March 2024
·
26 Reads
·
2 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
March 2024
·
26 Reads
·
2 Citations
February 2023
·
192 Reads
·
8 Citations
International Journal of Machine Learning and Cybernetics
Graph-powered fraud detection is a common issue in various areas, such as e-commerce, banking, insurance and social networks, where data can be naturally formulated as graph structure. Especially in e-commerce, due to its large scale and enormous amount of real-time transactions over millions of merchandises, fraud detection has become an important and serious problem. The challenges lie in three aspects: sparse fraud samples, complex features in online transactions and extra-large scale of e-commerce data. To deal with above issues, in this paper, we propose an efficient graph-powered large-scale fraud detection framework. Concretely, we first present a heterogeneous label propagation algorithm to recall more potentially fraudulent samples for further model training; then, we design a novel multi-view heterogeneous graph neural network model to obtain more accurate fraud predictions; finally, a fraud pattern analysis approach is presented to discover hidden fraud groups. In addition, in order to improve the efficiency and scalability of our proposed fraud detection framework, we present a large-scale fraud detection system deployed on a general graph computing engine. We conduct experiments on two real-world datasets. Results show that the proposed graph-powered fraud detection framework achieves high accuracy and superior scalability on large-scale graph data.
January 2023
·
10 Reads
January 2023
·
5 Reads
January 2022
·
928 Reads
·
21 Citations
The VLDB Journal
In e-commerce scenarios, frauds events such as telecom fraud, insurance fraud, and fraudulent transactions, bring a huge amount of loss to merchants or users. Identification of fraudsters helps regulators take measures for targeted control. Given a set of fraudsters and suspicious users observed from victims’ reports, how can we effectively distinguish risky users closely related to them from the others for further investigation by human experts? Fraudsters take camouflage actions to hide from being discovered; complex features on users are hard to deal with; patterns of fraudsters are sometimes difficult to explain by human knowledge; and real-world applications involve millions of users. All this makes the question hard to answer. To this end, we design eRiskCom, an e-commerce risky community detection platform to detect risky groups containing identified fraudsters and other closely related users. With the hypothesis that users who interact frequently with fraudsters are more likely to come from the same “risky community,” we construct a connected graph expanded from the identified fraudsters and suspicious users. Next, graph partition is employed to get knowledge of assignment of identified users to potential risky communities, followed by pruning to discover the core members of each community. Finally, top-K users with a high risk score in the neighborhood of core members of each potential community form a final risky community. The extensive experiments are conducted to analyze the effect of our platform components on the alignment with requirements of practical scenarios, and experimental results further demonstrate that eRiskCom is effective and easy to deploy for real-world applications.
August 2021
·
162 Reads
·
36 Citations
July 2021
·
7,424 Reads
·
121 Citations
ACM Transactions on Information Systems
With the development of e-commerce, fraud behaviors have been becoming one of the biggest threats to the e-commerce business. Fraud behaviors seriously damage the ranking system of e-commerce platforms and adversely influence the shopping experience of users. It is of great practical value to detect fraud behaviors on e-commerce platforms. However, the task is non-trivial, since the adversarial action taken by fraudsters. Existing fraud detection systems used in the e-commerce industry easily suffer from performance decay and can not adapt to the upgrade of fraud patterns, as they take already known fraud behaviors as supervision information to detect other suspicious behaviors. In this article, we propose a competitive graph neural networks (CGNN)-based fraud detection system (eFraudCom) to detect fraud behaviors at one of the largest e-commerce platforms, “Taobao” ¹ . In the eFraudCom system, (1) the competitive graph neural networks (CGNN) as the core part of eFraudCom can classify behaviors of users directly by modeling the distributions of normal and fraud behaviors separately; (2) some normal behaviors will be utilized as weak supervision information to guide the CGNN to build the profile for normal behaviors that are more stable than fraud behaviors. The algorithm dependency on fraud behaviors will be eliminated, which enables eFraudCom to detect fraud behaviors in presence of the new fraud patterns; (3) the mutual information regularization term can maximize the separability between normal and fraud behaviors to further improve CGNN. eFraudCom is implemented into a prototype system and the performance of the system is evaluated by extensive experiments. The experiments on two Taobao and two public datasets demonstrate that the proposed deep framework CGNN is superior to other baselines in detecting fraud behaviors. A case study on Taobao datasets verifies that CGNN is still robust when the fraud patterns have been upgraded.
