25 papers:
- KDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict
- Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
- SAC-2015-SantiagoPH #approach #detection #modelling
- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
- ICEIS-v1-2014-Lenz #detection
- Data Fraud Detection (HJL), p. XV.
- ICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
- ICEIS-v2-2014-ThorntonCPHM #detection #health
- Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
- KDD-2014-FortunySMMPM #detection
- Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
- CIKM-2013-ZhuXGC #detection #mobile #perspective #ranking
- Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
- KDD-2013-Gesher #adaptation
- Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
- KDD-2013-StitelmanPDHRP #detection #network #online #scalability #using
- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
- ICEIS-v1-2012-AstiazaraB #energy #predict
- Application of an Artificial Immune System to Predict Electrical Energy Fraud and Theft (MVA, DACB), pp. 265–271.
- CIKM-2011-ZhangYCT #detection
- A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
- KDD-2011-GabburPFT #approach #detection
- A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
- SEKE-2011-BragaD #detection #information management #tool support #using
- Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
- SAC-2010-MaranzatoPLN #detection #using
- Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
- ICEIS-ISAS-2009-EdgeSPC #compilation #policy #specification
- Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
- ICEIS-AIDSS-2008-JansLV #case study #data mining #mining #reduction
- Internal Fraud Risk Reduction — Results of a Data Mining Case Study (MJ, NL, KV), pp. 161–166.
- KDD-2007-FastFMTJGK #detection #preprocessor #relational
- Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
- ICPR-v1-2006-XuSL #adaptation #behaviour #detection #monitoring
- Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
- KDD-2006-VirdhagriswaranD #detection
- Camouflaged fraud detection in domains with complex relationships (SV, GD), pp. 941–947.
- VLDB-2005-MetwallyAA #detection #network #using #web
- Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
- KDD-2005-NevilleSJKPG #information management #relational #using
- Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
- ICEIS-v4-2004-SuiAM #approach #e-commerce #email
- Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
- KDD-1999-BonchiGMP #classification #detection
- A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
- KDD-1999-RossetMNIP #challenge
- Discovery of Fraud Rules for Telecommunications — Challenges and Solutions (SR, UM, EN, YI, GP), pp. 409–413.
- KDD-1998-ChanS #case study #detection #learning #scalability #towards
- Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (PKC, SJS), pp. 164–168.