Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3459637.3482277acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Modeling Heterogeneous Graph Network on Fraud Detection: A Community-based Framework with Attention Mechanism

Published: 30 October 2021 Publication History

Abstract

Fraud activities in e-commerce, such as spam reviews and fake shopping behaviors, significantly mislead customers' decision making, damage the platforms' reputation, and reduce enterprises' revenue. In recent years, GNN-based models have been widely adopted in fraud detection tasks, which have shown better performance compared to conventional rule-based methods and feature-based models. Most GNN-based models focus on homogeneous graphs, usually including user-to-user, or item-to-item connections. These types of graphs have limitations of eliminating certain types of connections, such as user-item connections. In addition, GNN-based models aggregate neighborhood information based on the assumption that neighbors share the similar structure and content. However, in fraud detection tasks, two major inconsistency issues arise: Severe mixture of structure-inconsistency due to extremely unbalanced positive and negative samples; and mixture of content-inconsistency due to the difference between various item categories. To address the above issues, we propose a Community-based Framework with ATtention mechanism for large-scale Heterogeneous graphs (C-FATH). In order to utilize the entire heterogeneous graph, we directly model on the heterogeneous graph and combine it with homogeneous graphs. The structure-inconsistent nodes are filtered by introducing the community information when constructing neighbors. Content-inconsistent nodes are selected with lower probability by a similarity-based sampling strategy. Further, the model is trained in a multi-task manner that each node type (e.g. user, item, device, order, and review) is associated with a specific loss function. Comprehensive experiments are conducted on two public review datasets and two large-scale datasets from JD.com, and the experimental results demonstrate the effectiveness and scalability of the proposed C-FATH compared to the state-of-the-art approaches.

Supplementary Material

MP4 File (rgfp0073_video.mp4)
In fraud detection tasks, two major inconsistency issues arise: Severe mixture of structure-inconsistency due to extremely unbalanced positive and negative samples; and mixture of content-inconsistency due to the difference between various item categories. To address these issues, we proposed a Community-based Framework with ATtention mechanism for large-scale Heterogeneous graphs (C-FATH), which directly model on the heterogeneous graph and combine it with homogeneous graphs. Comprehensive experiments are conducted on two public review datasets and two large-scale datasets from JD.com, and the experimental results demonstrate the effectiveness and scalability of the proposed C-FATH compared to the state-of-the-art approaches.

