BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (17)
use (5)
base (4)
system (4)
data (4)

Stem fraud$ (all stems)

25 papers:

KDDKDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
SACSAC-2015-SantiagoPH #approach #detection #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
ICEISICEIS-v1-2014-Lenz #detection
Data Fraud Detection (HJL), p. XV.
ICEISICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-ThorntonCPHM #detection #health
Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
KDDKDD-2014-FortunySMMPM #detection
Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
CIKMCIKM-2013-ZhuXGC #detection #mobile #perspective #ranking
Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
KDDKDD-2013-Gesher #adaptation
Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
KDDKDD-2013-StitelmanPDHRP #detection #network #online #scalability #using
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
ICEISICEIS-v1-2012-AstiazaraB #energy #predict
Application of an Artificial Immune System to Predict Electrical Energy Fraud and Theft (MVA, DACB), pp. 265–271.
CIKMCIKM-2011-ZhangYCT #detection
A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
KDDKDD-2011-GabburPFT #approach #detection
A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
SEKESEKE-2011-BragaD #detection #information management #tool support #using
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SACSAC-2010-MaranzatoPLN #detection #using
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
ICEISICEIS-ISAS-2009-EdgeSPC #compilation #policy #specification
Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
ICEISICEIS-AIDSS-2008-JansLV #case study #data mining #mining #reduction
Internal Fraud Risk Reduction — Results of a Data Mining Case Study (MJ, NL, KV), pp. 161–166.
KDDKDD-2007-FastFMTJGK #detection #preprocessor #relational
Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
ICPRICPR-v1-2006-XuSL #adaptation #behaviour #detection #monitoring
Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
KDDKDD-2006-VirdhagriswaranD #detection
Camouflaged fraud detection in domains with complex relationships (SV, GD), pp. 941–947.
VLDBVLDB-2005-MetwallyAA #detection #network #using #web
Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
KDDKDD-2005-NevilleSJKPG #information management #relational #using
Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
ICEISICEIS-v4-2004-SuiAM #approach #e-commerce #email
Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
KDDKDD-1999-BonchiGMP #classification #detection
A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
KDDKDD-1999-RossetMNIP #challenge
Discovery of Fraud Rules for Telecommunications — Challenges and Solutions (SR, UM, EN, YI, GP), pp. 409–413.
KDDKDD-1998-ChanS #case study #detection #learning #scalability #towards
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (PKC, SJS), pp. 164–168.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.