{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T04:13:23Z","timestamp":1728792803771},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,26]]},"DOI":"10.1145\/3695080.3695146","type":"proceedings-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T22:26:32Z","timestamp":1728771992000},"page":"384-389","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Anomaly Detection and Systemic Risk Early Warning in Guangdong Financial Market Based on Big Data and Deep Learning."],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-9503-9617","authenticated-orcid":false,"given":"Ying","family":"Qu","sequence":"first","affiliation":[{"name":"School of Finance and Economics, Guangdong University of science and technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-9890-6064","authenticated-orcid":false,"given":"Yunxiang","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Finance and Economics, Guangdong University of science and technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0001-8464-2283","authenticated-orcid":false,"given":"Wanqin","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Finance and Economics, Guangdong University of science and technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-6378-8344","authenticated-orcid":false,"given":"Fu","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Management, Guangdong University of science and technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-1749-2526","authenticated-orcid":false,"given":"Lijun","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Finance and Economics, Guangdong University of science and technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Literature review: anomaly detection approaches on digital business financial systems. digital business, 2(2), 100038","author":"Pinto S. O.","year":"2022","unstructured":"Pinto, S. O., & Sobreiro, V. A. (2022). Literature review: anomaly detection approaches on digital business financial systems. digital business, 2(2), 100038."},{"key":"e_1_3_2_1_2_1","volume-title":"A comprehensive survey of data mining.\u00a0International Journal of Information Technology,\u00a012(4), 1243-1257","author":"Gupta M. K.","year":"2020","unstructured":"Gupta, M. K., & Chandra, P. (2020). A comprehensive survey of data mining.\u00a0International Journal of Information Technology,\u00a012(4), 1243-1257."},{"key":"e_1_3_2_1_3_1","volume-title":"Implementation of data mining algorithms for grouping poverty lines by district\/city in North Sumatra.\u00a0IJISTECH (International Journal of Information System and Technology),\u00a03(2), 315-322","author":"Hanafiah M. A.","year":"2020","unstructured":"Hanafiah, M. A., & Wanto, A. (2020). Implementation of data mining algorithms for grouping poverty lines by district\/city in North Sumatra.\u00a0IJISTECH (International Journal of Information System and Technology),\u00a03(2), 315-322."},{"key":"e_1_3_2_1_4_1","volume-title":"Automobile insurance fraud detection in the age of big data\u2013a systematic and comprehensive literature review.\u00a0Journal of Financial Regulation and Compliance,\u00a030(4), 503-523","author":"Benedek B.","year":"2022","unstructured":"Benedek, B., Ciumas, C., & Nagy, B. Z. (2022). Automobile insurance fraud detection in the age of big data\u2013a systematic and comprehensive literature review.\u00a0Journal of Financial Regulation and Compliance,\u00a030(4), 503-523."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_3_2_1_6_1","volume-title":"Machine learning-driven credit risk: a systemic review.\u00a0Neural Computing and Applications,\u00a034(17), 14327-14339","author":"Shi S.","year":"2022","unstructured":"Shi, S., Tse, R., Luo, W., D'Addona, S., & Pau, G. (2022). Machine learning-driven credit risk: a systemic review.\u00a0Neural Computing and Applications,\u00a034(17), 14327-14339."},{"key":"e_1_3_2_1_7_1","volume-title":"A survey on deep learning and its applications.\u00a0Computer Science Review,\u00a040, 100379","author":"Dong S.","year":"2021","unstructured":"Dong, S., Wang, P., & Abbas, K. (2021). A survey on deep learning and its applications.\u00a0Computer Science Review,\u00a040, 100379."},{"key":"e_1_3_2_1_8_1","volume-title":"Deep learning for finance: deep portfolios. applied Stochastic Models in Business and Industry, 33(1), 3-12","author":"Heaton J. B.","year":"2017","unstructured":"Heaton, J. B., Polson, N. G., & Witte, J. H. (2017). Deep learning for finance: deep portfolios. applied Stochastic Models in Business and Industry, 33(1), 3-12."},{"key":"e_1_3_2_1_9_1","volume-title":"Advanced predictive control for GRU and LSTM networks.\u00a0Information Sciences, 616, 229-254","author":"Zarzycki K.","year":"2022","unstructured":"Zarzycki, K., & \u0141awry\u0144czuk, M. (2022). Advanced predictive control for GRU and LSTM networks.\u00a0Information Sciences, 616, 229-254."},{"key":"e_1_3_2_1_10_1","volume-title":"The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification.\u00a0J Theor Appl Inf Technol,\u00a0100(2), 31","author":"Dharma E. M.","year":"2022","unstructured":"Dharma, E. M., Gaol, F. L., Warnars, H. L. H. S., & Soewito, B. E. N. F. A. N. O. (2022). The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification.\u00a0J Theor Appl Inf Technol,\u00a0100(2), 31."}],"event":{"name":"ICCBD 2024: 2024 International Conference on Cloud Computing and Big Data","location":"Dali China","acronym":"ICCBD 2024"},"container-title":["2024 International Conference on Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695080.3695146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T22:29:17Z","timestamp":1728772157000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":10,"alternative-id":["10.1145\/3695080.3695146","10.1145\/3695080"],"URL":"https:\/\/doi.org\/10.1145\/3695080.3695146","relation":{},"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"2024-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}
  NODES
INTERN 6