{"id":"https://openalex.org/W2967950986","doi":"https://doi.org/10.1109/access.2019.2935759","title":"Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets","display_name":"Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2967950986","doi":"https://doi.org/10.1109/access.2019.2935759","mag":"2967950986"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2935759","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935759","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08804189.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08804189.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052771052","display_name":"Na Ruan","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Ruan","raw_affiliation_strings":["MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University, Shanghai, China","MoE Key Lab of Artificial Intelligence, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"MoE Key Lab of Artificial Intelligence, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026477583","display_name":"Zhikun Wei","orcid":"https://orcid.org/0000-0003-4325-0969"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhikun Wei","raw_affiliation_strings":["MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University, Shanghai, China","MoE Key Lab of Artificial Intelligence, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"MoE Key Lab of Artificial Intelligence, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022644524","display_name":"Jienan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jienan Liu","raw_affiliation_strings":["Department of Computer Science, University of Georgia, Athens, GA, USA","Department of Computer Science, University of Georgia, Athens, GA 30602, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"Department of Computer Science, University of Georgia, Athens, GA 30602, USA","institution_ids":["https://openalex.org/I165733156"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022644524"],"corresponding_institution_ids":["https://openalex.org/I165733156"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.4201,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7086858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":null,"first_page":"115261","last_page":"115272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.8542766571044922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450209498405457},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.6657268404960632},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5765035152435303},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5571008920669556},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45130643248558044},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.42978599667549133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3997599482536316},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.30958056449890137},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21430030465126038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20444253087043762}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.8542766571044922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450209498405457},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.6657268404960632},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5765035152435303},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5571008920669556},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45130643248558044},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.42978599667549133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3997599482536316},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.30958056449890137},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21430030465126038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20444253087043762},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2935759","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935759","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08804189.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b912a76467404289b3764024c2358945","is_oa":true,"landing_page_url":"https://doaj.org/article/b912a76467404289b3764024c2358945","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 115261-115272 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2935759","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935759","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08804189.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2967950986.pdf","grobid_xml":"https://content.openalex.org/works/W2967950986.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1602011302","https://openalex.org/W1880262756","https://openalex.org/W2018352661","https://openalex.org/W2020275022","https://openalex.org/W2043695334","https://openalex.org/W2064895247","https://openalex.org/W2101234009","https://openalex.org/W2109426455","https://openalex.org/W2124434590","https://openalex.org/W2212660284","https://openalex.org/W2514548353","https://openalex.org/W2544633277","https://openalex.org/W2614012654","https://openalex.org/W2620504479","https://openalex.org/W2731600595","https://openalex.org/W2767586709","https://openalex.org/W2783377870","https://openalex.org/W2805556544","https://openalex.org/W2808769300","https://openalex.org/W2911658882","https://openalex.org/W2912654979","https://openalex.org/W2914952404","https://openalex.org/W2916238263","https://openalex.org/W6639619044","https://openalex.org/W6675354045","https://openalex.org/W6688325169","https://openalex.org/W6737949167"],"related_works":["https://openalex.org/W2769501189","https://openalex.org/W4315588616","https://openalex.org/W4312773271","https://openalex.org/W2888805565","https://openalex.org/W2962686197","https://openalex.org/W2207653751","https://openalex.org/W3159709618","https://openalex.org/W2611137333","https://openalex.org/W3005513013","https://openalex.org/W4389543811"],"abstract_inverted_index":{"The":[0],"researchers":[1,69],"have":[2,28,70],"shown":[3],"broad":[4],"concern":[5],"about":[6],"detection":[7,44,164],"and":[8,15,82,98,204,218],"recognition":[9],"of":[10,66,149,163,169],"fraudsters":[11,46,192],"since":[12],"telecommunication":[13,57,104,157],"operators":[14,158],"the":[16,64,125,147,161,166,191,219,229],"individual":[17],"user":[18],"are":[19,212],"both":[20],"suffering":[21],"significant":[22],"losses":[23],"from":[24],"fraud":[25,43],"activities.":[26],"Researchers":[27],"proposed":[29,91],"various":[30],"solutions":[31],"to":[32,49,63,71,131,145,151,181],"counter":[33],"fraudulent":[34],"activity.":[35],"However,":[36],"those":[37],"methods":[38],"may":[39,159],"lose":[40],"effectiveness":[41],"in":[42,74,113,228],"because":[45],"always":[47],"tend":[48],"cover":[50],"their":[51,80],"tracks":[52],"by":[53],"roaming":[54,153],"among":[55,102],"different":[56],"operators.":[58,105],"What":[59],"is":[60,179],"more,":[61],"due":[62],"lack":[65],"real":[67,118,215],"data,":[68,217],"do":[72],"simulations":[73],"a":[75,92,114,137],"virtual":[76],"scenario,":[77],"which":[78],"makes":[79],"models":[81],"results":[83],"less":[84],"persuasive.":[85],"In":[86,106,208],"our":[87,223],"previous":[88],"paper,":[89],"we":[90,109,135],"novel":[93],"strategy":[94,174],"with":[95],"high":[96],"accuracy":[97,162],"security":[99],"through":[100],"cooperation":[101],"mobile":[103],"this":[107,183,209],"manuscript,":[108,210],"will":[110],"validate":[111],"it":[112,188],"real-world":[115,230],"scenario":[116,231],"using":[117,201],"Call":[119],"Detail":[120],"Records(CDR)":[121],"data.":[122,196],"We":[123,185],"apply":[124],"Latent":[126],"Dirichlet":[127],"Allocation":[128],"(LDA)":[129],"model":[130,198],"profile":[132],"users.":[133],"Then":[134],"use":[136],"method":[138,224],"based":[139,175],"on":[140,176,214],"Maximum":[141],"Mean":[142],"Discrepancy":[143],"(MMD)":[144],"compare":[146],"distribution":[148],"samples":[150],"match":[152],"fraudsters.":[154],"Cooperation":[155],"between":[156],"boost":[160],"while":[165],"potential":[167],"risk":[168],"privacy":[170],"leakage":[171],"exists.":[172],"A":[173],"Differential":[177],"Privacy(DP)":[178],"used":[180],"address":[182],"problem.":[184],"demonstrate":[186],"that":[187,222],"can":[189],"detect":[190],"without":[193],"revealing":[194],"private":[195],"Our":[197],"was":[199],"validated":[200],"simulated":[202],"dataset":[203],"showed":[205],"its":[206],"effectiveness.":[207],"experiments":[211],"performed":[213],"CDRs":[216],"result":[220],"shows":[221],"has":[225],"impressive":[226],"performance":[227],"as":[232],"well.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
