skip to main content
10.1145/3366423.3380159acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network

Published: 20 April 2020 Publication History

Abstract

Default user detection plays one of the backbones in credit risk forecasting and management. It aims at, given a set of corresponding features, e.g., patterns extracted from trading behaviors, predicting the polarity indicating whether a user will fail to make required payments in the future. Recent efforts attempted to incorporate attributed heterogeneous information network (AHIN) for extracting complex interactive features of users and achieved remarkable success on discovering specific default users such as fraud, cash-out users, etc. In this paper, we consider default users, a more general concept in credit risk, and propose a multi-view attributed heterogeneous information network based approach coined MAHINDER to remedy the special challenges. First, multiple views of user behaviors are adopted to learn personal profile due to the endogenous aspect of financial default. Second, local behavioral patterns are specifically modeled since financial default is adversarial and accumulated. With the real datasets contained 1.38 million users on Alibaba platform, we investigate the effectiveness of MAHINDER, and the experimental results exhibit the proposed approach is able to improve AUC over 2.8% and Recall@Precision=0.1 over 13.1% compared with the state-of-the-art methods. Meanwhile, MAHINDER has as good interpretability as tree-based methods like GBDT, which buoys the deployment in online platforms.

References

[1]
Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, 2016. Tensorflow: A System for Large-scale Machine Learning. In OSDI. 265–283.
[2]
Xiang Ao, Ping Luo, Jin Wang, Fuzhen Zhuang, and Qing He. 2018. Mining precise-positioning episode rules from event sequences. IEEE Transactions on Knowledge and Data Engineering 30, 3(2018), 530–543.
[3]
Xiang Ao, Haoran Shi, Jin Wang, Luo Zuo, Hongwei Li, and Qing He. 2019. Large-scale frequent episode mining from complex event sequences with hierarchies. ACM Transactions on Intelligent Systems and Technology (TIST) 10, 4(2019), 1–26.
[4]
Siddhartha Bhattacharyya, Sanjeev Jha, Kurian Tharakunnel, and J. Christopher Westland. 2011. Data Mining for Credit Card Fraud: A Comparative Study. Decision Support Systems 50, 3 (2011), 602–613.
[5]
Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative Embeddings of Latent Variable Models for Structured Data. In ICML. 2702–2711.
[6]
Yuxiao Dong, Nitesh V Chawla, and Ananthram Swami. 2017. Metapath2vec: Scalable Representation Learning for Heterogeneous Networks. In KDD. 135–144.
[7]
Jerome H Friedman. 2001. Greedy Function Approximation: A Gradient Boosting Machine. Annals of Statistics(2001), 1189–1232.
[8]
Taoyang Fu, WangChien Lee, and Zhen Lei. 2017. Hin2vec: Explore Meta-paths in Heterogeneous Information Networks for Representation Learning. In CIKM.
[9]
Xavier Glorot and Yoshua Bengio. 2010. Understanding the Difficulty of Training Deep Feedforward Neural Networks. In AISTATS. 249–256.
[10]
Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS. 1024–1034.
[11]
Jiazhen He, James Bailey, and Rui Zhang. 2014. Exploiting Transitive Similarity and Temporal Dynamics for Similarity Search in Heterogeneous Information Networks. In DASFAA. 141–155.
[12]
Bethany Hoogs, Thomas Kiehl, Christina Lacomb, and Deniz Senturk. 2007. A Genetic Algorithm Approach to Detecting Temporal Patterns Indicative of Financial Statement Fraud. Intelligent Systems in Accounting, Finance & Management: International Journal 15, 1-2 (2007), 41–56.
[13]
Binbin Hu, Zhiqiang Zhang, Chuan Shi, Jun Zhou, Xiaolong Li, and Yuan Qi. 2019. Cash-out User Detection based on Attributed Heterogeneous Information Network with a Hierarchical Attention Mechanism. In AAAI. 946–953.
[14]
Ming Ji, Jiawei Han, and Marina Danilevsky. 2011. Ranking-based Classification of Heterogeneous Information Networks. In KDD. 1298–1306.
[15]
Diederik P Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR.
[16]
Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR.
[17]
Jundong Li, Harsh Dani, Xia Hu, Jiliang Tang, Yi Chang, and Huan Liu. 2017. Attributed Network Embedding for Learning in A Dynamic Environment. In CIKM. 387–396.
[18]
