{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:01:36Z","timestamp":1730318496361,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T00:00:00Z","timestamp":1478736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,10]]},"DOI":"10.1145\/3003733.3003740","type":"proceedings-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T15:21:17Z","timestamp":1486135277000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Semi-supervised forecasting of fraudulent financial statements"],"prefix":"10.1145","author":[{"given":"Stamatis","family":"Karlos","sequence":"first","affiliation":[{"name":"University of Patras, Department of Mathematics, Rio Achaia Greece"}]},{"given":"Nikos","family":"Fazakis","sequence":"additional","affiliation":[{"name":"University of Patras, Department of Electrical Engineering, Rio Achaia Greece"}]},{"given":"Sotiris","family":"Kotsiantis","sequence":"additional","affiliation":[{"name":"University of Patras, Department of Mathematics, Rio Achaia Greece"}]},{"given":"Kyriakos","family":"Sgarbas","sequence":"additional","affiliation":[{"name":"University of Patras, Department of Electrical Engineering, Rio Achaia Greece"}]}],"member":"320","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"KEEL data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework","volume":"17","author":"Alcal\u00e1-Fdez J.","year":"2011","unstructured":"J. Alcal\u00e1-Fdez , A. Fern\u00e1ndez , J. Luengo , 2011 . KEEL data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework . Journal of Multiple-Valued Logic and Soft Computing 17 , 2 - 3 : 255--287. http:\/\/doi.org\/10.1007\/s00500-008-0323-y 10.1007\/s00500-008-0323-y J. Alcal\u00e1-Fdez, A. Fern\u00e1ndez, J. Luengo, et al. 2011. KEEL data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework. Journal of Multiple-Valued Logic and Soft Computing 17, 2-3: 255--287. http:\/\/doi.org\/10.1007\/s00500-008-0323-y","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2000.19.1.169"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/968712"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-1707-6"},{"volume-title":"Computer-Aided Fraud Prevention & Detection","author":"Coderre David","key":"e_1_3_2_1_6_1","unstructured":"David Coderre . 2009. Computer-Aided Fraud Prevention & Detection . John Wiley & Sons . David Coderre. 2009. Computer-Aided Fraud Prevention & Detection. John Wiley & Sons."},{"key":"e_1_3_2_1_7_1","unstructured":"Delena D. Spann. 2014. Fraud analytics - Strategies and methods for detection and prevention. Delena D. Spann. 2014. Fraud analytics - Strategies and methods for detection and prevention."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jecp.2010.03.005"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings 4293: 641--651","author":"Deng Chao","year":"2006","unstructured":"Chao Deng and Mao Zu Guo . 2006 . Tri-training and data editing based semi-supervised clustering algorithm. Micai 2006: Advances in Artificial Intelligence , Proceedings 4293: 641--651 . Chao Deng and Mao Zu Guo. 2006. Tri-training and data editing based semi-supervised clustering algorithm. Micai 2006: Advances in Artificial Intelligence, Proceedings 4293: 641--651."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.12.010"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Assessing the Risk of Management Fraud Through Neural Network Technology","volume":"16","author":"Green B. P.","year":"1997","unstructured":"B. P. Green and J. H. Choi . 1997 . Assessing the Risk of Management Fraud Through Neural Network Technology . Auditing A Journal of Practice & Theory 16 , 1 . B. P. Green and J. H. Choi. 1997. Assessing the Risk of Management Fraud Through Neural Network Technology. Auditing A Journal of Practice & Theory 16, 1.","journal-title":"Auditing A Journal of Practice & Theory"},{"key":"e_1_3_2_1_12_1","first-page":"95","article-title":"Co-Training by Committee: A Generalized Framework for Semi-Supervised Learning with Committees","volume":"2","author":"Hady MFA","year":"2008","unstructured":"MFA Hady and F. Schwenker . 2008 . Co-Training by Committee: A Generalized Framework for Semi-Supervised Learning with Committees . Int J Software Informatics 2 , 2: 95 -- 124 . http:\/\/doi.org\/10.1109\/ICDM.Workshops.2008.29 10.1109\/ICDM.Workshops.2008.29 MFA Hady and F. Schwenker. 2008. Co-Training by Committee: A Generalized Framework for Semi-Supervised Learning with Committees. Int J Software Informatics 2, 2: 95--124. http:\/\/doi.org\/10.1109\/ICDM.Workshops.2008.29","journal-title":"Int J Software Informatics"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/795010"},{"key":"e_1_3_2_1_15_1","first-page":"12","article-title":"Forecasting Fraudulent Financial Statements using Data Mining","volume":"1","author":"Kotsianits Sotiris","year":"2007","unstructured":"Sotiris Kotsianits , E Koumanakos , D Tzelepis , and V Tampakas . 