Abstract
Payment networks like Mastercard or Visa process billions of transactions every year. A significant number of these transactions are fraudulent that cause huge losses to financial institutions. Conventional fraud detection methods fail to capture higher-order interactions between payment entities i.e., cards and merchants, which could be crucial to detect out-of-pattern, possibly fraudulent transactions. Several works have focused on capturing these interactions by representing the transaction data either as a bipartite graph or homogeneous graph projections of the payment entities. In a homogeneous graph, higher-order cross-interactions between the entities are lost and hence the representations learned are sub-optimal. In a bipartite graph, the sequences generated through random walk are stochastic, computationally expensive to generate, and sometimes drift away to include uncorrelated nodes. Moreover, scaling graph-learning algorithms and using them for real-time fraud scoring is an open challenge.
In this paper, we propose CuRL and tCuRL, coupled representation learning methods that can effectively capture the higher-order interactions in a bipartite graph of payment entities. Instead of relying on random walks, proposed methods generate coupled session-based interaction pairs of entities which are then fed as input to the skip-gram model to learn entity representations. The model learns the representations for both entities simultaneously and in the same embedding space, which helps to capture their cross-interactions effectively. Furthermore, considering the session constrained neighborhood structure of an entity makes the pair generation process efficient. This paper demonstrates that the proposed methods run faster than many state-of-the-art representation learning algorithms and produce embeddings that outperform other relevant baselines on fraud classification task.
M. Gramopadhye and S. Singh—Equal contribution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akhilomen, J.: Data mining application for cyber credit-card fraud detection system. In: Perner, P. (ed.) ICDM 2013. LNCS (LNAI), vol. 7987, pp. 218–228. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39736-3_17
Bahnsen, A.C., Stojanovic, A., Aouada, D., Ottersten, B.: Improving credit card fraud detection with calibrated probabilities. In: SDM (2014)
Bruss, C., et al.: DeepTrax: embedding graphs of financial transactions. In: 2019 18th IEEE International Conference on Machine Learning and Applications (2019)
Cao, B., Mao, M., Viidu, S., Yu, P.S.: HitFraud: a broad learning approach for collective fraud detection in heterogeneous information networks. In: 2017 IEEE International Conference on Data Mining (ICDM), pp. 769–774 (2017)
Chandola, V., et al.: Anomaly detection: a survey. ACM Comput. Surv. 41, 1–58 (2009)
Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
Dong, Y., Chawla, N.V., Swami, A.: metapath2vec: scalable representation learning for heterogeneous networks. In: KDD 2017, pp. 135–144. ACM (2017)
Eberle, W., Holder, L.: Mining for insider threats in business transactions and processes. In: 2009 IEEE Symposium on Computational Intelligence and Data Mining, pp. 163–170 (2009)
El hlouli, F.Z., Riffi, J., et al.: Credit card fraud detection based on multilayer perceptron and extreme learning machine architectures. In: International Conference on Intelligent Systems and Computer Vision (2020)
Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Giles, L., Smith, M., Yen, J., Zhang, H. (eds.) SNAKDD 2008. LNCS, vol. 5498, pp. 1–19. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14929-0_1
Gao, M., Chen, L., He, X., Zhou, A.: BiNE: bipartite network embedding. In: SIGIR 2018. Association for Computing Machinery (2018)
Grover, A., Leskovec, J.: Node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016. Association for Computing Machinery (2016)
Henderson, K., et al.: It’s who you know: graph mining using recursive structural features. In: KDD (2011)
Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)
Huang, D., Mu, D., Yang, L., Cai, X.: Codetect: financial fraud detection with anomaly feature detection. IEEE Access 6, 19161–19174 (2018)
Jurgovsky, J., Granitzer, M., et al.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234–245 (2018)
Lerer, A., Wu, L., et al.: PyTorch-BigGraph: a large-scale graph embedding system. In: Proceedings of the 2nd SysML Conference, Palo Alto, CA, USA (2019)
Liu, D.C., et al.: Related pins at pinterest: the evolution of a real-world recommender system. In: Proceedings of the 26th International Conference on World Wide Web Companion (2017)
Mikolov, T., Chen, K., Corrado, G.S., Dean, J.: Efficient estimation of word representations in vector space (2013)
Misra, S., Thakur, S., Ghosh, M., Saha, S.K.: An autoencoder based model for detecting fraudulent credit card transaction. Procedia Comput. Sci. 167, 254–262 (2020). International Conference on Computational Intelligence and Data Science
Molloy, I., et al.: Graph analytics for real-time scoring of cross-channel transactional fraud. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 22–40. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_2
Moschini, G., Houssou, R., Bovay, J., Robert-Nicoud, S.: Anomaly and fraud detection in credit card transactions using the ARIMA model (2020)
Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) (2016)
Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)
Salim Hasham, R.H., Wavra, R.: Combating payments fraud and enhancing customer experience (2018). https://mck.co/2Qi4ead
Shen, A., et al.: Application of classification models on credit card fraud detection. In: International Conference on Service Systems and Service Management (2007)
Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web (2015)
The Nilson Report, Issue 1164: Card Fraud Worldwide 2010–2027 - Card Fraud Losses Reach \$27.85 billion (2019). https://bit.ly/3uZ1v4D
Van Vlasselaer, V., et al.: APATE: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support Syst. 75, 38–48 (2015)
Zheng, E.H., Zou, C., Sun, J., Chen, L., Li, P.: SVM-based cost-sensitive classification algorithm with error cost and class-dependent reject cost. In: 2010 Second International Conference on Machine Learning and Computing, pp. 233–236 (2010)
Zou, J., Zhang, J., Jiang, P.: Credit card fraud detection using autoencoder neural network (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Gramopadhye, M. et al. (2021). CuRL: Coupled Representation Learning of Cards and Merchants to Detect Transaction Frauds. In: Farkaš, I., Masulli, P., Otte, S., Wermter, S. (eds) Artificial Neural Networks and Machine Learning – ICANN 2021. ICANN 2021. Lecture Notes in Computer Science(), vol 12895. Springer, Cham. https://doi.org/10.1007/978-3-030-86383-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-86383-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86382-1
Online ISBN: 978-3-030-86383-8
eBook Packages: Computer ScienceComputer Science (R0)