Yuan Li, Yiheng Sun, and Noshir Contractor. 2017. Graph Mining Assisted Semi-supervised Learning for Fraudulent Cash-Out Detection. In ASONAM. 546–553.
[19]
Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, and Le Song. 2018. Heterogeneous Graph Neural Networks for Malicious Account Detection. In CIKM. 2077–2085.
[20]
Changping Meng, Reynold Cheng, Silviu Maniu, Pierre Senellart, and Wangda Zhang. 2015. Discovering Meta-paths in Large Heterogeneous Information Networks. In WWW. 754–764.
[21]
Vinod Nair and Geoffrey E. Hinton. 2010. Rectified Linear Units Improve Restricted Boltzmann Machines. In ICML. 807–814.
[22]
Carsten AW Paasch. 2008. Credit Card Fraud Detection Using Artificial Neural Networks Tuned by Genetic Algorithms. Ph.D. Thesis. Hong Kong University of Science and Technology (2008).
[23]
Jon T. S. Quah and M. Sriganesh. 2008. Real-time Credit Card Fraud Detection Using Computational Intelligence. Expert Systems With Applications 35, 4 (2008), 1721–1732.
[24]
Pediredla Ravisankar, Vadlamani Ravi, G Raghava Rao, and Indranil Bose. 2011. Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques. Decision Support Systems 50, 2 (2011), 491–500.
[25]
Chuan Shi, Binbin Hu, Wayne Xin Zhao, and S Yu Philip. 2018. Heterogeneous Information Network Embedding for Recommendation. IEEE Transactions on Knowledge and Data Engineering (2018), 357–370.
[26]
Chuan Shi, Yitong Li, Jiawei Zhang, Yizhou Sun, and S Yu Philip. 2016. A Survey of Heterogeneous Information Network Analysis. IEEE Transactions on Knowledge and Data Engineering (2016), 17–37.
[27]
Yizhou Sun and Jiawei Han. 2012. Mining Heterogeneous Information Networks: Principles and Methodologies. Synthesis Lectures on Data Mining and Knowledge Discovery 3, 2(2012), 1–159.
[28]
Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S Yu, and Tianyi Wu. 2011. Pathsim: Meta Path-based Top-k Similarity Search in Heterogeneous Information Networks. In VLDB. 992–1003.
[29]
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan, Philip S Yu, and Xiao Yu. 2013. Pathselclus: Integrating Meta-path Selection with User-guided Object Clustering in Heterogeneous Information Networks. ACM Transactions on Knowledge Discovery from Data 7, 3 (2013), 11.
[30]
Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR.
[31]
Daixin Wang, Peng Cui, and Wenwu Zhu. 2016. Structural Deep Network Embedding. In KDD. 1225–1234.
[32]
Daixin Wang, Jianbin Lin, Peng Cui, Quanhui Jia, Zhen Wang, Yanming Fang, Quan Yu, Jun Zhou, Shuang Yang, and Yuan Qi. 2019. A Semi-supervised Graph Attentive Network for Financial Fraud Detection. In ICDM.
[33]
Xiao Wang, Houye Ji, Chuan Shi, Bai Wang, Yanfang Ye, Peng Cui, and Philip S Yu. 2019. Heterogeneous Graph Attention Network. In WWW. 2022–2032.
[34]
Kun Yao, Hoi Fong Mak, 2014. PathSimExt: Revisiting PathSim in Heterogeneous Information Networks. In WAIM.
[35]
Dianmin Yue, Xiaodan Wu, Yunfeng Wang, Yue Li, and Chao-Hsien Chu. 2007. A Review of Data Mining-based Financial Fraud Detection Research. In WiCOM. 5519–5522.
[36]
Chuxu Zhang, Chao Huang, Lu Yu, Xiangliang Zhang, and Nitesh V Chawla. 2018. Camel: Content-aware and Meta-path Augmented Metric Learning for Author Identification. In WWW. 709–718.
[37]
Chuxu Zhang, Dongjin Song, Chao Huang, Ananthram Swami, and Nitesh V. Chawla. 2019. Heterogeneous Graph Neural Network. In KDD. 793–803.
[38]
Chuxu Zhang, Lu Yu, Xiangliang Zhang, and Nitesh V Chawla. 2018. Task-guided and Semantic-aware Ranking for Academic Author-paper Correlation Inference. In IJCAI. 3641–3647.
[39]
YaLin Zhang, Xiaolong Li, Yuan Qi, ZhiHua Zhou, Jun Zhou, Wenhao Zheng, Ji Feng, Longfei Li, Ziqi Liu, Ming Li, and et al.2019. Distributed Deep Forest and its Application to Automatic Detection of Cash-Out Fraud. ACM Transactions on Intelligent Systems and Technology 10, 5(2019).
[40]
Yizhou Zhang, Yun Xiong, Xiangnan Kong, Shanshan Li, Jinhong Mi, and Yangyong Zhu. 2018. Deep Collective Classification in Heterogeneous Information Networks. In WWW. 399–408.
[41]
Jun Zhou, Xiaolong Li, Peilin Zhao, Chaochao Chen, Longfei Li, Xinxing Yang, Qing Cui, Jin Yu, Xu Chen, Yi Ding, and Yuan Alan Qi. 2017. KunPeng: Parameter Server Based Distributed Learning Systems and Its Applications in Alibaba and Ant Financial. In KDD. 1693–1702.
[42]
Zhihua Zhou and Ji Feng. 2017. Deep Forest: Towards An Alternative to Deep Neural Networks. In IJCAI. 3533–3539.

