{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:55:40Z","timestamp":1773154540343,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Key R&D Program of China","award":["2016QY04W0805"],"award-info":[{"award-number":["2016QY04W0805"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["U1536106"],"award-info":[{"award-number":["U1536106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61728209"],"award-info":[{"award-number":["61728209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Top-notch Youth Talents Program of China"},{"name":"Youth Innovation Promotion Association CAS and Beijing Nova Program"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s42400-018-0008-5","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T08:51:38Z","timestamp":1535705498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Detecting telecommunication fraud by understanding the contents of a call"],"prefix":"10.1186","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6853-7248","authenticated-orcid":false,"given":"Qianqian","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tongxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"8_CR1","unstructured":"2015 China Mobile Internet Users\u2019 Network Security Status Report, China Internet Network Information Center (CNNIC) (2016). \n                    http:\/\/www.cac.gov.cn\/files\/pdf\/cnnic\/2015phone.pdf"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abdallah A, Maarof MA, Zainal A (2016) Fraud detection system: A survey. J Netw Comput Appl 68:90\u2013113. \n                    https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804516300571","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"8_CR3","unstructured":"Azad MA, Morla R (2011) Multistage spit detection in transit voip. Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference on. IEEE, pp 1\u20139"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2013.07.006","volume":"39","author":"MA Azad","year":"2013","unstructured":"Azad MA, Morla R (2013) Caller-rep: Detecting unwanted calls with caller social strength. Comput Secur 39:219\u2013236","journal-title":"Comput Secur"},{"key":"8_CR5","unstructured":"Baidu (2017), Telecommunication fraud, \n                    https:\/\/www.baidu.com\n                    \n                  \/"},{"key":"8_CR6","first-page":"18","volume-title":"Proceedings of the 10th European conference on principles and practice of knowledge discovery in databases","author":"H Blockeel","year":"2006","unstructured":"Blockeel H, Schietgat L, Struyf J, D\u017eeroski S, Clare A (2006a) Decision trees for hierarchical multilabel classification: a case study in functional genomics. In: Proceedings of the 10th European conference on principles and practice of knowledge discovery in databases, pp 18\u201329"},{"issue":"2","key":"8_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/511144.511149","volume":"35","author":"KH Chen","year":"2001","unstructured":"Chen KH, Chen HH (2001) Cross-language Chinese text retrieval in NTCIR workshop: towards cross-language multilingual text retrieval. ACM SIGIR Forum 35(2):12\u201319","journal-title":"ACM SIGIR Forum"},{"key":"8_CR8","unstructured":"Delamaire L, Abdou H, Pointon J (2009) Credit card fraud and detection techniques\u00a0: a review. Banks Bank Syst 4(2)"},{"key":"8_CR9","volume-title":"Chinese Investigation Report on Telecommunication Fraud Situations","author":"Facts","year":"2017","unstructured":"Facts (2017) Chinese Investigation Report on Telecommunication Fraud Situations, vol 12 \n                    http:\/\/news.qq.com\/cross\/20170309\/49rpD72V.html"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"272","DOI":"10.3115\/1075096.1075131","volume-title":"Improved source-channel models for Chinese word segmentation","author":"J Gao","year":"2003","unstructured":"Gao J, Li M, Huang C-N (2003) Improved source-channel models for Chinese word segmentation. Proceedings of the 41st Annual Meeting on Association for Computational Linguistics, Sapporo, pp 272\u2013279. \n                    https:\/\/doi.org\/10.3115\/1075096.1075131"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Jackson P, Moulinier I (2007) Natural language processing for online applications: Text retrieval, extraction and categorization, vol 