{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:59:03Z","timestamp":1776931143923,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,15]]},"DOI":"10.1145\/3768292.3770422","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:24:26Z","timestamp":1763105066000},"page":"238-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BMI-GP: Unsupervised Breach Merchant Identification via Adaptive Graph Pruning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5121-4600","authenticated-orcid":false,"given":"Kamna","family":"Meena","sequence":"first","affiliation":[{"name":"Mastercard, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9387-6289","authenticated-orcid":false,"given":"Subham","family":"Kumar Singh","sequence":"additional","affiliation":[{"name":"Mastercard, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9554-8498","authenticated-orcid":false,"given":"Priyanshi","family":"Gupta","sequence":"additional","affiliation":[{"name":"Mastercard, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3621-0893","authenticated-orcid":false,"given":"Gaurav","family":"Oberoi","sequence":"additional","affiliation":[{"name":"Mastercard, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1195-8308","authenticated-orcid":false,"given":"Nitish","family":"Srivasatava","sequence":"additional","affiliation":[{"name":"Mastercard, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6798-1240","authenticated-orcid":false,"given":"Siddhartha","family":"Asthana","sequence":"additional","affiliation":[{"name":"Mastercard, Gurugram, India"}]}],"member":"320","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.63"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Salim Bouamama Christian Blum and Abdellah Boukerram. 2012. A population-based iterated greedy algorithm for the minimum weight vertex cover problem. Applied Soft Computing 12 6 (2012) 1632\u20131639. 10.1016\/j.asoc.2012.02.013","DOI":"10.1016\/j.asoc.2012.02.013"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30 1-7 (1998) 107\u2013117.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_3_1_7_2","unstructured":"Jonathon Greig. 2023. Europol identifies hundreds of e-commerce platforms used in digital skimming attacks. https:\/\/therecord.media\/europol-identifies-hundreds-ecommerce-skimmers."},{"key":"e_1_3_3_1_8_2","unstructured":"K. P. Siegel R. A. Paynter R. L. Grossman C.Brown C. R. Byce T. Dwyer and A. Chen. 2013. System and method for identifying a point of compromise in a payment transaction processing system. US Patent US 8473415 B2."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_3_1_10_2","unstructured":"Kenneth Niemeyer. 2024. Card skimmers are hard to spot and on the rise. Here\u2019s what you can do to protect yourself. https:\/\/www.businessinsider.in\/tech\/news\/card-skimmers-are-hard-to-spot-and-on-the-rise-heres-what-you-can-do-to-protect-yourself-\/articleshow\/111560099.cms."},{"key":"e_1_3_3_1_11_2","volume-title":"20th International Symposium on Experimental Algorithms (SEA 2022)","author":"Langedal Kenneth","year":"2022","unstructured":"Kenneth Langedal, Johannes Langguth, Fredrik Manne, and Daniel\u00a0Thilo Schroeder. 2022. Efficient minimum weight vertex cover heuristics using graph neural networks. In 20th International Symposium on Experimental Algorithms (SEA 2022). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_3_1_14_2","unstructured":"Matt Rejj. 2025. Credit Card Fraud Statistics (2025). https:\/\/merchantcostconsulting.com\/lower-credit-card-processing-fees\/credit-card-fraud-statistics\/."},{"key":"e_1_3_3_1_15_2","unstructured":"Nilson Report. 2023. Card Fraud Losses Worldwide. https:\/\/nilsonreport.com\/newsletters\/1254. (2023). Issue 1254."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Tahereh Pourhabibi Kok-Leong Ong Booi Kam and Yee\u00a0Ling Boo. 2020. Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decision Support Systems 133 (04 2020) 113303. 10.1016\/j.dss.2020.113303","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00197"},{"key":"e_1_3_3_1_18_2","unstructured":"V. F. Klebanof. 2009. Method and system for assisting in the identification of merchants at which payment accounts have been compromised. US Patent US 8473415 B2."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.5555\/3491440.3491783"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18038-0_49"}],"event":{"name":"ICAIF '25: 6th ACM International Conference on AI in Finance","location":"Singapore Singapore","acronym":"ICAIF '25"},"container-title":["Proceedings of the 6th ACM International Conference on AI in Finance"],"original-title":[],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:32:36Z","timestamp":1763105556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3768292.3770422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":19,"alternative-id":["10.1145\/3768292.3770422","10.1145\/3768292"],"URL":"https:\/\/doi.org\/10.1145\/3768292.3770422","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]},"assertion":[{"value":"2025-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}