Cited By

View all
  • (2025)LOGIN: A Large Language Model Consulted Graph Neural Network Training FrameworkProceedings of the Eighteenth ACM International Conference on Web Search and Data Mining10.1145/3701551.3703488(232-241)Online publication date: 10-Mar-2025
  • (2025)Temporal multivariate-factors independence convolution network for anomaly detection in dynamic networksNeurocomputing10.1016/j.neucom.2025.129439(129439)Online publication date: Jan-2025
  • (2025)Transaction fraud detection via attentional spatial–temporal GNNThe Journal of Supercomputing10.1007/s11227-025-06983-881:4Online publication date: 24-Feb-2025
  • Show More Cited By

Index Terms

  1. Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WWW '20: Proceedings of The Web Conference 2020
      April 2020
      3143 pages
      ISBN:9781450370233
      DOI:10.1145/3366423
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 April 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Financial defaulter detection
      2. Meta-path encoder
      3. Multi-view attributed heterogeneous information network

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      WWW '20
      Sponsor:
      WWW '20: The Web Conference 2020
      April 20 - 24, 2020
      Taipei, Taiwan

      Acceptance Rates

      Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)124
      • Downloads (Last 6 weeks)10
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)LOGIN: A Large Language Model Consulted Graph Neural Network Training FrameworkProceedings of the Eighteenth ACM International Conference on Web Search and Data Mining10.1145/3701551.3703488(232-241)Online publication date: 10-Mar-2025
      • (2025)Temporal multivariate-factors independence convolution network for anomaly detection in dynamic networksNeurocomputing10.1016/j.neucom.2025.129439(129439)Online publication date: Jan-2025
      • (2025)Transaction fraud detection via attentional spatial–temporal GNNThe Journal of Supercomputing10.1007/s11227-025-06983-881:4Online publication date: 24-Feb-2025
      • (2024)Artificial Intelligence for detecting and preventing procurement fraudInternational Journal of Business Ecosystem & Strategy (2687-2293)10.36096/ijbes.v6i1.4776:1(63-73)Online publication date: 23-Mar-2024
      • (2024)FraudGT: A Simple, Effective, and Efficient Graph Transformer for Financial Fraud DetectionProceedings of the 5th ACM International Conference on AI in Finance10.1145/3677052.3698648(292-300)Online publication date: 14-Nov-2024
      • (2024)Extremely-Compressed SSDs with I/O Behavior PredictionACM Transactions on Storage10.1145/3677044Online publication date: 16-Jul-2024
      • (2024)KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph DataProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690354(168-182)Online publication date: 2-Dec-2024
      • (2024)Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous GraphProceedings of the 2024 16th International Conference on Machine Learning and Computing10.1145/3651671.3651690(478-484)Online publication date: 2-Feb-2024
      • (2024)Credit Card Fraud Detection via Intelligent Sampling and Self-supervised LearningACM Transactions on Intelligent Systems and Technology10.1145/364128315:2(1-29)Online publication date: 23-Jan-2024
      • (2024)SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask LearningProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671534(5329-5338)Online publication date: 25-Aug-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media