2007 . Forecasting Fraudulent Financial Statements using Data Mining . IT Professional 1 , 12 . Sotiris Kotsianits, E Koumanakos, D Tzelepis, and V Tampakas. 2007. Forecasting Fraudulent Financial Statements using Data Mining. IT Professional 1, 12.","journal-title":"IT Professional"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.904745"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_71"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-61779-361-5_19"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.718"},{"key":"e_1_3_2_1_20_1","volume-title":"Othman Rohana","author":"Abdul Aris Nooraslinda","year":"2015","unstructured":"Aris Nooraslinda Abdul , Arif Maznah Siti Mohd , Othman Rohana , and Zain Mustafa Mohamed. 2015 . Fraudulent financial statement detection using statistical techniques: the case of small medium automotive enterprise. The journal of applied business research 31, 4. Aris Nooraslinda Abdul, Arif Maznah Siti Mohd, Othman Rohana, and Zain Mustafa Mohamed. 2015. Fraudulent financial statement detection using statistical techniques: the case of small medium automotive enterprise. The journal of applied business research 31, 4."},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"Zabihollah Rezaee. 2004. Financial Statement Fraud: Prevention and Detection. http:\/\/doi.org\/10.1016\/S1052-0457(04)17015-X 10.1016\/S1052-0457(04)17015-X","DOI":"10.1016\/S1052-0457(04)17015-X"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"Zabihollah Rezaee. 2004. Financial Statement Fraud: Prevention and Detection. http:\/\/doi.org\/10.1016\/S1052-0457(04)17015-X","DOI":"10.1016\/S1052-0457(04)17015-X"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.10.017"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. 14th International Conference on Machine Learning, Morgan Kaufmann, 296--304","author":"Sikonja Marko","year":"1997","unstructured":"Marko Robnik- Sikonja and Igor Kononenko . 1997 . An adaptation of Relief for attribute estimation in regression . Proc. 14th International Conference on Machine Learning, Morgan Kaufmann, 296--304 . Marko Robnik- Sikonja and Igor Kononenko. 1997. An adaptation of Relief for attribute estimation in regression. Proc. 14th International Conference on Machine Learning, Morgan Kaufmann, 296--304."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0963818022000000966"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/02686900210424321"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0706-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633789"},{"key":"e_1_3_2_1_28_1","first-page":"300072","article-title":"A Survey on Multi-view Learning","volume":"36","author":"Xu Chang","year":"2015","unstructured":"Chang Xu , Dacheng Tao , and Chao Xu . 2015 . A Survey on Multi-view Learning . Cvpr 36 , 8: 300072 . Retrieved from http:\/\/arxiv.org\/abs\/1304.5634 Chang Xu, Dacheng Tao, and Chao Xu. 2015. A Survey on Multi-view Learning. Cvpr 36, 8: 300072. Retrieved from http:\/\/arxiv.org\/abs\/1304.5634","journal-title":"Cvpr"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.08.009"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3115\/981658.981684"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.01.018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2016.1158553"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/121650"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.186"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00196ED1V01Y200906AIM006"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_39"}],"event":{"name":"PCI '16: 20th Pan-Hellenic Conference on Informatics","sponsor":["Greek Com Soc Greek Computer Society","TEI Technological Educational Institution of Athens"],"location":"Patras Greece","acronym":"PCI '16"},"container-title":["Proceedings of the 20th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3003733.3003740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T07:10:14Z","timestamp":1673680214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3003733.3003740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,10]]},"references-count":37,"alternative-id":["10.1145\/3003733.3003740","10.1145\/3003733"],"URL":"https:\/\/doi.org\/10.1145\/3003733.3003740","relation":{},"subject":[],"published":{"date-parts":[[2016,11,10]]},"assertion":[{"value":"2016-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}