- Network Science
- Natural Language Processing
- Data Mining
- Artificial Intelligence
Similar collections about graph embedding, classification/regression tree, gradient boosting and community detection papers with implementations.
-
Reinforcement Mechanism Design for Fraudulent Behaviour in e-Commerce (AAAI 2018)
- Qingpeng Cai, Aris Filos-Ratsikas, Pingzhong Tang, Yiwei Zhang
- [Paper]
-
Nextgen AML: Distributed Deep Learning Based Language Technologies to Augment Anti Money Laundering Investigation(ACL 2018)
- Jingguang Han, Utsab Barman, Jeremiah Hayes, Jinhua Du, Edward Burgin, Dadong Wan
- [Paper]
-
Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (CIKM 2018)
- Daniel Deutch, Yehonatan Ginzberg, Tova Milo
- [Paper]
-
Deep Structure Learning for Fraud Detection (ICDM 2018)
- Haibo Wang, Chuan Zhou, Jia Wu, Weizhen Dang, Xingquan Zhu, Jilong Wang
- [Paper]
-
Learning Sequential Behavior Representations for Fraud Detection (ICDM 2018)
- Jia Guo, Guannan Liu, Yuan Zuo, Junjie Wu
- [Paper]
-
Impression Allocation for Combating Fraud in E-commerce Via Deep Reinforcement Learning with Action Norm Penalty (IJCAI 2018)
- Mengchen Zhao, Zhao Li, Bo An, Haifeng Lu, Yifan Yang, Chen Chu
- [Paper]
-
Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (KDD 2018)
- Daniel de Roux, Boris Perez, Andrés Moreno, María-Del-Pilar Villamil, César Figueroa
- [Paper]
-
Collective Fraud Detection Capturing Inter-Transaction Dependency (KDD 2018)
- Bokai Cao, Mia Mao, Siim Viidu, Philip Yu
- [Paper]
-
Fraud Detection with Density Estimation Trees (KDD 2018)
- Fraud Detection with Density Estimation Trees
- [Paper]
-
REV2: Fraudulent User Prediction in Rating Platforms (WSDM 2018)
- Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, V. S. Subrahmanian
- [Paper]
-
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers (WWW 2018)
- Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad
- [Paper]
-
Behavioral Analysis of Review Fraud: Linking Malicious Crowdsourcing to Amazon and Beyond (AAAI 2017)
- Parisa Kaghazgaran, James Caverlee, Majid Alfifi
- [Paper]
-
Detection of Money Laundering Groups: Supervised Learning on Small Networks (AAAI 2017)
- David Savage, Qingmai Wang, Xiuzhen Zhang, Pauline Chou, Xinghuo Yu
- [Paper]
-
Spectrum-based Deep Neural Networks for Fraud Detection (CIKM 2017)
- Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
- [Paper]
-
HoloScope: Topology-and-Spike Aware Fraud Detection (CIKM 2017)
- Shenghua Liu, Bryan Hooi, Christos Faloutsos
- [Paper]
-
The Many Faces of Link Fraud (ICDM 2017)
- Neil Shah, Hemank Lamba, Alex Beutel, Christos Faloutsos
- [Paper]
-
HitFraud: A Broad Learning Approach for Collective Fraud Detection in Heterogeneous Information Networks (ICDM 2017)
- Bokai Cao, Mia Mao, Siim Viidu, Philip S. Yu
- [Paper]
-
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs (ICDM 2017)
- Binghui Wang, Neil Zhenqiang Gong, Hao Fu
- [Paper]
-
Online Reputation Fraud Campaign Detection in User Ratings (IJCAI 2017)
- Chang Xu, Jie Zhang, Zhu Sun
- [Paper]
-
Uncovering Unknown Unknowns in Financial Services Big Data by Unsupervised Methodologies: Present and Future trends (KDD 2017)
- Gil Shabat, David Segev, Amir Averbuch
- [Paper]
-
PD-FDS: Purchase Density based Online Credit Card Fraud Detection System (KDD 2017)
- Youngjoon Ki, Ji Won Yoon
- [Paper]
-
HiDDen: Hierarchical Dense Subgraph Detection with Application to Financial Fraud Detection (SDM 2017)
- Si Zhang, Dawei Zhou, Mehmet Yigit Yildirim, Scott Alcorn, Jingrui He, Hasan Davulcu, Hanghang Tong
- [Paper]
-
A Fraud Resilient Medical Insurance Claim System (AAAI 2016)
- Yuliang Shi, Chenfei Sun, Qingzhong Li, Lizhen Cui, Han Yu, Chunyan Miao
- [Paper]
-
FRAUDAR: Bounding Graph Fraud in the Face of Camouflage (KDD 2016)
- Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, Christos Faloutsos
- [Paper]
-
Identifying anomalies in graph streams using change detection (KDD 2016)
- William Eberle and Lawrence Holde
- [Paper]
-
FairPlay: Fraud and Malware Detection in Google Play (SDM 2016)
- Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, Duen Horng Chau
- [Paper]
-
BIRDNEST: Bayesian Inference for Ratings-Fraud Detection (SDM 2016)
- Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, Christos Faloutsos
- [Paper]
-
Understanding the Detection of View Fraud in Video Content Portals (WWW 2016)
- Miriam Marciel, Rubén Cuevas, Albert Banchs, Roberto Gonzalez, Stefano Traverso, Mohamed Ahmed, Arturo Azcorra
- [Paper]
-
Toward An Intelligent Agent for Fraud Detection—The CFE Agent (AAAI 2015)
- Joe Johnson
- [Paper]
-
Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data (AAAI 2015)
- Juan Liu, Eric Bier, Aaron Wilson, Tomonori Honda, Kumar Sricharan, Leilani Gilpin, John Alexis Guerra Gómez, Daniel Davies
- [Paper]
-
Robust System for Identifying Procurement Fraud (AAAI 2015)
- Amit Dhurandhar, Rajesh Kumar Ravi, Bruce Graves, Gopikrishnan Maniachari, Markus Ettl
- [Paper]
-
Fraud Transaction Recognition: A Money Flow Network Approach (CIKM 2015)
- Renxin Mao, Zhao Li, Jinhua Fu
- [Paper]
-
Towards Collusive Fraud Detection in Online Reviews (ICDM 2015)
- Chang Xu, Jie Zhang
- [Paper]
-
Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation (IJCAI 2015)
- Yongfeng Zhang, Yunzhi Tan, Min Zhang, Yiqun Liu, Tat-Seng Chua, Shaoping Ma
- [Paper]
-
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (KDD 2015)
- Alex Beutel, Leman Akoglu, Christos Faloutsos
- [Paper]
-
FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (KDD 2015)
- Vincent S. Tseng, Jia-Ching Ying, Che-Wei Huang, Yimin Kao, Kuan-Ta Chen
- [Paper]
-
A Framework for intrusion detection based on frequent subgraph mining (SDM 2015)
- Vitali Herrera-Semenets, Niusvel Acosta-Mendoza, Andres Gago-Alonso
- [Paper]
-
Crowd Fraud Detection in Internet Advertising (WWW 2015)
- Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, Tong Zhang
- [Paper]
-
Fraudulent Support Telephone Number Identification Based on Co-Occurrence Information on the Web (AAAI 2014)
- Xin Li, Yiqun Liu, Min Zhang, Shaoping Ma
- [Paper]
-
Corporate residence fraud detection (KDD 2014)
- Enric Junqué de Fortuny, Marija Stankova, Julie Moeyersoms, Bart Minnaert, Foster J. Provost, David Martens
- [Paper]
-
Graphical Models for Identifying Fraud and Waste in Healthcare Claims (SDM 2014)
- Peder A. Olsen, Ramesh Natarajan, Sholom M. Weiss
- [Paper]
-
Improving Credit Card Fraud Detection with Calibrated Probabilities (SDM 2014)
- Alejandro Correa Bahnsen, Aleksandar Stojanovic, Djamila Aouada, Björn E. Ottersten
- [Paper]
-
Large graph mining: patterns, cascades, fraud detection, and algorithms (WWW 2014)
- Christos Faloutsos
- [Paper]
-
Opinion fraud detection in online reviews by network effects (AAAI 2013)
- Leman Akoglu, Rishi Chandy, Christos Faloutsos
- [Paper]
-
Using social network knowledge for detecting spider constructions in social security fraud (ASONAM 2013)
- Véronique Van Vlasselaer, Jan Meskens, Dries Van Dromme, Bart Baesens
- [Paper]
-
Ranking fraud detection for mobile apps: a holistic view (CIKM 2013)
- Hengshu Zhu, Hui Xiong, Yong Ge, Enhong Chen
- [Paper]
-
Using co-visitation networks for detecting large scale online display advertising exchange fraud (KDD 2013)
- Ori Stitelman, Claudia Perlich, Brian Dalessandro, Rod Hook, Troy Raeder, Foster J. Provost
- [Paper]
-
Adaptive adversaries: building systems to fight fraud and cyber intruders (KDD 2013)
- Ari Gesher
- [Paper]
-
Anomaly, event, and fraud detection in large network datasets (WSDM 2013)
- Leman Akoglu, Christos Faloutsos
- [Paper]
-
Fraud detection: Methods of analysis for hypergraph data (ASONAM 2012)
- Anna Leontjeva, Konstantin Tretyakov, Jaak Vilo, and Taavi Tamkivi
- [Paper]
-
Online modeling of proactive moderation system for auction fraud detection (WWW 2012)
- Liang Zhang, Jie Yang, Belle L. Tseng
- [Paper]
-
A machine-learned proactive moderation system for auction fraud detection (CIKM 2011)
- Liang Zhang, Jie Yang, Wei Chu, Belle L. Tseng
- [Paper]
-
A Taxi Driving Fraud Detection System (ICDM 2011)
- Yong Ge, Hui Xiong, Chuanren Liu, Zhi-Hua Zhou
- [Paper]
-
Utility-Based Fraud Detection (IJCAI 2011)
- Luís Torgo, Elsa Lopes
- [Paper]
-
A pattern discovery approach to retail fraud detection (KDD 2011)
- Prasad Gabbur, Sharath Pankanti, Quanfu Fan, Hoang Trinh
- [Paper]
-
Hunting for the black swan: risk mining from text (ACL 2010)
- JL Leidner, F Schilder
- [Paper]
-
Fraud detection by generating positive samples for classification from unlabeled data (ACL 2010)
- Levente Kocsis, Andras George
- [Paper]
-
SVM-based credit card fraud detection with reject cost and class-dependent error cost (PAKDD 2009)
- En-hui Zheng,Chao Zou,Jian Sun, Le Chen
- [Paper]
-
An Approach for Automatic Fraud Detection in the Insurance Domain (AAAI 2009)
- Alexander Widder, Rainer v. Ammon, Gerit Hagemann, Dirk Schönfeld
- [Paper]
-
Relational data pre-processing techniques for improved securities fraud detection (KDD 2007)
- Andrew S. Fast, Lisa Friedland, Marc E. Maier, Brian J. Taylor, David D. Jensen, Henry G. Goldberg, John Komoroske
- [Paper]
-
Uncovering Fraud in Direct Marketing Data with a Fraud Auditing Case Builder (PKDD 2007)
- Fletcher Lu
- [Paper]
-
Netprobe: a fast and scalable system for fraud detection in online auction networks (WWW 2007)
- Shashank Pandit, Duen Horng Chau, Samuel Wang, Christos Faloutsos
- [Paper]
-
Data mining approaches to criminal career analysis (ICDM 2006)
- Jeroen S. De Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros, Joost N. Kok
- [Paper]
-
Large Scale Detection of Irregularities in Accounting Data (ICDM 2006)
- Stephen Bay, Krishna Kumaraswamy, Markus G. Anderle, Rohit Kumar, David M. Steier
- [Paper]
-
Camouflaged fraud detection in domains with complex relationships (KDD 2006)
- Sankar Virdhagriswaran, Gordon Dakin
- [Paper]
-
Detecting Fraudulent Personalities in Networks of Online Auctioneers (PKDD 2006)
- Duen Horng Chau, Shashank Pandit, Christos Faloutsos
- [Paper]
-
Technologies to Defeat Fraudulent Schemes Related to Email Requests (AAAI 2005)
- Edoardo Airoldi, Bradley Malin, and Latanya Sweeney
- [Paper]
-
AI Technologies to Defeat Identity Theft Vulnerabilities (AAAI 2005)
- Latanya Sweeney
- [Paper]
-
Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford's Law Distributions (ECML 2005)
- Fletcher Lu, J. Efrim Boritz
- [Paper]
-
Using relational knowledge discovery to prevent securities fraud (KDD 2005)
- Jennifer Neville, Özgür Simsek, David D. Jensen, John Komoroske, Kelly Palmer, Henry G. Goldberg
- [Paper]
- Applying data mining in investigating money laundering crimes (KDD 2003)
- Zhongfei (Mark) Zhang, John J. Salerno, Philip S. Yu
- [Paper]
- Document classification and visualisation to support the investigation of suspected fraud (PKDD 2000)
- Johan Hagman, Domenico Perrotta, Ralf Steinberger, and Aristi de Varfis
- [Paper]
- Statistical challenges to inductive inference in linked data. (AISTATS 1999)
- David Jensen
- [Paper]
-
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (KDD 1998)
- Phillip K Chan, Salvatore J Stolfo
- [Paper]
-
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model (NIPS 1998)
- Jaakko Hollmén, Volker Tresp
- [Paper]
-
Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype (ICANN 1997)
- Yves Moreau, Herman Verrelst, Joos Vandewalle
- [Paper]
-
Prospective Assessment of AI Technologies for Fraud Detection: A Case Study (AAAI 1997)
- David Jensen
- [Paper]
-
Credit card fraud detection using meta-learning: Issues and initial results (AAAI 1997)
- Salvatore J. Stolfo, David W. Fan, Wenke Lee and Andreas L. Prodromidis
- [Paper]
- Fraud: Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures (UAI 1995)
- Kazuo J. Ezawa, Til Schuermann
- [Paper]