Skip to main content

CuRL: Coupled Representation Learning of Cards and Merchants to Detect Transaction Frauds

  • Conference paper
  • First Online:
Artificial Neural Networks and Machine Learning – ICANN 2021 (ICANN 2021)

Abstract

Payment networks like Mastercard or Visa process billions of transactions every year. A significant number of these transactions are fraudulent that cause huge losses to financial institutions. Conventional fraud detection methods fail to capture higher-order interactions between payment entities i.e., cards and merchants, which could be crucial to detect out-of-pattern, possibly fraudulent transactions. Several works have focused on capturing these interactions by representing the transaction data either as a bipartite graph or homogeneous graph projections of the payment entities. In a homogeneous graph, higher-order cross-interactions between the entities are lost and hence the representations learned are sub-optimal. In a bipartite graph, the sequences generated through random walk are stochastic, computationally expensive to generate, and sometimes drift away to include uncorrelated nodes. Moreover, scaling graph-learning algorithms and using them for real-time fraud scoring is an open challenge.

In this paper, we propose CuRL and tCuRL, coupled representation learning methods that can effectively capture the higher-order interactions in a bipartite graph of payment entities. Instead of relying on random walks, proposed methods generate coupled session-based interaction pairs of entities which are then fed as input to the skip-gram model to learn entity representations. The model learns the representations for both entities simultaneously and in the same embedding space, which helps to capture their cross-interactions effectively. Furthermore, considering the session constrained neighborhood structure of an entity makes the pair generation process efficient. This paper demonstrates that the proposed methods run faster than many state-of-the-art representation learning algorithms and produce embeddings that outperform other relevant baselines on fraud classification task.

M. Gramopadhye and S. Singh—Equal contribution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/stellargraph/stellargraph.

  2. 2.

    https://github.com/facebookresearch/PyTorch-BigGraph.

  3. 3.

    https://github.com/tangjianpku/LINE.

  4. 4.

    https://github.com/clhchtcjj/BiNE.

References

  1. Akhilomen, J.: Data mining application for cyber credit-card fraud detection system. In: Perner, P. (ed.) ICDM 2013. LNCS (LNAI), vol. 7987, pp. 218–228. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39736-3_17

    Chapter  Google Scholar 

  2. Bahnsen, A.C., Stojanovic, A., Aouada, D., Ottersten, B.: Improving credit card fraud detection with calibrated probabilities. In: SDM (2014)

    Google Scholar 

  3. Bruss, C., et al.: DeepTrax: embedding graphs of financial transactions. In: 2019 18th IEEE International Conference on Machine Learning and Applications (2019)

    Google Scholar 

  4. Cao, B., Mao, M., Viidu, S., Yu, P.S.: HitFraud: a broad learning approach for collective fraud detection in heterogeneous information networks. In: 2017 IEEE International Conference on Data Mining (ICDM), pp. 769–774 (2017)

    Google Scholar 

  5. Chandola, V., et al.: Anomaly detection: a survey. ACM Comput. Surv. 41, 1–58 (2009)

    Article  Google Scholar 

  6. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)

    Article  Google Scholar 

  7. Dong, Y., Chawla, N.V., Swami, A.: metapath2vec: scalable representation learning for heterogeneous networks. In: KDD 2017, pp. 135–144. ACM (2017)

    Google Scholar 

  8. Eberle, W., Holder, L.: Mining for insider threats in business transactions and processes. In: 2009 IEEE Symposium on Computational Intelligence and Data Mining, pp. 163–170 (2009)

    Google Scholar 

  9. El hlouli, F.Z., Riffi, J., et al.: Credit card fraud detection based on multilayer perceptron and extreme learning machine architectures. In: International Conference on Intelligent Systems and Computer Vision (2020)

    Google Scholar 

  10. Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Giles, L., Smith, M., Yen, J., Zhang, H. (eds.) SNAKDD 2008. LNCS, vol. 5498, pp. 1–19. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14929-0_1

    Chapter  Google Scholar 

  11. Gao, M., Chen, L., He, X., Zhou, A.: BiNE: bipartite network embedding. In: SIGIR 2018. Association for Computing Machinery (2018)

    Google Scholar 

  12. Grover, A., Leskovec, J.: Node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016. Association for Computing Machinery (2016)

    Google Scholar 

  13. Henderson, K., et al.: It’s who you know: graph mining using recursive structural features. In: KDD (2011)

    Google Scholar 

  14. Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)

    Google Scholar 

  15. Huang, D., Mu, D., Yang, L., Cai, X.: Codetect: financial fraud detection with anomaly feature detection. IEEE Access 6, 19161–19174 (2018)

    Article  Google Scholar 

  16. Jurgovsky, J., Granitzer, M., et al.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234–245 (2018)

    Article  Google Scholar 

  17. Lerer, A., Wu, L., et al.: PyTorch-BigGraph: a large-scale graph embedding system. In: Proceedings of the 2nd SysML Conference, Palo Alto, CA, USA (2019)

    Google Scholar 

  18. Liu, D.C., et al.: Related pins at pinterest: the evolution of a real-world recommender system. In: Proceedings of the 26th International Conference on World Wide Web Companion (2017)

    Google Scholar 

  19. Mikolov, T., Chen, K., Corrado, G.S., Dean, J.: Efficient estimation of word representations in vector space (2013)

    Google Scholar 

  20. Misra, S., Thakur, S., Ghosh, M., Saha, S.K.: An autoencoder based model for detecting fraudulent credit card transaction. Procedia Comput. Sci. 167, 254–262 (2020). International Conference on Computational Intelligence and Data Science

    Google Scholar 

  21. Molloy, I., et al.: Graph analytics for real-time scoring of cross-channel transactional fraud. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 22–40. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_2

    Chapter  Google Scholar 

  22. Moschini, G., Houssou, R., Bovay, J., Robert-Nicoud, S.: Anomaly and fraud detection in credit card transactions using the ARIMA model (2020)

    Google Scholar 

  23. Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) (2016)

    Google Scholar 

  24. Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)

    Google Scholar 

  25. Salim Hasham, R.H., Wavra, R.: Combating payments fraud and enhancing customer experience (2018). https://mck.co/2Qi4ead

  26. Shen, A., et al.: Application of classification models on credit card fraud detection. In: International Conference on Service Systems and Service Management (2007)

    Google Scholar 

  27. Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web (2015)

    Google Scholar 

  28. The Nilson Report, Issue 1164: Card Fraud Worldwide 2010–2027 - Card Fraud Losses Reach \$27.85 billion (2019). https://bit.ly/3uZ1v4D

  29. Van Vlasselaer, V., et al.: APATE: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support Syst. 75, 38–48 (2015)

    Article  Google Scholar 

  30. Zheng, E.H., Zou, C., Sun, J., Chen, L., Li, P.: SVM-based cost-sensitive classification algorithm with error cost and class-dependent reject cost. In: 2010 Second International Conference on Machine Learning and Computing, pp. 233–236 (2010)

    Google Scholar 

  31. Zou, J., Zhang, J., Jiang, P.: Credit card fraud detection using autoencoder neural network (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreyansh Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gramopadhye, M. et al. (2021). CuRL: Coupled Representation Learning of Cards and Merchants to Detect Transaction Frauds. In: Farkaš, I., Masulli, P., Otte, S., Wermter, S. (eds) Artificial Neural Networks and Machine Learning – ICANN 2021. ICANN 2021. Lecture Notes in Computer Science(), vol 12895. Springer, Cham. https://doi.org/10.1007/978-3-030-86383-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86383-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86382-1

  • Online ISBN: 978-3-030-86383-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics