[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3110025.3110099acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Graph mining assisted semi-supervised learning for fraudulent cash-out detection

Published: 31 July 2017 Publication History

Abstract

Fraudulent cash-out is an increasingly serious problem in China, which costs financial facilities billions of dollars. Unlike most of the well-studied credit card fraud, where only one party illicitly seeks financial gain, fraudulent cash-out involves both parties of the transaction. When prior information, such as credit score and reputation score, about the majority of consumers and shops is available, the phenomenon can be readily analyzed by using the Markov random field models. In this paper, we investigate the detection of fraudulent cash-out under the circumstance where no prior information but only the labels of a small set of consumers and shops are available. The novelty of this work is building a semi-supervised learning algorithm that automatically tunes the prior and parameters in Markov random field while inferring labels for every node in the graph. We evaluate our algorithm with data from JD Finance.

References

[1]
J. West, and M. Bhattacharya, "Intelligent financial fraud detection: a comprehensive review," Computers & Security, vol. 57, pp.47--66, 2016.
[2]
E. Kirkos, C. Spathis, and Y. Manolopoulos, "Data mining techniques for the detection of fraudulent financial statements," Expert Systems with Applications, vol. 32(4), pp.995--1003, 2007.
[3]
S. Bhattacharyya, S. Jha, K. Tharakunnel, and J.C. Westland, "Data mining for credit card fraud: a comparative study," Decision Support Systems, vol. 50(3), pp.602--613, 2011.
[4]
E.W.T. Ngai, Y. Hu, Y.H. Wong, Y. Chen, and X. Sun, "The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature," Decision Support Systems, vol. 50(3), pp.559--569, 2011.
[5]
R.J. Bolton, and D.J. Hand, "Unsupervised profiling methods for fraud detection," Credit Scoring and Credit Control VII, pp.235--255, 2001
[6]
R.J. Bolton, and D.J. Hand, "Statistical fraud detection: a review," Statistical Science, pp.235--249, 2002.
[7]
S. Jha, M. Guillen, and J.C. Westland, "Employing transaction aggregation strategy to detect credit card fraud," Expert Systems with Applications, vol. 39(16), pp.12650--12657, 2012.
[8]
C. Phua, V. Lee, K. Smith, and R. Gayler, "A comprehensive survey of data mining-based fraud detection research," arXiv preprint arXiv:1009.6119, 2010.
[9]
T.S. Lim, W.Y. Loh, and Y.S. Shih, "A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms" Machine Learning, vol. 40(3), pp.203--228, 2000.
[10]
M.J. Kim, and T.S. Kim, "A neural classifier with fraud density map for effective credit card fraud detection," in International Conference on Intelligent Data Engineering and Automated Learning, pp.378--383, Springer Berlin Heidelberg, 2002, August.
[11]
M. Syeda, Y.Q. Zhang, and Y. Pan, "Parallel granular neural networks for fast credit card fraud detection," in Fuzzy Systems, 2002. FUZZ-IEEE'02. Proceedings of the 2002 IEEE International Conference, vol. 1, pp.572--577, 2002.
[12]
C. Phua, D. Alahakoon, and V. Lee, "Minority report in fraud detection: classification of skewed data," ACM SIGKDD Explorations Newsletter, vol. 6(1), pp.50--59, 2004.
[13]
T. Ormerod, N. Morley, L. Ball, C. Langley, and C. Spenser, "Using ethnography to design a Mass Detection Tool (MDT) for the early discovery of insurance fraud," in CHI'03 Extended Abstracts on Human Factors in Computing Systems, pp. 650--651, 2003, April.
[14]
H.C. Kim, S. Pang, H.M. Je, D. Kim, and S.Y. Bang, "Constructing support vector machine ensemble," Pattern Recognition, vol. 36(12), pp.2757--2767, 2003.
[15]
S. Rosset, U. Murad, E. Neumann, Y. Idan, and G. Pinkas, "Discovery of fraud rules for telecommunicationschallenges and solutions," in Proceedings of the fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 409--413, 1999, August.
[16]
L. Akoglu, H. Tong, and D. Koutra, "Graph based anomaly detection and description: a survey," Data Mining and Knowledge Discovery, vol. 29(3), pp.626--688, 2015.
[17]
C. Phua, V. Lee, K. Smith, and R. Gayler, "A comprehensive survey of data mining-based fraud detection research," arXiv preprint arXiv:1009.6119, 2010.
[18]
J.S. Yedidia, W.T. Freeman, and Y. Weiss, "Understanding belief propagation and its generalizations," Exploring Artificial Intelligence in the New Millennium, vol. 8, pp.236--239, 2003.
[19]
K.P. Murphy, Y. Weiss, and M.I. Jordan, "Loopy belief propagation for approximate inference: an empirical study," in Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, pp.467475, 1999, July.
[20]
P.F. Felzenszwalb, and D.P. Huttenlocher, "Efficient belief propagation for early vision," International Journal of Computer Vision, vol. 70(1), pp.41--54, 2006.
[21]
J. Sun, N.N. Zheng, and H.Y. Shum, "Stereo matching using belief propagation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25(7), pp.787--800, 2003.
[22]
E. Eaton, and R. Mansbach, "A spin-glass model for semi-supervised community detection," in AAAI, pp. 900--906, 2012, July.
[23]
X. Zhu, "Semi-supervised learning tutorial," in International Conference on Machine Learning (ICML), pp. 1--135, 2007, June.
[24]
N.Z. Gong, M. Frank, and P. Mittal, "Sybilbelief: a semi-supervised learning approach for structure-based sybil detection," IEEE Transactions on Information Forensics and Security, vol. 9(6), pp.976--987, 2014.
[25]
D.H. Chau, C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos, "Polonium: Tera-scale graph mining for malware detection," in ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2010, July.
[26]
J. Snoek, H. Larochelle, and R.P. Adams, "Practical Bayesian optimization of machine learning algorithms," In Advances in Neural Information Processing Systems, pp.2951--2959, 2012.
[27]
S.S. Saquib, C.A. Bouman, and K. Sauer, "ML parameter estimation for Markov random fields with applications to Bayesian tomography," IEEE Transactions on Image Processing, vol. 7(7), pp.1029--1044, 1988.
[28]
S. Pandit, D.H. Chau, S. Wang, and C. Faloutsos, "Netprobe: a fast and scalable system for fraud detection in online auction networks' in Proceedings of the 16th International Conference on World Wide Web, pp.201--210, 2007, May.

