ABSTRACT
Collaborative fraud has become increasingly serious in telecom and social networks, but is hard to detect by traditional fraud detection methods. In this paper, we find a significant positive correlation between the increase of collaborative fraud and the degraded detection performance of traditional techniques, implying that those fraudsters that are difficult to detect with traditional methods are often collaborative in their fraudulent behavior. As we know, multiple objects may contact a single target object over a period of time. We define multiple objects with the same contact target as generalized objects, and their social behaviors can be combined and processed as the social behaviors of one object. We propose Fraud Detection Model based on Second-order and Collaborative Relationship Mining (COFD), exploring new research avenues for collaborative fraud detection. Our code and data are released at https://github.com/CatScarf/COFD-MM https://github.com/CatScarf/COFD-MM.
- Ziwei Chai, Siqi You, Yang Yang, Shiliang Pu, Jiarong Xu, Haoyang Cai, and Weihao Jiang. 2022. Can Abnormality be Detected by Graph Neural Networks?. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, Lud De Raedt (Ed.). International Joint Conferences on Artificial Intelligence Organization, Messe Wien, Vienna, Austria, 1945--1951. https://doi.org/10.24963/ijcai.2022/270 Main Track.Google ScholarCross Ref
- Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California, USA) (KDD '16). ACM, New York, NY, USA, 785--794. https://doi.org/10.1145/2939672.2939785Google ScholarDigital Library
- Guojun Chu, Jingyu Wang, Qi Qi, Haifeng Sun, Shimin Tao, Hao Yang, Jianxin Liao, and Zhu Han. 2022. Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks. IEEE Transactions on Dependable and Secure Computing (2022), 1--13.Google ScholarDigital Library
- Xu da, ruan chuanwei, korpeoglu evren, kumar sushant, and achan kannan. 2020. Inductive representation learning on temporal graphs. In International Conference on Learning Representations. OpenReview.net, Addis Ababa, Ethiopia. https://openreview.net/forum?id=rJeW1yHYwHGoogle Scholar
- Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing Graph Neural Network-Based Fraud Detectors against Camouflaged Fraudsters. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (Virtual Event, Ireland) (CIKM '20). Association for Computing Machinery, New York, NY, USA, 315--324. https://doi.org/10.1145/3340531.3411903Google ScholarDigital Library
- Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long Short-Term Memory. Neural Comput., Vol. 9, 8 (nov 1997), 1735--1780. https://doi.org/10.1162/neco.1997.9.8.1735Google ScholarDigital Library
- Yan Jiang, Guannan Liu, Junjie Wu, and Hao Lin. 2022. Telecom fraud detection via hawkes-enhanced sequence model. IEEE Transactions on Knowledge and Data Engineering, Vol. 35, 5 (2022), 5311--5324.Google Scholar
- Srijan Kumar, Xikun Zhang, and Jure Leskovec. 2019. Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Anchorage, AK, USA) (KDD '19). Association for Computing Machinery, New York, NY, USA, 1269--1278. https://doi.org/10.1145/3292500.3330895Google ScholarDigital Library
- Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollar. 2017. Focal Loss for Dense Object Detection. In Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, Venice, Italy, 2980--2988.Google ScholarCross Ref
- Ming Liu, Jianxin Liao, Jingyu Wang, and Qi Qi. 2019. AGRM: Attention-Based Graph Representation Model for Telecom Fraud Detection. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Carlton Books, Shanghai, China, 1--6. https://doi.org/10.1109/ICC.2019.8761665Google ScholarCross Ref
- Yang Liu, Xiang Ao, Zidi Qin, Jianfeng Chi, Jinghua Feng, Hao Yang, and Qing He. 2021. Pick and Choose: A GNN-Based Imbalanced Learning Approach for Fraud Detection. In Proceedings of the Web Conference 2021 (Ljubljana, Slovenia) (WWW '21). Association for Computing Machinery, New York, NY, USA, 3168--3177. https://doi.org/10.1145/3442381.3449989Google ScholarDigital Library
