{"id":"https://openalex.org/W2731600595","doi":"https://doi.org/10.1109/sahcn.2017.7964943","title":"Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy","display_name":"Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2731600595","doi":"https://doi.org/10.1109/sahcn.2017.7964943","mag":"2731600595"},"language":"en","primary_location":{"id":"doi:10.1109/sahcn.2017.7964943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2017.7964943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112089154","display_name":"Wenyan Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenyan Yao","raw_affiliation_strings":["Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052771052","display_name":"Na Ruan","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Ruan","raw_affiliation_strings":["Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080448256","display_name":"Feifan Yu","orcid":"https://orcid.org/0000-0002-3205-0040"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feifan Yu","raw_affiliation_strings":["Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051803761","display_name":"Weijia Jia","orcid":"https://orcid.org/0000-0002-0231-3196"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijia Jia","raw_affiliation_strings":["Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112089154"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.7801,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79005869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12384","display_name":"Customer churn and segmentation","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7548683881759644},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6013889312744141},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.48395541310310364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47424501180648804},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.4655139446258545},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4248775243759155},{"id":"https://openalex.org/keywords/explosive-material","display_name":"Explosive material","score":0.4240374267101288},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3822857737541199},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2845730781555176},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.14195159077644348},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1419306993484497},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10792994499206543}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7548683881759644},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6013889312744141},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.48395541310310364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47424501180648804},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.4655139446258545},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4248775243759155},{"id":"https://openalex.org/C154238967","wikidata":"https://www.wikidata.org/wiki/Q12870","display_name":"Explosive material","level":2,"score":0.4240374267101288},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3822857737541199},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2845730781555176},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.14195159077644348},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1419306993484497},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10792994499206543},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sahcn.2017.7964943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2017.7964943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W55681943","https://openalex.org/W1580598038","https://openalex.org/W1602011302","https://openalex.org/W1880262756","https://openalex.org/W2018352661","https://openalex.org/W2020275022","https://openalex.org/W2043695334","https://openalex.org/W2054514509","https://openalex.org/W2064895247","https://openalex.org/W2068687483","https://openalex.org/W2077217970","https://openalex.org/W2079450376","https://openalex.org/W2109426455","https://openalex.org/W2124434590","https://openalex.org/W2212660284","https://openalex.org/W2544633277","https://openalex.org/W6602201320","https://openalex.org/W6609998551","https://openalex.org/W6634604047","https://openalex.org/W6639619044","https://openalex.org/W6688325169"],"related_works":["https://openalex.org/W3107650560","https://openalex.org/W3126382579","https://openalex.org/W2287334727","https://openalex.org/W4317422773","https://openalex.org/W1488588773","https://openalex.org/W2048510477","https://openalex.org/W3123667230","https://openalex.org/W4315588616","https://openalex.org/W3038283795","https://openalex.org/W2810542905"],"abstract_inverted_index":{"With":[0],"the":[1,18,29,44,60,69,92,99,115,132,139,163,168,178],"explosive":[2],"growth":[3],"of":[4,17,31,134,141,147,173],"users":[5,19,107],"in":[6,28,74,108],"mobile":[7,65,95],"carrier,":[8],"telecommunication":[9],"fraud":[10,75,116],"causes":[11],"a":[12,82,86,120,145],"serious":[13],"loss":[14],"to":[15,42,54,105,113,128],"both":[16],"and":[20,33,36,46,58,89,130,171],"carriers.":[21,96,110],"The":[22],"academia":[23],"has":[24],"an":[25],"increasing":[26],"interest":[27],"issue":[30],"detecting":[32],"recognizing":[34],"fraudster,":[35],"varies":[37],"strategies":[38],"have":[39],"been":[40],"proposed":[41],"prevent":[43],"attack":[45],"fraudulent":[47,61,164],"activity.":[48],"However,":[49],"fraudsters":[50],"are":[51],"always":[52],"inclined":[53],"hide":[55],"their":[56],"identity":[57],"perform":[59],"activity":[62],"through":[63,91],"different":[64,109],"carriers,":[66,142],"which":[67],"makes":[68],"previous":[70],"methods":[71],"less":[72],"effective":[73],"detection.":[76],"In":[77,111],"this":[78,153],"paper,":[79],"we":[80,118,155],"propose":[81,119],"novel":[83],"strategy":[84,121],"with":[85,152],"high":[87],"accuracy":[88],"security":[90],"cooperation":[93,140],"among":[94],"We":[97],"introduce":[98],"Latent":[100],"Dirichlet":[101],"Allocation":[102],"(LDA)":[103],"model":[104],"profile":[106],"order":[112],"match":[114],"accounts,":[117],"based":[122,176],"on":[123,177],"Maximum":[124],"Mean":[125],"Discrepancy":[126],"(MMD)":[127],"analyze":[129],"compare":[131],"distribution":[133],"statistical":[135],"samples.":[136],"Meantime,":[137],"during":[138],"there":[143],"is":[144],"risk":[146],"privacy":[148],"disclosure.":[149],"To":[150],"deal":[151],"weakness,":[154],"also":[156],"demonstrate":[157],"that":[158],"our":[159],"method":[160],"can":[161],"detect":[162],"accounts":[165,175],"without":[166],"leaking":[167],"private":[169],"records":[170],"data":[172],"user":[174],"differential":[179],"privacy.":[180]},"counts_by_year":[{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
