Cited By
View all- Kouam AViana ATchana AQuek TGao DZhou JCardenas A(2024)Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud?Proceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657023(366-382)Online publication date: 1-Jul-2024
- Perez IWong JSkalski PBurrell SMortier RMcAuley DSutton D(2023)Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems2023 IEEE International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW60847.2023.00068(475-484)Online publication date: 4-Dec-2023
- Fetzer VKeller MMaier SRaiber MRupp ASchwerdt R(2022)PUBA: Privacy-Preserving User-Data Bookkeeping and AnalyticsProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00542022:2(447-516)Online publication date: 3-Mar-2022
- Show More Cited By