{"id":"https://openalex.org/W3023543052","doi":"https://doi.org/10.1145/3341105.3373842","title":"Fraud detection using heavy hitters","display_name":"Fraud detection using heavy hitters","publication_year":2020,"publication_date":"2020-03-30","ids":{"openalex":"https://openalex.org/W3023543052","doi":"https://doi.org/10.1145/3341105.3373842","mag":"3023543052"},"language":"en","primary_location":{"id":"doi:10.1145/3341105.3373842","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341105.3373842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010227979","display_name":"Bruno Veloso","orcid":"https://orcid.org/0000-0001-7980-0972"},"institutions":[{"id":"https://openalex.org/I4210166615","display_name":"INESC TEC","ror":"https://ror.org/05fa8ka61","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210125590","https://openalex.org/I4210166615"]},{"id":"https://openalex.org/I121345201","display_name":"Instituto de Engenharia de Sistemas e Computadores Investiga\u00e7\u00e3o e Desenvolvimento","ror":"https://ror.org/04mqy3p58","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I121345201","https://openalex.org/I4210125590"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Bruno Veloso","raw_affiliation_strings":["INESCTEC, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"INESCTEC, Porto, Portugal","institution_ids":["https://openalex.org/I121345201","https://openalex.org/I4210166615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045477765","display_name":"Carlos Augusto Paiva da Silva Martins","orcid":"https://orcid.org/0000-0002-9856-2436"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carlos Martins","raw_affiliation_strings":["WEDO, Braga, Portugal"],"affiliations":[{"raw_affiliation_string":"WEDO, Braga, Portugal","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089744818","display_name":"Raphael Espanha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raphael Espanha","raw_affiliation_strings":["WEDO, Braga, Portugal"],"affiliations":[{"raw_affiliation_string":"WEDO, Braga, Portugal","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025503910","display_name":"Raul Azevedo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raul Azevedo","raw_affiliation_strings":["WEDO, Braga, Portugal"],"affiliations":[{"raw_affiliation_string":"WEDO, Braga, Portugal","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114376321","display_name":"Jo\u00e3o Gama","orcid":"https://orcid.org/0000-0003-3357-1195"},"institutions":[{"id":"https://openalex.org/I4210166615","display_name":"INESC TEC","ror":"https://ror.org/05fa8ka61","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210125590","https://openalex.org/I4210166615"]},{"id":"https://openalex.org/I121345201","display_name":"Instituto de Engenharia de Sistemas e Computadores Investiga\u00e7\u00e3o e Desenvolvimento","ror":"https://ror.org/04mqy3p58","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I121345201","https://openalex.org/I4210125590"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Jo\u00e3o Gama","raw_affiliation_strings":["INESCTEC, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"INESCTEC, Porto, Portugal","institution_ids":["https://openalex.org/I121345201","https://openalex.org/I4210166615"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010227979"],"corresponding_institution_ids":["https://openalex.org/I121345201","https://openalex.org/I4210166615"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61693753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"482","last_page":"489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951240539550781},{"id":"https://openalex.org/keywords/forgetting","display_name":"Forgetting","score":0.6257423162460327},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.6120680570602417},{"id":"https://openalex.org/keywords/cardinality","display_name":"Cardinality (data modeling)","score":0.567658543586731},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5324103832244873},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37423354387283325},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3734513223171234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3592449426651001},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3546596169471741},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3316989541053772}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951240539550781},{"id":"https://openalex.org/C7149132","wikidata":"https://www.wikidata.org/wiki/Q1377840","display_name":"Forgetting","level":2,"score":0.6257423162460327},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.6120680570602417},{"id":"https://openalex.org/C87117476","wikidata":"https://www.wikidata.org/wiki/Q362383","display_name":"Cardinality (data modeling)","level":2,"score":0.567658543586731},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5324103832244873},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37423354387283325},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3734513223171234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3592449426651001},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3546596169471741},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3316989541053772},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3341105.3373842","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341105.3373842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W139562302","https://openalex.org/W1553409264","https://openalex.org/W1995484833","https://openalex.org/W2060324268","https://openalex.org/W2103780786","https://openalex.org/W2130873644","https://openalex.org/W2142099410","https://openalex.org/W2144982963","https://openalex.org/W2157974502","https://openalex.org/W2164135006","https://openalex.org/W3083560641"],"related_works":["https://openalex.org/W4289718052","https://openalex.org/W2164121020","https://openalex.org/W2145559838","https://openalex.org/W2905319430","https://openalex.org/W3116498279","https://openalex.org/W4287549553","https://openalex.org/W4310285384","https://openalex.org/W3183027292","https://openalex.org/W4248896073","https://openalex.org/W2974871044"],"abstract_inverted_index":{"The":[0,157,210],"high":[1],"asymmetry":[2],"of":[3,20,47,62,83,98,115,133,152,175,185,191,198,201],"international":[4],"termination":[5],"rates,":[6],"where":[7],"calls":[8,170,186],"are":[9,14],"charged":[10],"with":[11,78,107],"higher":[12],"values,":[13],"fertile":[15],"ground":[16],"for":[17,35,137,171],"the":[18,48,52,60,96,108,113,131,134,143,166,196,207,219,223,228],"appearance":[19],"frauds":[21],"in":[22,51],"Telecom":[23],"Companies.":[24],"In":[25],"this":[26,91],"paper,":[27],"we":[28,93,205],"present":[29],"three":[30,215],"different":[31],"and":[32,55,86,129,155,177,226],"complementary":[33],"solutions":[34],"a":[36,99,116,126,172,182,189],"real":[37],"problem":[38,44],"called":[39],"Interconnect":[40],"Bypass":[41],"Fraud.":[42],"This":[43],"is":[45,70,162],"one":[46],"most":[49],"common":[50],"telecommunication":[53],"domain":[54],"can":[56],"be":[57],"detected":[58],"by":[59,222],"occurrence":[61],"abnormal":[63,79,148],"behaviours":[64],"from":[65],"specific":[66],"numbers.":[67],"Our":[68],"goal":[69],"to":[71,146,164,187,194],"detect":[72,147,165,195],"as":[73,75],"soon":[74],"possible":[76],"numbers":[77,167,179,200],"behaviours,":[80,149],"e.g.":[81,150],"bursts":[82],"calls,":[84,153],"repetitions":[85],"mirror":[87],"behaviours.":[88],"Based":[89],"on":[90],"assumption,":[92],"propose:":[94],"(i)":[95],"adoption":[97],"new":[100],"fast":[101],"forgetting":[102,127],"technique":[103],"that":[104,123,168,180,213],"works":[105],"together":[106],"Lossy":[109],"Counting":[110],"algorithm;":[111],"(ii)":[112],"proposal":[114],"single":[117],"pass":[118],"hierarchical":[119,158],"heavy":[120,144,159],"hitter":[121],"algorithm":[122,161],"also":[124],"contains":[125],"technique;":[128],"(iii)":[130],"application":[132],"HyperLogLog":[135,208],"sketches":[136],"each":[138,202],"phone":[139],"number.":[140],"We":[141],"used":[142,163,221],"hitters":[145,160],"burst":[151],"repetition":[154],"mirror.":[156],"make":[169,227],"huge":[173,183],"set":[174,184],"destinations":[176],"destination":[178,199],"receives":[181],"provoke":[188],"denial":[190],"service.":[192],"Additionally,":[193],"cardinality":[197],"origin":[203],"number":[204],"use":[206],"algorithm.":[209],"results":[211],"shows":[212],"these":[214],"approaches":[216],"combined":[217],"complements":[218],"techniques":[220],"telecom":[224],"company":[225],"fraud":[229],"task":[230],"more":[231],"difficult.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
