and machine learning techniques. International Journal of Information Management, Vol.49, 144-155.","journal-title":"International Journal of Information Management"},{"key":"e_1_3_2_1_7_1","first-page":"103","article-title":"Detecting invoice fraud using machine learning techniques","volume":"104","author":"Huang Y","year":"2018","unstructured":"[7] Huang Y, Li X, Li Y, and Li X. 2018. Detecting invoice fraud using machine learning techniques. Expert Systems with Applications, Vol.104, 103-112.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007617005950"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"[9] Bowd C Weinreb R N Balasubramanian M et al.2014.Glaucomatous Patterns in Frequency Doubling Technology (FDT) Perimetry Data Identified by Unsupervised Machine Learning Classifiers.PLoS ONE 9(1):e85941. https:\/\/doi.org\/10.1371\/journal.pone.0085941.","DOI":"10.1371\/journal.pone.0085941"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"[10] Modha DS Spangler WS.2003.Feature Weighting in k-Means Clustering.Machine Learning Vol.52 217-237. https:\/\/doi.org\/10.1023\/A:1024016609528","DOI":"10.1023\/A:1024016609528"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"[11] Maulik B U.2002. An evolutionary technique based on K-Means algorithm for optimal clustering in RN.Information Sciences Vol.146 221-237. https:\/\/doi.org\/10.1016\/S0020-0255(02)00208-6.","DOI":"10.1016\/S0020-0255(02)00208-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"[12] Yewang C Shenyu T Nizar B et al.2018. A Fast Clustering Algorithm based on pruning unnecessary distance computations in DBSCAN for High-Dimensional Data.Pattern Recognition Vol.83 375-387. https:\/\/doi.org\/10.1016\/j.patcog.2018.05.030.","DOI":"10.1016\/j.patcog.2018.05.030"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.01.034"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"[14] Kuroki Y Matsui T.2009.An approximation algorithm for multidimensional assignment problems minimizing the sum of squared errors.Discrete Applied Mathematics Vol.157 2124-2135. https:\/\/doi.org\/10.1016\/j.dam.2007.10.013.","DOI":"10.1016\/j.dam.2007.10.013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2009.02-09-959"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2009.06.006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105107"}],"event":{"name":"CSAI 2023: 2023 7th International Conference on Computer Science and Artificial Intelligence","acronym":"CSAI 2023","location":"Beijing China"},"container-title":["Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638584.3638669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638584.3638669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:55:48Z","timestamp":1755874548000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638584.3638669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":17,"alternative-id":["10.1145\/3638584.3638669","10.1145\/3638584"],"URL":"https:\/\/doi.org\/10.1145\/3638584.3638669","relation":{},"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"2024-03-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}