skip to main content
10.1145/3581783.3613780acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection

Authors Info & Claims
Published:27 October 2023Publication History

ABSTRACT

Collaborative fraud has become increasingly serious in telecom and social networks, but is hard to detect by traditional fraud detection methods. In this paper, we find a significant positive correlation between the increase of collaborative fraud and the degraded detection performance of traditional techniques, implying that those fraudsters that are difficult to detect with traditional methods are often collaborative in their fraudulent behavior. As we know, multiple objects may contact a single target object over a period of time. We define multiple objects with the same contact target as generalized objects, and their social behaviors can be combined and processed as the social behaviors of one object. We propose Fraud Detection Model based on Second-order and Collaborative Relationship Mining (COFD), exploring new research avenues for collaborative fraud detection. Our code and data are released at https://github.com/CatScarf/COFD-MM https://github.com/CatScarf/COFD-MM.

References

  1. Ziwei Chai, Siqi You, Yang Yang, Shiliang Pu, Jiarong Xu, Haoyang Cai, and Weihao Jiang. 2022. Can Abnormality be Detected by Graph Neural Networks?. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, Lud De Raedt (Ed.). International Joint Conferences on Artificial Intelligence Organization, Messe Wien, Vienna, Austria, 1945--1951. https://doi.org/10.24963/ijcai.2022/270 Main Track.Google ScholarGoogle ScholarCross RefCross Ref
  2. Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California, USA) (KDD '16). ACM, New York, NY, USA, 785--794. https://doi.org/10.1145/2939672.2939785Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Guojun Chu, Jingyu Wang, Qi Qi, Haifeng Sun, Shimin Tao, Hao Yang, Jianxin Liao, and Zhu Han. 2022. Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks. IEEE Transactions on Dependable and Secure Computing (2022), 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Xu da, ruan chuanwei, korpeoglu evren, kumar sushant, and achan kannan. 2020. Inductive representation learning on temporal graphs. In International Conference on Learning Representations. OpenReview.net, Addis Ababa, Ethiopia. https://openreview.net/forum?id=rJeW1yHYwHGoogle ScholarGoogle Scholar
  5. Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing Graph Neural Network-Based Fraud Detectors against Camouflaged Fraudsters. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (Virtual Event, Ireland) (CIKM '20). Association for Computing Machinery, New York, NY, USA, 315--324. https://doi.org/10.1145/3340531.3411903Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long Short-Term Memory. Neural Comput., Vol. 9, 8 (nov 1997), 1735--1780. https://doi.org/10.1162/neco.1997.9.8.1735Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Yan Jiang, Guannan Liu, Junjie Wu, and Hao Lin. 2022. Telecom fraud detection via hawkes-enhanced sequence model. IEEE Transactions on Knowledge and Data Engineering, Vol. 35, 5 (2022), 5311--5324.Google ScholarGoogle Scholar
  8. Srijan Kumar, Xikun Zhang, and Jure Leskovec. 2019. Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Anchorage, AK, USA) (KDD '19). Association for Computing Machinery, New York, NY, USA, 1269--1278. https://doi.org/10.1145/3292500.3330895Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollar. 2017. Focal Loss for Dense Object Detection. In Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, Venice, Italy, 2980--2988.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ming Liu, Jianxin Liao, Jingyu Wang, and Qi Qi. 2019. AGRM: Attention-Based Graph Representation Model for Telecom Fraud Detection. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Carlton Books, Shanghai, China, 1--6. https://doi.org/10.1109/ICC.2019.8761665Google ScholarGoogle ScholarCross RefCross Ref
  11. Yang Liu, Xiang Ao, Zidi Qin, Jianfeng Chi, Jinghua Feng, Hao Yang, and Qing He. 2021. Pick and Choose: A GNN-Based Imbalanced Learning Approach for Fraud Detection. In Proceedings of the Web Conference 2021 (Ljubljana, Slovenia) (WWW '21). Association for Computing Machinery, New York, NY, USA, 3168--3177. https://doi.org/10.1145/3442381.3449989Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zhiwei Liu, Yingtong Dou, Philip S. Yu, Yutong Deng, and Hao Peng. 2020. Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection. In The 43rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (Virtual Event, China) (SIGIR '20). Association for Computing Machinery, New York, NY, USA, 1569--1572. https://doi.org/10.1145/3397271.3401253Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Xuexiong Luo, Jia Wu, Amin Beheshti, Jian Yang, Xiankun Zhang, Yuan Wang, and Shan Xue. 2022. ComGA: Community-Aware Attributed Graph Anomaly Detection. In Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Tempe, Arizon, USA, 657--665.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Julian John McAuley and Jure Leskovec. 2013. From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise through Online Reviews. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW '13). Association for Computing Machinery, New York, NY, USA, 897--908. https://doi.org/10.1145/2488388.2488466Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Shebuti Rayana and Leman Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Sydney, NSW, Australia) (KDD '15). Association for Computing Machinery, New York, NY, USA, 985--994. https://doi.org/10.1145/2783258.2783370Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Graham Stacy, Prugar Tim, Panagia Adam, Howell Jacob, Lane-Sellers Jason, Hochheimer Mary, Kerr Amber, Ornadel Stephen, and Schwed Stephen. 2022. Fraud Loss Survey Report 2021. Technical Report. Communications Fraud Control Association. https://cfca.org/wp-content/uploads/2021/12/CFCA-Fraud-Loss-Survey-2021-2.pdfGoogle ScholarGoogle Scholar
  17. Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking Graph Neural Networks for Anomaly Detection. In Proceedings of the 39th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 162), Kamalika Chaudhuri, Stefanie Jegelka, Le Song, Csaba Szepesvari, Gang Niu, and Sivan Sabato (Eds.). PMLR, Baltimore, Maryland USA, 21076-21089. https://proceedings.mlr.press/v162/tang22b.htmlGoogle ScholarGoogle Scholar
  18. Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research, Vol. 9, 86 (2008), 2579--2605. http://jmlr.org/papers/v9/vandermaaten08a.htmlGoogle ScholarGoogle Scholar
  19. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems, I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc., Long Beach, CA, USA. https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdfGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrew Z. Wang, Rex Ying, Pan Li, Nikhil Rao, Karthik Subbian, and Jure Leskovec. 2021. Bipartite Dynamic Representations for Abuse Detection. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (Virtual Event, Singapore) (KDD '21). Association for Computing Machinery, New York, NY, USA, 3638--3648. https://doi.org/10.1145/3447548.3467141Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yang Yang, Yuhong Xu, Yizhou Sun, Yuxiao Dong, Fei Wu, and Yueting Zhuang. 2021. Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks. IEEE Transactions on Knowledge and Data Engineering, Vol. 33, 1 (2021), 169--179. https://doi.org/10.1109/TKDE.2019.2924431Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM '23: Proceedings of the 31st ACM International Conference on Multimedia
      October 2023
      9913 pages
      ISBN:9798400701085
      DOI:10.1145/3581783

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate995of4,171submissions,24%

      Upcoming Conference

      MM '24
      MM '24: The 32nd ACM International Conference on Multimedia
      October 28 - November 1, 2024
      Melbourne , VIC , Australia
    • Article Metrics

      • Downloads (Last 12 months)195
      • Downloads (Last 6 weeks)32

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader