largeapp / FD

Fraud detection paper list

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Fraud Detection

Papers and resources about data mining and machine learning for fraud detection in some areas, such as online advertising(e.g. click fraud) and social media(e.g. fake fans).

Contributed by Jinlong Hu, Yi Zhuang, Lang Chen and Tenghui Li.

Table of Contents
  1. Survey
  2. Deep learning
  3. Graph algorithms
  4. Other algorithms
  5. Application-1: Online advertising
  6. Application-2: Social media
  7. Application-others: Anomaly-detection, Credit-card-fraud
  8. Related resources

Survey

  1. Data analysis techniques for fraud detection

  2. A Comprehensive Survey of Data Mining-based Fraud Detection Research

    • Clifton Phua, Vincent Lee, Kate Smith, Ross Gayler 2010.
    • paper
  3. Intelligent financial fraud detection: A comprehensive review

    • Jarrod West, Maumita Bhattacharya 2016.
    • paper
  4. Fraud detection system: A survey

    • Aisha Abdallah, et al. 2016.
    • paper
  5. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature

    • E.W.T.Nga, et al. 2011.
    • paper
  6. Survey of Clustering based Financial Fraud Detection Research

    • Andrei Sorin SABAU 2012.
    • paper

Deep learning

  1. Detecting Fraudulent Behavior Using Recurrent Neural Networks

    • Yoshihiro Ando et al. Computer Security Symposium 2016.
    • Paper
  2. Session-Based Fraud Detection in Online E-Commerce Transactions Using Recurrent Neural Networks

  3. AnoGen: Deep Anomaly Generator

    • Nikolay Laptev 2018.
  4. Generative adversarial network based telecom fraud detection at the receiving bank

    • Yu-Jun Zheng, Xiao-Han Zhou, etc. Neural Networks, 2018.
  5. Distributed Deep Forest and its Application to Automatic Detection of Cash-out Fraud

    • Ya-Lin Zhang, Jun Zhou, Wenhao Zheng, Ji Feng, Longfei Li, Ziqi Liu, Ming Li, Zhiqiang Zhang, Chaochao Chen, Xiaolong Li, Zhi-Hua Zhou 2018.
    • paper
    • 周志华团队和蚂蚁金服合作:用分布式深度森林算法检测套现欺诈 中文介绍

Graph algorithms

(1) Survey

  1. Graph-based Anomaly Detection and Description: A Survey

    • Leman Akoglu, Hanghang Tong, Danai Koutra 2014.
  2. Anomaly Detection in Dynamic Networks: A Survey

    • Stephen Ranshous, Shitian Shen, Danai Koutra, etc. 2014.
  3. A Survey on Social Media Anomaly Detection

    • Rose Yu, Huida Qiu, Zhen Wen, etc. 2016.
  4. A Survey on Different Graph Based Anomaly Detection Techniques

    • Debajit Sensarma, Samar Sen Sarma 2015.
  5. A survey of data mining and social network analysis based anomaly detection techniques

    • Ravneet Kaur , Sarbjeet Singh 2015.
  6. Modeling Data With Networks + Network Embedding: Problems, Methodologies and Frontiers

    • Instructors: Ivan Brugere (University of Illinois at Chicago), Bryan Perozzi (Google), Peng Cui (Tsinghua University), Wenwu Zhu (Tsinghua University), Jian Pei (Simon Fraser University), Tanya Berger-Wolf (University of Illinois at Chicago)
    • KDD 2018 Tutorial
    • ppt
  7. A Comprehensive Survey on Graph Neural Networks

  8. Graph Neural Networks: A Review of Methods and Applications

    • Jie Zhou, Ganqu Cui, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, Maosong Sun 2018
    • paper
    • 中文解读
  9. Deep Learning on Graphs: A Survey

  10. More graph neural networks (GNN) papers, see GNN-paper-list

(2) Network Embedding

  1. FraudNE: a Joint Embedding Approach for Fraud Detection

    • Mengyu Zheng, Chuan Zhou, Jia Wu, etc. 2018.
  2. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks

    • Wenchao Yu, et al. KDD 2018.
    • paper
    • 网络嵌入:随机游走+自编码器;动态:蓄水池;异常检测:密度聚类,假设初始网络正常
    • discussed in lab meeting (L Chen).
  3. Inductive Representation Learning on Large Graphs.