5. John Benjamins Publishing","DOI":"10.1075\/nlp.5"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Jiang N, Jin Y, Skudlark A, Hsu W-L, Jacobson G, Prakasam S, Zhang Z-L (2012) Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis. In: Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM, pp 253\u2013266","DOI":"10.1145\/2307636.2307660"},{"key":"8_CR13","unstructured":"Jiang N, Jin Y, Skudlark A, Zhang Z-L (2013) Greystar: Fast and accurate detection of sms spam numbers in large cellular networks using gray phone space. USENIX Security Symposium, pp 1\u201316"},{"issue":"1","key":"8_CR14","first-page":"6","volume":"5","author":"P Kolan","year":"2008","unstructured":"Kolan P, Dantu R, Cangussu JW (2008) Nuisance level of a voice call. ACM Trans Multimed Comput, Commun Appl (TOMM) 5(1):6","journal-title":"ACM Trans Multimed Comput, Commun Appl (TOMM)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Leontjeva A, Goldszmidt M, Xie Y, Yu F, Abadi M (2013) Early security classification of skype users via machine learning. Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, ser. AISec, p 13","DOI":"10.1145\/2517312.2517322"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Li H, Xu X, Liu C (2018) A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks. 39th IEEE Symposium on Security and Privacy. IEEE, pp 561\u2013577","DOI":"10.1109\/SP.2018.00034"},{"key":"8_CR17","volume-title":"What is the road to preventing and controlling telecommunications fraud, Daily inspection, 02.23","author":"Y Li","year":"2017","unstructured":"Li Y, Yuan H (2017) What is the road to preventing and controlling telecommunications fraud, Daily inspection, 02.23. \n                    http:\/\/www.spp.gov.cn\/llyj\/201702\/t20170223_181874.shtml"},{"key":"8_CR18","first-page":"62","volume":"3","author":"H Lookman Sithic","year":"2013","unstructured":"Lookman Sithic H, Balasubramanian T (2013) Survey of insurance fraud detection using data mining techniques. Int. J. Innov. Technol. Explor. Eng 3:62\u201365","journal-title":"Int. J. Innov. Technol. Explor. Eng"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Miramirkhani N, Starov O, Nikiforakis N (2017) Dial one for scam: analyzing and detecting technical support scams. NDSS","DOI":"10.14722\/ndss.2017.23163"},{"key":"8_CR20","unstructured":"Open platform from iFLYTEK (2017). \n                    http:\/\/www.xfyun.cn"},{"key":"8_CR21","first-page":"1","volume-title":"Reexamining tf.idf based information retrieval with Genetic Programming. In Proceedings of SAICSIT 2002","author":"N Oren","year":"2002","unstructured":"Oren N (2002) Reexamining tf.idf based information retrieval with Genetic Programming. In Proceedings of SAICSIT 2002, pp 1\u201310"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Patankar P, Nam G, Kesidis G, Das CR (2008) Exploring anti-spam models in large scale voip systems. In: Distributed Computing Systems. ICDCS\u201908. The 28th international conference on. IEEE, pp 85\u201392.","DOI":"10.1109\/ICDCS.2008.71"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3102\/10769986031004437","volume":"31","author":"KJ Preacher","year":"2006","unstructured":"Preacher KJ, Curran PJ, Bauer DJ (2006) Computational tools for probing interactions in multiple linear regression, multilevel modeling, and latent curve analysis. J Educ Behav Stat 31:437\u2013448","journal-title":"J Educ Behav Stat"},{"key":"8_CR24","volume-title":"Proceedings of the 2nd VoIP security workshop","author":"Y Rebahi","year":"2005","unstructured":"Rebahi Y, Sisalem D (2005) Sip service providers and the spam problem. In: Proceedings of the 2nd VoIP security workshop"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rebahi Y, Sisalem D, MageDanz T (2006) Sip spam detection. Digital Telecommunications, 2006. ICDT\u201906. International conference on. IEEE, pp 68\u201368","DOI":"10.1109\/ICDT.2006.69"},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.istr.2010.10.012","volume":"16","author":"Y Rebahi","year":"2011","unstructured":"Rebahi Y, Nassar M, Magedanz T, Festor O (2011) A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep 16(1):12\u201319","journal-title":"Inf. Secur. Tech. Rep"},{"issue":"5","key":"8_CR27","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton G, Buckley C (1988) Term-weighing approache sin automatic text retrieval. Inf Process Manag 24(5):513\u2013523","journal-title":"Inf Process Manag"},{"key":"8_CR28","volume-title":"Training neural network language models on very large corpora, Proc. Joint Conference HLT\/EMNLP","author":"H Schwenk","year":"2005","unstructured":"Schwenk H, Gauvain J-L (2005) Training neural network language models on very large corpora, Proc. Joint Conference HLT\/EMNLP"},{"key":"8_CR29","unstructured":"Sina Weibo (2017) Telecommunication fraud. \n                    http:\/\/s.weibo.com\/weibo\/\n                    \n                  ."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of spit mitigation algorithms. In: Communications, 2009. ICC\u201909. IEEE international conference on. IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2009.5198660"},{"key":"8_CR31","volume-title":"Preventing spam for sip-based instant messages and sessions","author":"K Srivastava","year":"2004","unstructured":"Srivastava K, Schulzrinne HG (2004) Preventing spam for sip-based instant messages and sessions"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.procs.2015.04.193","volume":"48","author":"S Subudhi","year":"2015","unstructured":"Subudhi S, Panigrahi S (2015) Quarter-sphere support vector machine for fraud detection in mobile telecommunication networks. Procedia Comp Sci 48:353\u2013359","journal-title":"Procedia Comp Sci"},{"key":"8_CR33","volume-title":"Computational intelligence in data mining. Advances in intelligent systems and computing","author":"S Subudhi","year":"2017","unstructured":"Subudhi S, Panigrahi S (2017) Use of Possibilistic fuzzy C-means clustering for telecom fraud detection. In: Behera H, Mohapatra D (eds) Computational intelligence in data mining. Advances in intelligent systems and computing, vol 556. Springer, Singapore"},{"key":"8_CR34","volume-title":"THUCTC: An Efficient Chinese Text Classifier.","author":"M Sun","year":"2016","unstructured":"Sun M, Li J, Guo Z, Yu Z, Zheng Y, Si X, Liu Z (2016) THUCTC: An Efficient Chinese Text Classifier."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Wang F, Mo Y, Huang B (2007) P2p-avs: P2p based cooperative voip spam filtering. In: Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp 3547\u20133552","DOI":"10.1109\/WCNC.2007.650"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Wang F, Wang FR, Huang B, Yang LT (2013) Advs: a reputation-based model on filtering spit over p2p-voip networks. J Supercomputing:1\u201318","DOI":"10.1007\/s11227-010-0545-5"},{"key":"8_CR37","unstructured":"Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voiceover-ip calls through semi-supervised clustering. Dependable Systems & Networks, 2009. DSN\u201909. IEEE\/IFIP international conference on. IEEE, pp 307\u2013316"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Zhang G, Fischer-Hubner S (2011) Detecting near-duplicate spits in voice \u00a8 mailboxes using hashes. ISC. Springer, pp 152\u2013167","DOI":"10.1007\/978-3-642-24861-0_11"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Zhang R, Gurtov A (2009) Collaborative reputation-based voice spam filtering. In: Database and Expert Systems Application, 2009. DEXA\u201909. 20th International Workshop on. IEEE, pp 33\u201337","DOI":"10.1109\/DEXA.2009.95"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-018-0008-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-018-0008-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-018-0008-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T05:35:29Z","timestamp":1567229729000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-018-0008-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,31]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["8"],"URL":"https:\/\/doi.org\/10.1186\/s42400-018-0008-5","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,31]]},"assertion":[{"value":"13 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"We confirm that we have given due consideration to the protection of intellectual property associated with this work. We confirm that we have followed the regulations of our institutions concerning intellectual property. And all authors agree with its submission to Cybersecurity.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"8"}}