- Zhiwei Liu, Yingtong Dou, Philip S. Yu, Yutong Deng, and Hao Peng. 2020. Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection. In The 43rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (Virtual Event, China) (SIGIR '20). Association for Computing Machinery, New York, NY, USA, 1569--1572. https://doi.org/10.1145/3397271.3401253Google ScholarDigital Library
- Xuexiong Luo, Jia Wu, Amin Beheshti, Jian Yang, Xiankun Zhang, Yuan Wang, and Shan Xue. 2022. ComGA: Community-Aware Attributed Graph Anomaly Detection. In Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Tempe, Arizon, USA, 657--665.Google ScholarDigital Library
- Julian John McAuley and Jure Leskovec. 2013. From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise through Online Reviews. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW '13). Association for Computing Machinery, New York, NY, USA, 897--908. https://doi.org/10.1145/2488388.2488466Google ScholarDigital Library
- Shebuti Rayana and Leman Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Sydney, NSW, Australia) (KDD '15). Association for Computing Machinery, New York, NY, USA, 985--994. https://doi.org/10.1145/2783258.2783370Google ScholarDigital Library
- Graham Stacy, Prugar Tim, Panagia Adam, Howell Jacob, Lane-Sellers Jason, Hochheimer Mary, Kerr Amber, Ornadel Stephen, and Schwed Stephen. 2022. Fraud Loss Survey Report 2021. Technical Report. Communications Fraud Control Association. https://cfca.org/wp-content/uploads/2021/12/CFCA-Fraud-Loss-Survey-2021-2.pdfGoogle Scholar
- Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking Graph Neural Networks for Anomaly Detection. In Proceedings of the 39th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 162), Kamalika Chaudhuri, Stefanie Jegelka, Le Song, Csaba Szepesvari, Gang Niu, and Sivan Sabato (Eds.). PMLR, Baltimore, Maryland USA, 21076-21089. https://proceedings.mlr.press/v162/tang22b.htmlGoogle Scholar
- Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research, Vol. 9, 86 (2008), 2579--2605. http://jmlr.org/papers/v9/vandermaaten08a.htmlGoogle Scholar
- Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems, I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc., Long Beach, CA, USA. https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdfGoogle ScholarDigital Library
- Andrew Z. Wang, Rex Ying, Pan Li, Nikhil Rao, Karthik Subbian, and Jure Leskovec. 2021. Bipartite Dynamic Representations for Abuse Detection. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (Virtual Event, Singapore) (KDD '21). Association for Computing Machinery, New York, NY, USA, 3638--3648. https://doi.org/10.1145/3447548.3467141Google ScholarDigital Library
- Yang Yang, Yuhong Xu, Yizhou Sun, Yuxiao Dong, Fei Wu, and Yueting Zhuang. 2021. Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks. IEEE Transactions on Knowledge and Data Engineering, Vol. 33, 1 (2021), 169--179. https://doi.org/10.1109/TKDE.2019.2924431Google ScholarDigital Library
Index Terms
- Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection
Recommendations
Group-based Fraud Detection Network on e-Commerce Platforms
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningAlong with the rapid technological and commercial innovation on the e-commerce platforms, there are an increasing number of frauds that bring great harm to these platforms. Many frauds are conducted by organized groups of fraudsters for higher efficiency ...
Research on Credit Card Fraud Detection Model Based on Distance Sum
JCAI '09: Proceedings of the 2009 International Joint Conference on Artificial IntelligenceAlong with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This paper proposes a credit card fraud ...
Fraud detection in credit card transaction using neural networks
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsBanking transactions, such as online transactions, credit card transactions and the mobile wallet, are gaining popularity. People are shopping more and more using credit cards. Credit cards have become a necessity, to the virtual world, for digitized ...
Comments