    • William L. Hamilton, Rex Ying, Jure Leskovec. NIPS 2017.
    • paper
    • code
    • discussed in lab meeting (TH Li).
  4. Deeper Insights into Graph Convolutional Networks for Semi-Supervised Learning

    • Qimai Li, Zhichao Han, and Xiao-Ming Wu 2018.
    • paper
    • discussed in lab meeting (TH Li).
  5. Learning Structural Node Embeddings via Diffusion Wavelets.

  6. Embedding Learning with Events in Heterogeneous Information Networks

    • Huan Gui ; Jialu Liu ; Fangbo Tao ; Meng Jiang ; Brandon Norick ; Lance Kaplan ; Jiawei Han 2017.
    • paper
    • 中文解读
    • 异质信息网络,超图,超边:事件
  7. Graph Embedding Techniques, Applications, and Performance: A Survey

    • paper
    • GEM: A Python package for graph embedding methods
    • code
    • 实现了多种静态图嵌入方法
  8. DynamicGEM: A Library for Dynamic Graph Embedding Methods

    • Goyal, P., Chhetri, S. R., Mehrabi, N., Ferrara, E., & Canedo, A. 2018.
    • paper
    • code
    • 实现了多种动态图嵌入方法
  9. More network embedding papers, see NE-paper-list

(3) Dynamic Algorithms

  1. Fraud Detection using Graph Topology and Temporal Spikes

    • Shenghua Liu, Bryan Hooi, Christos Faloutsos
  2. GOTCHA! Network-based Fraud Detection for Social Security Fraud

    • Veronique Van Vlasselaer, etc. 2014.
  3. Realtime Constrained Cycle Detection in Large Dynamic Graphs

    • Xiafei Qiu, Wubin Cen, Zhengping Qian, etc. 2018.
    • Alibaba
  4. An Ensemble Approach for Event Detection and Characterization in Dynamic Graphs

    • Shebuti Rayana, Leman Akoglu 2014.
  5. Detecting node propensity changes in the dynamic degree correctedstochastic block model

    • Lisha Yu, William H. Woodall, Kwok-Leung Tsuia 2018.
  6. DGRMiner: Anomaly Detection and Explanation in Dynamic Graphs

    • Karel Vaculik and Lubos Popellınsky 2016.
  7. Localizing Temporal Anomalies in Large Evolving Graphs

    • Teng Wang, etc.
  8. Triaging Anomalies in Dynamic Graphs: Towards Reducing False Positives

    • Teng Wang, et al. 2015.
  9. Fraud Detection in Dynamic Interaction Network

    • Hao Lin, et al. 2019.

(4) Others Graph Algorithms

  1. Behavior Language Processing with Graph based Feature Generation for Fraud Detection in Online Lending

    • Wei Min, etc. 2018.
  2. FairPlay: Fraud and Malware Detection in Google Play

    • Mahmudur Rahman, etc.
  3. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage

    • Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, Christos Faloutsos 2016.
  4. Heterogeneous anomaly detection in social diffusion with discriminative feature discovery

    • Siyuan Liu, etc. Information Sciences 2018.
  5. REV2: Fraudulent User Prediction in Rating Platforms

    • Srijan Kumar, etc. 2018.
  6. Stateless Puzzles for Real Time Online Fraud Preemption

    • Mizanur Rahman, etc. 2017.
  7. iBGP: A Bipartite Graph Propagation Approach for Mobile Advertising Fraud Detection

    • Jinlong Hu, Junjie Liang, and Shoubin Dong. Mobile Information Systems 2017.
    • Paper

Other algorithms

  1. Online E-Commerce Fraud: A Large-scale Detection and Analysis

    • Haiqin Weng, Zhao Li, Shouling Ji, etc.
    • paper
    • Alibaba
  2. Next Generation Trustworthy Fraud Detection

    • Sihong Xie, Philip S. Yuy 2018.
  3. Incorporating Privileged Information to Unsupervised Anomaly Detection

    • Shubhranshu Shekhar, Leman Akoglu 2018.
  4. Feedback-Guided Anomaly Discovery via Online Optimization

    • Md Amran Siddiqui,Alan Fern,Thomas G. Dietterich, etc. 2018.
    • "active learning"
  5. Unorganized Malicious Attacks Detection

    • Ming Pang, Wei Gao, Min Tao, Zhi-Hua Zhou 2018.
    • Paper
    • "shilling attacks"
  6. Fraud detection with machine learning project with some new papers

Advertising

Bluff Ads

  1. Fighting Online Click-Fraud Using Bluff Ads by Hamed Haddadi. ACM Computer Communication Review 2010.
  2. Measuring and Fingerprinting Click-Spam in Ad Networks by Vacha Dave et al. ACM SIGCOMM Conference on Data Communication 2012.

