25 papers:
KDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict- Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
SAC-2015-SantiagoPH #approach #detection #modelling- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
ICEIS-v1-2014-Lenz #detection- Data Fraud Detection (HJL), p. XV.
ICEIS-v2-2014-BeenK #analysis #approach #internet #online #people- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEIS-v2-2014-ThorntonCPHM #detection #health- Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
KDD-2014-FortunySMMPM #detection- Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
CIKM-2013-ZhuXGC #detection #mobile #perspective #ranking- Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
KDD-2013-Gesher #adaptation- Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
KDD-2013-StitelmanPDHRP #detection #network #online #scalability #using- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
ICEIS-v1-2012-AstiazaraB #energy #predict- Application of an Artificial Immune System to Predict Electrical Energy Fraud and Theft (MVA, DACB), pp. 265–271.
CIKM-2011-ZhangYCT #detection- A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
KDD-2011-GabburPFT #approach #detection- A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
SEKE-2011-BragaD #detection #information management #tool support #using- Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SAC-2010-MaranzatoPLN #detection #using- Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
ICEIS-ISAS-2009-EdgeSPC #compilation #policy #specification- Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
ICEIS-AIDSS-2008-JansLV #case study #data mining #mining #reduction- Internal Fraud Risk Reduction — Results of a Data Mining Case Study (MJ, NL, KV), pp. 161–166.
KDD-2007-FastFMTJGK #detection #preprocessor #relational- Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
ICPR-v1-2006-XuSL #adaptation #behaviour #detection #monitoring- Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
KDD-2006-VirdhagriswaranD #detection- Camouflaged fraud detection in domains with complex relationships (SV, GD), pp. 941–947.
VLDB-2005-MetwallyAA #detection #network #using #web- Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
KDD-2005-NevilleSJKPG #information management #relational #using- Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
ICEIS-v4-2004-SuiAM #approach #e-commerce #email- Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
KDD-1999-BonchiGMP #classification #detection- A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
KDD-1999-RossetMNIP #challenge- Discovery of Fraud Rules for Telecommunications — Challenges and Solutions (SR, UM, EN, YI, GP), pp. 409–413.
KDD-1998-ChanS #case study #detection #learning #scalability #towards- Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (PKC, SJS), pp. 164–168.