Zafari, Babak; Ekin, Tahir; Ruggeri, Fabrizio Multicriteria decision frontiers for prescription anomaly detection over time. (English) Zbl 07611119 J. Appl. Stat. 49, No. 14, 3638-3658 (2022). MSC: 62Pxx PDF BibTeX XML Cite \textit{B. Zafari} et al., J. Appl. Stat. 49, No. 14, 3638--3658 (2022; Zbl 07611119) Full Text: DOI OpenURL
Bernard, Philippe; El Mekkaoui De Freitas, Najat; Maillet, Bertrand B. A financial fraud detection indicator for investors: an IDeA. (English) Zbl 07553135 Ann. Oper. Res. 313, No. 2, 809-832 (2022). MSC: 62Pxx 91Gxx 91Bxx PDF BibTeX XML Cite \textit{P. Bernard} et al., Ann. Oper. Res. 313, No. 2, 809--832 (2022; Zbl 07553135) Full Text: DOI OpenURL
Farbmacher, Helmut; Löw, Leander; Spindler, Martin An explainable attention network for fraud detection in claims management. (English) Zbl 07538779 J. Econom. 228, No. 2, 244-258 (2022). MSC: 62-XX 91-XX PDF BibTeX XML Cite \textit{H. Farbmacher} et al., J. Econom. 228, No. 2, 244--258 (2022; Zbl 07538779) Full Text: DOI OpenURL
Ekström, Erik; Lindensjö, Kristoffer; Olofsson, Marcus How to detect a salami slicer: a stochastic controller-and-stopper game with unknown competition. (English) Zbl 1485.91016 SIAM J. Control Optim. 60, No. 1, 545-574 (2022). MSC: 91A15 91A55 93E20 60G40 PDF BibTeX XML Cite \textit{E. Ekström} et al., SIAM J. Control Optim. 60, No. 1, 545--574 (2022; Zbl 1485.91016) Full Text: DOI arXiv OpenURL
Fang, Hui; Li, Xiaoming; Zhang, Jie Integrating social influence modeling and user modeling for trust prediction in signed networks. (English) Zbl 1478.68015 Artif. Intell. 302, Article ID 103628, 20 p. (2022). MSC: 68M11 68T05 91D30 PDF BibTeX XML Cite \textit{H. Fang} et al., Artif. Intell. 302, Article ID 103628, 20 p. (2022; Zbl 1478.68015) Full Text: DOI OpenURL
Höppner, Sebastiaan; Baesens, Bart; Verbeke, Wouter; Verdonck, Tim Instance-dependent cost-sensitive learning for detecting transfer fraud. (English) Zbl 1487.91169 Eur. J. Oper. Res. 297, No. 1, 291-300 (2022). MSC: 91G80 68T05 62H30 PDF BibTeX XML Cite \textit{S. Höppner} et al., Eur. J. Oper. Res. 297, No. 1, 291--300 (2022; Zbl 1487.91169) Full Text: DOI arXiv OpenURL
Mandal, Mriganka; Sarkar, Ramprasad; Hur, Junbeom; Nuida, Koji Efficient fully anonymous public-key trace and revoke with adaptive IND-CCA security. (English) Zbl 1504.94169 Deng, Robert (ed.) et al., Information security practice and experience. 16th international conference, ISPEC 2021, Nanjing, China, December 17–19, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13107, 168-189 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Mandal} et al., Lect. Notes Comput. Sci. 13107, 168--189 (2021; Zbl 1504.94169) Full Text: DOI OpenURL
Singh, Ajeet; Jain, Anurag Hybrid bio-inspired model for fraud detection with correlation based feature selection. (English) Zbl 07477595 J. Discrete Math. Sci. Cryptography 24, No. 5, 1365-1374 (2021). MSC: 68Txx PDF BibTeX XML Cite \textit{A. Singh} and \textit{A. Jain}, J. Discrete Math. Sci. Cryptography 24, No. 5, 1365--1374 (2021; Zbl 07477595) Full Text: DOI OpenURL
Mumic, Nermina; Filzmoser, Peter A multivariate test for detecting fraud based on Benford’s law, with application to music streaming data. (English) Zbl 1479.60031 Stat. Methods Appl. 30, No. 3, 819-840 (2021). MSC: 60E05 62H15 62P20 PDF BibTeX XML Cite \textit{N. Mumic} and \textit{P. Filzmoser}, Stat. Methods Appl. 30, No. 3, 819--840 (2021; Zbl 1479.60031) Full Text: DOI OpenURL
Krleža, Dalibor; Vrdoljak, Boris; Brčić, Mario Statistical hierarchical clustering algorithm for outlier detection in evolving data streams. (English) Zbl 07432800 Mach. Learn. 110, No. 1, 139-184 (2021). MSC: 68T05 PDF BibTeX XML Cite \textit{D. Krleža} et al., Mach. Learn. 110, No. 1, 139--184 (2021; Zbl 07432800) Full Text: DOI OpenURL
Ju, Chunhua; Chen, Guanyu; Bao, Fuguang KNN-Smote-LSTM based consumer financial risk detection model: a case credit card fraud detection. (Chinese. English summary) Zbl 1474.91231 J. Syst. Sci. Math. Sci. 41, No. 2, 481-498 (2021). MSC: 91G40 62M10 PDF BibTeX XML Cite \textit{C. Ju} et al., J. Syst. Sci. Math. Sci. 41, No. 2, 481--498 (2021; Zbl 1474.91231) OpenURL
Faridpour, Maryam; Moradi, Alireza A novel method for detection of fraudulent bank transactions using multi-layer neural networks with adaptive learning rate. (English) Zbl 07623380 Int. J. Nonlinear Anal. Appl. 11, No. 2, 437-445 (2020). MSC: 68T05 26D15 26D10 PDF BibTeX XML Cite \textit{M. Faridpour} and \textit{A. Moradi}, Int. J. Nonlinear Anal. Appl. 11, No. 2, 437--445 (2020; Zbl 07623380) Full Text: DOI OpenURL
Mandal, Mriganka; Dutta, Ratna Efficient identity-based outsider anonymous public-key trace and revoke with constant ciphertext-size and fast decryption. (English) Zbl 1500.94042 Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 365-380 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Mandal} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 12020, 365--380 (2020; Zbl 1500.94042) Full Text: DOI OpenURL
Mojtahed, Vahid Big data for fraud detection. (English) Zbl 1443.62538 Cecconi, Federico (ed.) et al., Information and communication technologies (ICT) in economic modeling. Cham: Springer. Comput. Soc. Sci., 177-192 (2019). MSC: 62R07 62H30 62P20 PDF BibTeX XML Cite \textit{V. Mojtahed}, in: Information and communication technologies (ICT) in economic modeling. Cham: Springer. 177--192 (2019; Zbl 1443.62538) Full Text: DOI OpenURL
Bard, Gregory V. Determining whether a given cryptographic function is a permutation of another given cryptographic function – a problem in intellectual property. (English) Zbl 1455.94119 Theor. Comput. Sci. 800, 3-14 (2019). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 68T20 11T71 PDF BibTeX XML Cite \textit{G. V. Bard}, Theor. Comput. Sci. 800, 3--14 (2019; Zbl 1455.94119) Full Text: DOI OpenURL
Ekin, Tahir; Ieva, Francesca; Ruggeri, Fabrizio; Soyer, Refik On the use of the concentration function in medical fraud assessment. (English) Zbl 07687906 Am. Stat. 71, No. 3, 236-241 (2017). MSC: 62-XX PDF BibTeX XML Cite \textit{T. Ekin} et al., Am. Stat. 71, No. 3, 236--241 (2017; Zbl 07687906) Full Text: DOI OpenURL
Cerasa, Andrea; Cerioli, Andrea Outlier-free merging of homogeneous groups of pre-classified observations under contamination. (English) Zbl 07192107 J. Stat. Comput. Simulation 87, No. 15, 2997-3020 (2017). MSC: 62J05 62J20 62H30 62P20 62F35 PDF BibTeX XML Cite \textit{A. Cerasa} and \textit{A. Cerioli}, J. Stat. Comput. Simulation 87, No. 15, 2997--3020 (2017; Zbl 07192107) Full Text: DOI OpenURL
Li, Yun; Nitinawarat, Sirin; Veeravalli, Venugopal V. Universal sequential outlier hypothesis testing. (English) Zbl 1490.62110 Sequential Anal. 36, No. 3, 309-344 (2017). MSC: 62G10 62L10 62G20 PDF BibTeX XML Cite \textit{Y. Li} et al., Sequential Anal. 36, No. 3, 309--344 (2017; Zbl 1490.62110) Full Text: DOI arXiv OpenURL
Bayerstadler, Andreas; van Dijk, Linda; Winter, Fabian Bayesian multinomial latent variable modeling for fraud and abuse detection in health insurance. (English) Zbl 1373.62510 Insur. Math. Econ. 71, 244-252 (2016). MSC: 62P05 62J12 91B30 PDF BibTeX XML Cite \textit{A. Bayerstadler} et al., Insur. Math. Econ. 71, 244--252 (2016; Zbl 1373.62510) Full Text: DOI OpenURL
Cerioli, Andrea; Perrotta, Domenico Robust clustering around regression lines with high density regions. (English) Zbl 1474.62217 Adv. Data Anal. Classif., ADAC 8, No. 1, 5-26 (2014). MSC: 62H30 62H11 62G35 62G07 62G08 62P20 91B60 PDF BibTeX XML Cite \textit{A. Cerioli} and \textit{D. Perrotta}, Adv. Data Anal. Classif., ADAC 8, No. 1, 5--26 (2014; Zbl 1474.62217) Full Text: DOI OpenURL
Bernard, C.; Vanduffel, S. Mean-variance optimal portfolios in the presence of a benchmark with applications to fraud detection. (English) Zbl 1304.91181 Eur. J. Oper. Res. 234, No. 2, 469-480 (2014). MSC: 91G10 PDF BibTeX XML Cite \textit{C. Bernard} and \textit{S. Vanduffel}, Eur. J. Oper. Res. 234, No. 2, 469--480 (2014; Zbl 1304.91181) Full Text: DOI OpenURL
Longford, Nicholas T. Searching for contaminants. (English) Zbl 07265929 J. Appl. Stat. 40, No. 9, 2041-2055 (2013). MSC: 62-XX PDF BibTeX XML Cite \textit{N. T. Longford}, J. Appl. Stat. 40, No. 9, 2041--2055 (2013; Zbl 07265929) Full Text: DOI OpenURL
Wu, Xiaoyu; Wu, Zhengxiao Collusion set detection using a quasi hidden Markov model. (English) Zbl 1327.60194 Stat. Interface 6, No. 1, 53-64 (2013). MSC: 60K35 62M99 62P99 PDF BibTeX XML Cite \textit{X. Wu} and \textit{Z. Wu}, Stat. Interface 6, No. 1, 53--64 (2013; Zbl 1327.60194) Full Text: DOI OpenURL
Li, Zhongmou; Xiong, Hui; Liu, Yanchi Mining blackhole and volcano patterns in directed graphs: a general approach. (English) Zbl 1260.91217 Data Min. Knowl. Discov. 25, No. 3, 577-602 (2012). MSC: 91D30 05C90 91-04 05C85 05-04 PDF BibTeX XML Cite \textit{Z. Li} et al., Data Min. Knowl. Discov. 25, No. 3, 577--602 (2012; Zbl 1260.91217) Full Text: DOI OpenURL
Atkinson, Anthony C.; Riani, Marco; Cerioli, Andrea The forward search: theory and data analysis. (English) Zbl 1294.62149 J. Korean Stat. Soc. 39, No. 2, 117-134 (2010). MSC: 62J05 62H12 62H30 62M10 62P12 62-02 62-07 PDF BibTeX XML Cite \textit{A. C. Atkinson} et al., J. Korean Stat. Soc. 39, No. 2, 117--134 (2010; Zbl 1294.62149) Full Text: DOI OpenURL
Dlugosz, Stephan; Müller-Funk, Ulrich The value of the last digit: statistical fraud detection with digit analysis. (English) Zbl 1306.60002 Adv. Data Anal. Classif., ADAC 3, No. 3, 281-290 (2009). MSC: 62E10 62P20 91B99 11K16 PDF BibTeX XML Cite \textit{S. Dlugosz} and \textit{U. Müller-Funk}, Adv. Data Anal. Classif., ADAC 3, No. 3, 281--290 (2009; Zbl 1306.60002) Full Text: DOI OpenURL
Phua, Clifton; Gayler, Ross; Lee, Vincent; Smith-Miles, Kate On the communal analysis suspicion scoring for identity crime in streaming credit applications. (English) Zbl 1159.91411 Eur. J. Oper. Res. 195, No. 2, 595-612 (2009). MSC: 91B30 91B06 90B50 62P99 PDF BibTeX XML Cite \textit{C. Phua} et al., Eur. J. Oper. Res. 195, No. 2, 595--612 (2009; Zbl 1159.91411) Full Text: DOI OpenURL
Weston, David J.; Hand, David J.; Adams, Niall M.; Whitrow, Christopher; Juszczak, Piotr Plastic card fraud detection using peer group analysis. (English) Zbl 1183.62216 Adv. Data Anal. Classif., ADAC 2, No. 1, 45-62 (2008). MSC: 62P99 62H30 PDF BibTeX XML Cite \textit{D. J. Weston} et al., Adv. Data Anal. Classif., ADAC 2, No. 1, 45--62 (2008; Zbl 1183.62216) Full Text: DOI OpenURL
Hales, Douglas N.; Sridharan, V.; Radhakrishnan, Abirami; Chakravorty, Satya S.; Siha, Samia M. Testing the accuracy of employee-reported data: an inexpensive alternative approach to traditional methods. (English) Zbl 1142.91402 Eur. J. Oper. Res. 189, No. 3, 583-593 (2008). MSC: 91B06 PDF BibTeX XML Cite \textit{D. N. Hales} et al., Eur. J. Oper. Res. 189, No. 3, 583--593 (2008; Zbl 1142.91402) Full Text: DOI Link OpenURL
Owen, Art B. Infinitely imbalanced logistic regression. (English) Zbl 1222.62094 J. Mach. Learn. Res. 8, 761-773 (2007). MSC: 62J12 62H30 65C60 PDF BibTeX XML Cite \textit{A. B. Owen}, J. Mach. Learn. Res. 8, 761--773 (2007; Zbl 1222.62094) Full Text: Link OpenURL
Hand, David Mining personal banking data to detect fraud. (English) Zbl 1151.62081 Brito, Paula (ed.) et al., Selected contributions in data analysis and classification. In honour of Edwin Diday. With a foreword by Yves Escoufier. Berlin: Springer (ISBN 978-3-540-73558-8/pbk). Studies in Classification, Data Analysis, and Knowledge Organization, 377-386 (2007). MSC: 62P05 PDF BibTeX XML Cite \textit{D. Hand}, in: Selected contributions in data analysis and classification. In honour of Edwin Diday. With a foreword by Yves Escoufier. Berlin: Springer. 377--386 (2007; Zbl 1151.62081) Full Text: DOI OpenURL
Kim, Hyun-Chul; Pang, Shaoning; Je, Hong-Mo; Kim, Daijin; Bang, Sung Yang Constructing support vector machine ensemble. (English) Zbl 1059.68091 Pattern Recognition 36, No. 12, 2757-2767 (2003). MSC: 68T05 68T10 PDF BibTeX XML Cite \textit{H.-C. Kim} et al., Pattern Recognition 36, No. 12, 2757--2767 (2003; Zbl 1059.68091) Full Text: DOI OpenURL
Cortes, Corinna; Pregibon, Daryl; Volinsky, Chris Communities of interest. (English) Zbl 1090.68538 Intell. Data Anal. 6, No. 3, 211-219 (2002). MSC: 68P05 PDF BibTeX XML Cite \textit{C. Cortes} et al., Intell. Data Anal. 6, No. 3, 211--219 (2002; Zbl 1090.68538) Full Text: Link OpenURL
Lundin, Emilie; Kvarnström, Håkan; Jonsson, Erland A synthetic fraud data generation methodology. (English) Zbl 1023.68561 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 265-277 (2002). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{E. Lundin} et al., Lect. Notes Comput. Sci. 2513, 265--277 (2002; Zbl 1023.68561) Full Text: Link OpenURL
Bolton, Richard J.; Hand, David J. Statistical fraud detection: a review. (English) Zbl 1013.62115 Stat. Sci. 17, No. 3, 235-255 (2002). MSC: 62P99 62P25 PDF BibTeX XML Cite \textit{R. J. Bolton} and \textit{D. J. Hand}, Stat. Sci. 17, No. 3, 235--255 (2002; Zbl 1013.62115) Full Text: DOI OpenURL
Boukerche, Azzedine; Notare, Mirela Sechi M. Annoni Behavior-based intrusion detection in mobile phone systems. (English) Zbl 1063.68513 J. Parallel Distrib. Comput. 62, No. 9, 1476-1490 (2002). MSC: 68M10 PDF BibTeX XML Cite \textit{A. Boukerche} and \textit{M. S. M. A. Notare}, J. Parallel Distrib. Comput. 62, No. 9, 1476--1490 (2002; Zbl 1063.68513) Full Text: DOI OpenURL
Burge, Peter; Shawe-Taylor, John An unsupervised neural network approach to profiling the behavior of mobile phone users for use in fraud detection. (English) Zbl 0988.68155 J. Parallel Distrib. Comput. 61, No. 7, 915-925 (2001). MSC: 68T05 68M10 PDF BibTeX XML Cite \textit{P. Burge} and \textit{J. Shawe-Taylor}, J. Parallel Distrib. Comput. 61, No. 7, 915--925 (2001; Zbl 0988.68155) Full Text: DOI OpenURL
Sadighi Firozabadi, Babak; Tan, Yao-Hua; Lee, Ronald M. Formal definitions of fraud. (English) Zbl 0940.91050 McNamara, P. (ed.) et al., Norms, logics and information systems. New studies in deontic logic and computer science. Selected papers of the 4th \(\Delta\)EON workshop, Bologna, Italy, January 8-10, 1998. Amsterdam: IOS Press. Front. Artif. Intell. Appl. 49, 275-287 (1999). MSC: 91B60 03B45 03B80 PDF BibTeX XML Cite \textit{B. Sadighi Firozabadi} et al., Front. Artif. Intell. Appl. 49, 275--287 (1999; Zbl 0940.91050) OpenURL