Security and Privacy in FinTech

[1]  Keke Gai,et al.  Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.

[2]  Meikang Qiu,et al.  Enabling Cloud Computing in Emergency Management Systems , 2014, IEEE Cloud Computing.

[3]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[4]  J. M. Serrano,et al.  Association rules applied to credit card fraud detection , 2009, Expert Syst. Appl..

[5]  B. B. Zaidan,et al.  Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.

[6]  Meikang Qiu,et al.  Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP , 2008, J. Parallel Distributed Comput..

[7]  Yi Peng,et al.  Evaluation of clustering algorithms for financial risk analysis using MCDM methods , 2014, Inf. Sci..

[8]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[9]  Howard Silverstone,et al.  Forensic Accounting and Fraud Investigation for Non-Experts , 2004 .

[10]  Patrick Traynor,et al.  FinTechSec: Addressing the Security Challenges of Digital Financial Services , 2017, IEEE Security & Privacy.

[11]  Thomas E. Reeves,et al.  Using a genetic algorithm-based classifier system for modeling auditor decision behavior in a fraud setting , 1998 .

[12]  Keke Gai,et al.  Security and Privacy Issues: A Survey on FinTech , 2016, SmartCom.

[13]  Dan J. Kim,et al.  An Empirical Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use Mobile Fintech Payment Services , 2018, Int. J. Hum. Comput. Interact..

[14]  Mauro Conti,et al.  CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.

[15]  Dongsong Zhang,et al.  Discovering golden nuggets: data mining in financial application , 2004, IEEE Trans. Syst. Man Cybern. Part C.

[16]  Keke Gai,et al.  Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[17]  Jonathan Spiteri,et al.  The Payment Services Directive II and Competitiveness: The Perspective of European Fintech Companies , 2018, EUROPEAN RESEARCH STUDIES JOURNAL.

[18]  Keke Gai,et al.  A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances , 2014 .

[19]  Meikang Qiu,et al.  Security-aware optimization for ubiquitous computing systems with SEAT graph approach , 2013, J. Comput. Syst. Sci..

[20]  Keke Gai,et al.  Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[21]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[22]  Syed Riaz Ahmed,et al.  Applications of data mining in retail business , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[23]  Yong Hu,et al.  The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..

[24]  Zhi Chen,et al.  Low-Power Low-Latency Data Allocation for Hybrid Scratch-Pad Memory , 2014, IEEE Embedded Systems Letters.

[25]  Jan Jürjens,et al.  Data security and consumer trust in FinTech innovation in Germany , 2018, Inf. Comput. Secur..

[26]  Keke Gai,et al.  Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[27]  Navneet Vidyarthi,et al.  A Fuzzy-Based Algorithm for Auditors to Detect Element of Fraud in Settled Insurance Claims , 2003 .

[28]  Chao-Hsien Chu,et al.  A Review of Data Mining-Based Financial Fraud Detection Research , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[29]  Meikang Qiu,et al.  Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..

[30]  T. Singleton,et al.  Fraud Auditing and Forensic Accounting: Singleton/Fraud , 2010 .

[31]  Keke Gai,et al.  Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[32]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[33]  Keke Gai,et al.  Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[34]  Hyun-Sun Ryu,et al.  Understanding Benefit and Risk Framework of Fintech Adoption: Comparison of Early Adopters and Late Adopters , 2018, HICSS.

[35]  Ashutosh Deshmukh,et al.  Measurement and Combination of Red Flags to Assess the Risk of Management Fraud: A Fuzzy Set Approach , 1997 .

[36]  Surya B. Yadav,et al.  A computational model for financial reporting fraud detection , 2011, Decis. Support Syst..

[37]  Sankar K. Pal,et al.  Data mining in soft computing framework: a survey , 2002, IEEE Trans. Neural Networks.

[38]  Keke Gai,et al.  A survey on FinTech , 2018, J. Netw. Comput. Appl..

[39]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[40]  B. B. Zaidan,et al.  A security framework for mHealth apps on Android platform , 2018, Comput. Secur..

[41]  Meikang Qiu,et al.  A Review on Cloud Computing: Design Challenges in Architecture and Security , 2011, J. Comput. Inf. Technol..