April 2021
·
99 Reads
·
20 Citations
April 2021
·
81 Reads
·
11 Citations
April 2021
·
20 Reads
·
1 Citation
Communications in Computer and Information Science
Graph computing is more and more widely used in various fields such as spatial information network and social network. However, the existing graph computing systems have some problems like complex programming and steep learning curve. This paper introduces GRAPE, a distributed large-scale GRAPh Engine, which has the unique features of solid theoretical guarantee, ease of use, auto-parallelization and high performance. The paper also introduces several typical scenarios of graph computing, including entity resolution, link prediction, community detection and graph mining of spatial information network. In these scenarios, various problems have been encountered in the existing systems, such as failure to compute over large-scale data due to the high computation complexity, loss of accuracy due to the cropping of original data and too long execution time. In the face of these challenges, GRAPE is easy to support these computing scenarios with a series of technical improvements. With the deployment of GRAPE in Alibaba, both effectiveness and efficiency of graph computing have been greatly improved.
... The emergence of the sharing economy has become ubiquitous across diverse facets of modern society [1]- [3], spotlighting Sharing E-Bike Battery (SEB) [4] as a focal point of attention. Furthermore, the sharing battery assumes a central ¶ Equal contribution. ...
March 2024
... Unlike approaches that involve processing data in batches, which can cause delays in spotting and addressing fraudulent behavior, ML algorithms can swiftly analyze transactions as they occur, quickly identifying suspicious activities. This feature not only improves decision quality, by minimizing the time for fraudulent transactions to slip through unnoticed, but also enables immediate intervention to prevent potential financial losses [35]. ...
February 2023
International Journal of Machine Learning and Cybernetics
... Graph pattern mining constitutes a pivotal task within the ambit of mining and machine learning, with profound applications extending to various industrial and business domains such as social network analysis [13], financial fraud detection [2,10], and computational bioinformatics [21]. Taking the financial transaction scenario as an example, fraudsters would try to cheat normal users and make illegal money transfers. ...
January 2022
The VLDB Journal
... Fraud detection has been studied in different scenarios, such as identifying malicious accounts [3][4][5]; anti-money laundering [6,7]; spam reviews and news detection [8,9]. Among these, we focus on transaction fraud detection [10][11][12][13][14][15], which is prominent in e-commerce platforms. If fraudulent transactions in practical applications can be identified, the e-commerce platforms can freeze malicious accounts and investigate legal responsibilities according to specific behaviors, thus effectively protecting the interests of merchants and timely reducing economic losses. ...
August 2021
... Due to their heavy reliance on recognized patterns for identification, traditional fraud detection systems frequently experience performance deterioration as a result of their inability to keep up with the constantly changing fraudulent techniques. As a result, Zhang et al. [7] introduces One of the biggest e-commerce sites in China, "Taobao," is the target market for eFraudCom, a fraud detection system. Competitive Graph Neural Networks (CGNN) are its fundamental component; they categorise user actions directly by simulating the normal and fraudulent distributions independently. ...
July 2021
ACM Transactions on Information Systems
... resonate with all application scenarios, particularly those driven by singular, focused objectives. Li et al. (2021) embarks on a pioneering exploration into the intricate domain of false click information within E-commerce recommendation systems. Their study offers a robust set of attack detection techniques, meticulously tailored for the E-commerce landscape. ...
April 2021
... Applications such as friend recommendation in social networks [6,7] and fraud detection on e-commerce platforms [35,57] identification of query-driven cohesive subgraphs. To handle these demands, community search (CS) [13,40,46,47], also known as local community detection, is proposed. ...
April 2021
... In 2012, Gonzalez et al. [45] presented PowerGraph, a large-scale graph computing engine designed for machine learning, which is developed based on a model named Gather-Apply-Scatter (GAS). Xu et al. proposed GraphScope [46], a one-station large-scale graph computing engine for graph analysis, learning and operations. Various graph computing algorithms can be deployed on large-scale graph computing engines to implement specific tasks such as fraud detection. ...
April 2021
Communications in Computer and Information Science
... The advantages of ANN and machine learning regarding computation time are demonstrated in many works. In [13], a novel attention-based heterogeneous multi-view graph neural networkis analyzed. Architecture based on graph neural network is used in [14], and in [15], power flow solver is embedded in the training loop of ML. ...
March 2021
Future Generation Computer Systems
... Graphs are extensively employed to model complex systems across various domains, such as social networks (Wang et al. 2019), human knowledge networks (Ji et al. 2021), e-commerce (Qu et al. 2020), and cybersecurity . Although the bulk of researches focus on static graphs, real-world graph data often evolves over time (Skarding, Gabrys, and Musial 2021). ...
October 2020