{"id":"https://openalex.org/W2889523482","doi":"https://doi.org/10.1186/s42400-018-0008-5","title":"Detecting telecommunication fraud by understanding the contents of a call","display_name":"Detecting telecommunication fraud by understanding the contents of a call","publication_year":2018,"publication_date":"2018-08-31","ids":{"openalex":"https://openalex.org/W2889523482","doi":"https://doi.org/10.1186/s42400-018-0008-5","mag":"2889523482"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-018-0008-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0008-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0008-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0008-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103200921","display_name":"Qianqian Zhao","orcid":"https://orcid.org/0000-0002-6853-7248"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianqian Zhao","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438001","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0003-2587-6028"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005758616","display_name":"Tongxin Li","orcid":"https://orcid.org/0000-0002-9806-8964"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongxin Li","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102017091","display_name":"Yi Yang","orcid":"https://orcid.org/0000-0002-2628-3737"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115592203","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0001-9670-8916"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoFeng Wang","raw_affiliation_strings":["Indiana University Bloomington, Bloomington, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University Bloomington, Bloomington, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103200921"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":6.579,"has_fulltext":true,"cited_by_count":66,"citation_normalized_percentile":{"value":0.96915615,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"1","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9607999920845032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.7180187702178955},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.6951133012771606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6767778396606445},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6291564702987671},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.5787967443466187},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.5756306648254395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5066074132919312},{"id":"https://openalex.org/keywords/telephone-network","display_name":"Telephone network","score":0.4543645977973938},{"id":"https://openalex.org/keywords/call-management","display_name":"Call management","score":0.44904011487960815},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4439464807510376},{"id":"https://openalex.org/keywords/call-control","display_name":"Call control","score":0.32975542545318604},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32193636894226074},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29524362087249756},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14058157801628113},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12339276075363159}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.7180187702178955},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.6951133012771606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6767778396606445},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6291564702987671},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.5787967443466187},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.5756306648254395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5066074132919312},{"id":"https://openalex.org/C197698232","wikidata":"https://www.wikidata.org/wiki/Q2354216","display_name":"Telephone network","level":2,"score":0.4543645977973938},{"id":"https://openalex.org/C28819325","wikidata":"https://www.wikidata.org/wiki/Q5021628","display_name":"Call management","level":3,"score":0.44904011487960815},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4439464807510376},{"id":"https://openalex.org/C131969451","wikidata":"https://www.wikidata.org/wiki/Q5021614","display_name":"Call control","level":2,"score":0.32975542545318604},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32193636894226074},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29524362087249756},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14058157801628113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12339276075363159},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-018-0008-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0008-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0008-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b6d2d583fcfb49e1af37b2f8f920664d","is_oa":true,"landing_page_url":"https://doaj.org/article/b6d2d583fcfb49e1af37b2f8f920664d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 1, Iss 1, Pp 1-12 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-018-0008-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0008-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0008-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3739099840","display_name":null,"funder_award_id":"U1536106, 61728209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3813731164","display_name":null,"funder_award_id":"U1536106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5263963370","display_name":null,"funder_award_id":"61728209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320334978","display_name":"Beijing Nova Program","ror":"https://ror.org/034k14f91"},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2889523482.pdf","grobid_xml":"https://content.openalex.org/works/W2889523482.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W6617267","https://openalex.org/W408187963","https://openalex.org/W1493949745","https://openalex.org/W1541201746","https://openalex.org/W1554219991","https://openalex.org/W1561558549","https://openalex.org/W1582725881","https://openalex.org/W1591855329","https://openalex.org/W1766838353","https://openalex.org/W1868863582","https://openalex.org/W1971963941","https://openalex.org/W1978020316","https://openalex.org/W1978394996","https://openalex.org/W2007873584","https://openalex.org/W2053075734","https://openalex.org/W2081334572","https://openalex.org/W2081694913","https://openalex.org/W2100097460","https://openalex.org/W2104819628","https://openalex.org/W2108220507","https://openalex.org/W2136961438","https://openalex.org/W2138872119","https://openalex.org/W2141068132","https://openalex.org/W2141125801","https://openalex.org/W2144911507","https://openalex.org/W2159479979","https://openalex.org/W2162979314","https://openalex.org/W2188034239","https://openalex.org/W2437096199","https://openalex.org/W2475947966","https://openalex.org/W2533835508","https://openalex.org/W2614012654","https://openalex.org/W2615628921","https://openalex.org/W2794601036","https://openalex.org/W2914218031","https://openalex.org/W3100545544","https://openalex.org/W3100704955"],"related_works":["https://openalex.org/W2949617132","https://openalex.org/W4250116973","https://openalex.org/W2162705846","https://openalex.org/W4233040899","https://openalex.org/W3173849889","https://openalex.org/W4302078008","https://openalex.org/W2244556011","https://openalex.org/W2093958702","https://openalex.org/W2471523505","https://openalex.org/W2233428151"],"abstract_inverted_index":{"Telecommunication":[0],"fraud":[1,30,83,141,166],"has":[2],"continuously":[3],"been":[4],"causing":[5],"severe":[6],"financial":[7],"loss":[8],"to":[9,19,48,95,99,109,118,130,182],"telecommunication":[10,21,61,82,140,148],"customers":[11,192],"in":[12,180],"China":[13],"for":[14,138],"several":[15],"years.":[16],"Traditional":[17],"approaches":[18],"detect":[20,60],"frauds":[22,62],"usually":[23],"rely":[24],"on":[25,159],"constructing":[26],"a":[27,67,160],"blacklist":[28],"of":[29,66,70,81,147,177],"telephone":[31,75],"numbers.":[32],"However,":[33],"attackers":[34],"can":[35,156,172,190],"simply":[36,71],"evade":[37],"such":[38],"detection":[39,146],"by":[40],"changing":[41],"their":[42],"numbers,":[43],"which":[44,155],"is":[45,168],"very":[46],"easy":[47],"achieve":[49,144],"through":[50,72],"VoIP":[51],"(Voice":[52],"over":[53],"IP).":[54],"To":[55,143],"solve":[56],"this":[57],"problem,":[58],"we":[59,78,113,127,150,189],"from":[63,84,104,121],"the":[64,73,101,105,122,135,170,175,178],"contents":[65,133,176],"call":[68,137,167,179],"instead":[69],"caller\u2019s":[74],"number.":[76],"Particularly,":[77],"collect":[79],"descriptions":[80,103],"news":[85],"reports":[86],"and":[87,98],"social":[88],"media.":[89],"We":[90],"use":[91],"machine":[92],"learning":[93],"algorithms":[94],"analyze":[96,174],"data":[97,106],"select":[100],"high-quality":[102],"collected":[107],"previously":[108],"construct":[110],"datasets.":[111],"Then":[112],"leverage":[114],"natural":[115],"language":[116],"processing":[117],"extract":[119],"features":[120],"textual":[123],"data.":[124],"After":[125],"that,":[126],"build":[128],"rules":[129],"identify":[131,183],"similar":[132],"within":[134],"same":[136],"further":[139],"detection.":[142],"online":[145],"frauds,":[149],"develop":[151],"an":[152,164],"Android":[153],"application":[154,171],"be":[157],"installed":[158],"customer\u2019s":[161],"smartphone.":[162],"When":[163],"incoming":[165],"answered,":[169],"dynamically":[173],"order":[181],"frauds.":[184],"Our":[185],"results":[186],"show":[187],"that":[188],"protect":[191],"effectively.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":8},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