Cited By

View all
  • (2023)Tree-Based Credit Card Fraud Detection Using Isolation Forest, Spectral Residual, and Knowledge GraphMachine Learning, Optimization, and Data Science10.1007/978-3-031-25891-6_25(326-340)Online publication date: 10-Mar-2023
  • (2022)Detecting Cash-out Users via Dense SubgraphsProceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3534678.3539252(687-697)Online publication date: 14-Aug-2022
  • (2022)User Behavior Pre-training for Online Fraud DetectionProceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3534678.3539126(3357-3365)Online publication date: 14-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
July 2017
698 pages
ISBN:9781450349932
DOI:10.1145/3110025
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bayesian optimization
  2. Markov Random Field
  3. graph mining
  4. semi-supervised learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ASONAM '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)5
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Tree-Based Credit Card Fraud Detection Using Isolation Forest, Spectral Residual, and Knowledge GraphMachine Learning, Optimization, and Data Science10.1007/978-3-031-25891-6_25(326-340)Online publication date: 10-Mar-2023
  • (2022)Detecting Cash-out Users via Dense SubgraphsProceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3534678.3539252(687-697)Online publication date: 14-Aug-2022
  • (2022)User Behavior Pre-training for Online Fraud DetectionProceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3534678.3539126(3357-3365)Online publication date: 14-Aug-2022
  • (2021)Abnormal Detection of Cash-Out Groups in IoT Based PaymentSensors10.3390/s2122750721:22(7507)Online publication date: 12-Nov-2021
  • (2021)A Novel Maximum Mean Discrepancy-Based Semi-Supervised Learning AlgorithmMathematics10.3390/math1001003910:1(39)Online publication date: 23-Dec-2021
  • (2020)Detecting problematic transactions in a consumer-to-consumer e-commerce networkApplied Network Science10.1007/s41109-020-00330-x5:1Online publication date: 16-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media