{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:48:39Z","timestamp":1773514119785,"version":"3.50.1"},"reference-count":15,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2016ini0003","type":"journal-article","created":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T22:24:23Z","timestamp":1506810263000},"page":"2267-2274","source":"Crossref","is-referenced-by-count":9,"title":["Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Liang-Chun","family":"CHEN","sequence":"first","affiliation":[{"name":"Department of Management, Fo Guang University"}]},{"given":"Chien-Lung","family":"HSU","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chang Gung University"}]},{"given":"Nai-Wei","family":"LO","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology"}]},{"given":"Kuo-Hui","family":"YEH","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Dong Hwa University"}]},{"given":"Ping-Hsien","family":"LIN","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] A. Agrawal, S. Kumar, and A.K. Mishra, \u201cCredit card fraud detection: A case study,\u201d International Conference on Computing for Sustainable Global Development, pp.5-7, 2015."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M.H. Cahill, D. Lambert, J.C. Pinheiro, and D.X. Sun, \u201cDetecting fraud in the real world,\u201d Handbook of Massive Data Sets, vol.4, pp.911-929, 2002. 10.1007\/978-1-4615-0005-6_26","DOI":"10.1007\/978-1-4615-0005-6_26"},{"key":"3","unstructured":"[3] S. Freeman, A. Bivens, J. Branch, and B. Szymanski, \u201cHost-Based Intrusion Detection Using User Signatures,\u201d Graduate Research Conference, 2002. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.113.3217&amp;rep=rep1&amp;type=pdf, accessed August 22. 2017."},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] P.-Y. Hui and H.Y. Meng, \u201cLatent semantic analysis for multimodal user input with speech and gestures,\u201d IEEE\/ACM Transactions on Audio, Speech, and Language Processing, vol.22, no.2, pp.417-429, 2014. 10.1109\/taslp.2013.2294586","DOI":"10.1109\/TASLP.2013.2294586"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] S. Jamshidi and M.R. Hashemi, \u201cAn efficient data enrichment scheme for fraud detection using social network analysis,\u201d 6th International Symposium on Telecommunications (IST), pp.1082-1087, 2012. 10.1109\/istel.2012.6483147","DOI":"10.1109\/ISTEL.2012.6483147"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] W. Lee and K.W. Mok, \u201cAdaptive intrusion detection: a data mining approach,\u201d Artificial Intelligence Review, vol.14, no.6, pp.533-567, 2000. 10.1023\/a:1006624031083","DOI":"10.1023\/A:1006624031083"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Nandhini and B.B. Das, \u201cAn assessment and methodology for fraud detection in online social network,\u201d The 2nd International Conference on Science Technology Engineering and Management (ICONSTEM), pp.104-108, 2016. 10.1109\/iconstem.2016.7560932","DOI":"10.1109\/ICONSTEM.2016.7560932"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Y. Sylla and P. Morizet-Mahoudeaux, \u201cFraud detection on large scale social networks,\u201d 2013 IEEE International Congress on Big Data, pp.413-414, 2013. 10.1109\/bigdata.congress.2013.62","DOI":"10.1109\/BigData.Congress.2013.62"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] V.V. Vlasselaer, T. Eliassi-Rad, L. Akoglu, M. Snoeck, and B. Baesens, \u201cAFRAID: Fraud detection via active inference in time-evolving social networks,\u201d 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp.659-666, 2015. 10.1145\/2808797.2810058","DOI":"10.1145\/2808797.2810058"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S.-H. Wu, M.-J. Chou, C.-H. Tseng, Y.-J. Lee, and K.-T. Chen, \u201cDetecting <i>in situ<\/i> identity fraud on social network services: A case study with facebook,\u201d IEEE Systems Journal, 2015. DOI:10.1109\/JSYST.2015.2504102","DOI":"10.1109\/JSYST.2015.2504102"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Z. Yanchun, Z. Wei, and Y. Changhai, \u201cDetection of feedback reputation fraud in taobao using social network theory,\u201d 2011 International Joint Conference on Service Sciences, pp.188-192, 2011. 10.1109\/ijcss.2011.44","DOI":"10.1109\/IJCSS.2011.44"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] X. Ying, X. Wu, and D. Barbar\u00e1, \u201cSpectrum based fraud detection in social networks,\u201d IEEE 27th International Conference on Data Engineering, pp.912-923, 2011. 10.1109\/icde.2011.5767910","DOI":"10.1109\/ICDE.2011.5767910"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] W.-F. Yu and N. Wang, \u201cResearch on credit card fraud detection model based on distance sum,\u201d International Joint Conference on Artificial Intelligence (JCAI &apos;09), pp.353-356, 2009. 10.1109\/jcai.2009.146","DOI":"10.1109\/JCAI.2009.146"},{"key":"14","unstructured":"[14] CKIP word segmentation, http:\/\/ckipsvr.iis.sinica.edu.tw\/, accessed April 24. 2017."},{"key":"15","unstructured":"[15] Criminal Investigation Bureau, Taiwan, http:\/\/www.cib.gov.tw\/english\/, accessed Dec. 14. 2016."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/10\/E100.D_2016INI0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T23:37:03Z","timestamp":1750894623000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/10\/E100.D_2016INI0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":15,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016ini0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}