Mobile Apps

  1. DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps by Bin Liu et al. Proc. 11th USENIX Conf. Netw. Syst. Des. Implementation 2014.
  2. MAdFraud: Investigating Ad Fraud in Android Applications by Jonathan Crussell et al. Proc. 12th International Conference on Mobile Systems Applications and Services (MobiSys'14) 2014.

Duplicate Detection

Association Rule

FDMA 2012 Competition

  1. Detecting Click Fraud in Online Advertising: A Data Mining Approach by Richard Oentaryo et al. JMLR 2014.
  2. Feature Engineering for Click Fraud Detection by Clifton Phua et al. International Workshop on Fraud Detection in Mobile Advertising (FDMA) 2012.
  3. A Novel Approach Based on Ensemble Learning for Fraud Detection in Mobile Advertising by Kasun S. Perera et al. International Workshop on Fraud Detection in Mobile Advertising (FDMA) 2012.
  4. Hybrid Models for Click Fraud Detection in Mobile Advertising by Chen Wei et al. International Workshop on Fraud Detection in Mobile Advertising (FDMA) 2012.
  5. Random Forests for the Detection of Click Fraud in Online Mobile Advertising by Daniel Berrar et al. International Workshop on Fraud Detection in Mobile Advertising (FDMA) 2012.
  6. Hierarchical Committee Machines for Fraud Detection in Mobile Advertising by S. Shivashankar et al. International Workshop on Fraud Detection in Mobile Advertising (FDMA) 2012.

Dateset

Report and White Paper

  1. The Lane’s Gifts v. Google Report by Alexander Tuzhilin. 2006.
  2. Click Fraud Detection: Adversarial Pattern Recognition over 5 Years at Microsoft by Brendan Kitts et al. Real World Data Mining Applications 2015.
  3. 2017广告反欺诈白皮书 by 腾讯灯塔, 秒针, AdMaster. 2017.
  4. The State of Mobile Fraud Q1 2018 by Appsflyer. 2018.

Social Media

Fake fans and zombie fans

  1. Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs

    • Boshmaf, Yazan, et al. Computers & Security 2016.
  2. Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks

    • Jing Deng, et al. 2016.
  3. Micro-blog spammer detection based on characteristics of social behaviors

    • Jianbo Wang, et al. 2017.
  4. Discrimination of zombie fans on weibo based on features extraction and business-driven analysis

    • Hongxun Jiang, et al. 2015.
  5. 一种降低微博僵尸粉影响的方法

    • 现代图书情报技术,2012.
  6. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage

    • Bryan Hooi et al. KDD 2016.
    • paper
  7. Distance-based customer detection in fake follower markets

    • Jang, Boyeon, Sihyun Jeong, and Chong-kwon Kim 2018.
    • paper
    • data

Social media rumors

  1. 中文社交媒体谣言统计语义分析
    • 刘知远,et al. 2015.
    • CED: Credible Early Detection of Social Media Rumors, 2018. new paper
    • 数据

Other Applications

Anomaly Detection

  • Survey
  1. Anomaly Detection: A Survey by Varun Chandola et al. ACM Computing Surveys, Vol. 41, No. 3, 15, 01.07.2009.
  • Open Source Toolkit
  1. Scikit-learn Novelty and Outlier Detection
  2. Python Outlier Detection (PyOD)
  3. ELKI: Environment for Developing KDD-Applications Supported by Index-Structures

Credit Card Fraud

  1. Credit Card Fraud Detection in e-Commerce: An Outlier Detection Approach

  2. Learned lessons in credit card fraud detection from a practitioner perspective by A Dal Pozzolo et al. Expert Systems with Applications, 41(10):4915–4928, 2014.

  3. APATE: A Novel Approach for Automated Credit Card Transaction Fraud Detection using Network-Based Extensions by Veronique Van Vlasselaer et al. Decision Support Systems, 2015.

Related Resources

Report and White Paper

  • Facebook Immune System by Tao Stein et al. Proceedings of the 4th Workshop on Social Network Systems, SNS, 2011.

Reference links

About

Fraud detection paper list