References

[1]
Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2014. Spectral networks and deep locally connected networks on graphs. In ICLR.
[2]
Hao Chen, Lu Wang, Senzhang Wang, Dijun Luo, Wenbing Huang, and Zhoujun Li. 2019. Label Aware Graph Convolutional Network--Not All Edges Deserve Your Attention. arXiv preprint arXiv:1907.04707 (2019).
[3]
Wei-Lin Chiang, Xuanqing Liu, Si Si, Yang Li, Samy Bengio, and Cho-Jui Hsieh. 2019. Cluster-gcn: An efficient algorithm for training deep and large graph convolutional networks. In KDD. 257--266.
[4]
Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative embeddings of latent variable models for structured data. In ICML. PMLR, 2702--2711.
[5]
Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NIPS. 3844--3852.
[6]
Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In CIKM. 315--324.
[7]
David Duvenaud, Dougal Maclaurin, Jorge Aguilera-Iparraguirre, Rafael Gómez-Bombarelli, Timothy Hirzel, Alán Aspuru-Guzik, and Ryan P Adams. 2015. Convolutional networks on graphs for learning molecular fingerprints. In NIPS. 2224--2232.
[8]
Christos Giatsidis, Dimitrios M Thilikos, and Michalis Vazirgiannis. 2011. Evaluating cooperation in communities with the k-core structure. In ASONAM. 87--93.
[9]
Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. PNAS, Vol. 99, 12 (2002), 7821--7826.
[10]
Marco Gori, Gabriele Monfardini, and Franco Scarselli. 2005. A new model for learning in graph domains. In IJCNN, Vol. 2. IEEE, 729--734.
[11]
Steve Gregory. 2010. Finding overlapping communities in networks by label propagation. New journal of Physics, Vol. 12, 10 (2010), 103018.
[12]
Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034.
[13]
Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. Fraudar: Bounding graph fraud in the face of camouflage. In KDD. 895--904.
[14]
Yifan Hou, Jian Zhang, James Cheng, Kaili Ma, Richard TB Ma, Hongzhi Chen, and Ming-Chang Yang. 2019. Measuring and improving the use of graph information in graph neural networks. In ICLR.
[15]
Ziniu Hu, Yuxiao Dong, Kuansan Wang, and Yizhou Sun. 2020. Heterogeneous graph transformer. In WWW. 2704--2710.
[16]
Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2014. Inferring strange behavior from connectivity pattern in social networks. In PAKDD. Springer, 126--138.
[17]
George Karypis and Vipin Kumar. 1995. METIS--unstructured graph partitioning and sparse matrix ordering system, version 2.0. (1995).
[18]
George Karypis and Vipin Kumar. 1998. A fast and high quality multilevel scheme for partitioning irregular graphs. SISC, Vol. 20, 1 (1998), 359--392.
[19]
Alex Kendall, Yarin Gal, and Roberto Cipolla. 2018. Multi-task learning using uncertainty to weigh losses for scene geometry and semantics. In CVPR. 7482--7491.
[20]
Thomas N Kipf and Max Welling. 2016a. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016).
[21]
Thomas N Kipf and Max Welling. 2016b. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016).
[22]
Ao Li, Zhou Qin, Runshi Liu, Yiqun Yang, and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM. 2703--2711.
[23]
Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. 2015. Gated graph sequence neural networks. arXiv preprint arXiv:1511.05493 (2015).
[24]
Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2017. Holoscope: Topology-and-spike aware fraud detection. In CIKM. 1539--1548.
[25]
Ziqi Liu, Chaochao Chen, Longfei Li, Jun Zhou, Xiaolong Li, Le Song, and Yuan Qi. 2019. Geniepath: Graph neural networks with adaptive receptive paths. In AAAI, Vol. 33. 4424--4431.
[26]
Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, and Le Song. 2018. Heterogeneous graph neural networks for malicious account detection. In CIKM. 2077--2085.
[27]
Zhiwei Liu, Yingtong Dou, Philip S. Yu, Yutong Deng, and Hao Peng. 2020. Alleviating the inconsistency problem of applying graph neural network to fraud detection. In SIGIR. 1569--1572.
[28]
Bingqing Lyu, Lu Qin, Xuemin Lin, Ying Zhang, Zhengping Qian, and Jingren Zhou. 2020. Maximum Biclique Search at Billion Scale. VLDB, Vol. 13, 9 (2020), 1359--1372.
[29]
Mehdi Ebady Manaa and Ghufran Abdulameer. 2018. Web documents similarity using k-shingle tokens and minhash technique. J. Eng. Appl. Sci, Vol. 13 (2018), 1499--1505.
[30]
Mark EJ Newman. 2006. Modularity and community structure in networks. PNAS USA, Vol. 103, 23 (2006), 8577--8582.
[31]
Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community structure in networks. Physical review E, Vol. 69, 2 (2004), 026113.
[32]
Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In ICML. PMLR, 2014--2023.
[33]
B Aditya Prakash, Ashwin Sridharan, Mukund Seshadri, Sridhar Machiraju, and Christos Faloutsos. 2010. Eigenspokes: Surprising patterns and scalable community chipping in large graphs. In PAKDD. Springer, 435--448.
[34]
Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E, Vol. 76, 3 (2007), 036106.
[35]
Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In KDD. 985--994.
[36]
Shebuti Rayana and Leman Akoglu. 2016. Collective opinion spam detection using active inference. In SDM. SIAM, 630--638.
[37]
Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini. 2008. The graph neural network model. IEEE transactions on neural networks, Vol. 20, 1 (2008), 61--80.
[38]
Kijung Shin, Bryan Hooi, and Christos Faloutsos. 2016. M-zoom: Fast dense-block detection in tensors with quality guarantees. In ECML PKDD. Springer, 264--280.
[39]
Charalampos Tsourakakis. 2015. The k-clique densest subgraph problem. In WWW. 1122--1132.
[40]
Petar Velivc ković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR.
[41]
Daixin Wang, Jianbin Lin, Peng Cui, Quanhui Jia, Zhen Wang, Yanming Fang, Quan Yu, Jun Zhou, Shuang Yang, and Yuan Qi. 2019a. A semi-supervised graph attentive network for financial fraud detection. In ICDM. IEEE, 598--607.
[42]
Jianyu Wang, Rui Wen, Chunming Wu, Yu Huang, and Jian Xion. 2019b. Fdgars: Fraudster detection via graph convolutional networks in online app review system. In WWW. 310--316.
[43]
Ting Wang, Xu Qian, and Xiaomeng Wang. 2015. HLPA: A hybrid label propagation algorithm to find communities in large-scale networks. In iCAST. 135--140.
[44]
Rui Wen, Jianyu Wang, Chunming Wu, and Jian Xiong. 2020. Asa: Adversary situation awareness via heterogeneous graph convolutional networks. In WWW. 674--678.
[45]
Jierui Xie and Boleslaw K Szymanski. 2011. Community detection using a neighborhood strength driven label propagation algorithm. In NSW. IEEE, 188--195.
[46]
Jierui Xie and Boleslaw K Szymanski. 2012. Towards linear time overlapping community detection in social networks. In PAKDD. Springer, 25--36.
[47]
Jierui Xie, Boleslaw K Szymanski, and Xiaoming Liu. 2011. Slpa: Uncovering overlapping communities in social networks via a speaker-listener interaction dynamic process. In ICDM. IEEE, 344--349.
[48]
Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR. 689--698.
[49]
Yun Zhang, Elissa J Chesler, and Michael A Langston. 2008. On Finding bicliques in bipartite graphs: a novel algorithm with application to the integration of diverse biological data types. In HICSS. IEEE Computer Society, 473--473.
[50]
Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, and Chuan Shi. 2019. Key player identification in underground forums over attributed heterogeneous information network embedding framework. In CIKM. 549--558.

Cited By

View all
  • (2024)Unsupervised Heterogeneous Graph Rewriting Attack via Node ClusteringProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671716(3057-3068)Online publication date: 25-Aug-2024
  • (2023)Research on Fraud Detection Method Based on Heterogeneous Graph Representation LearningElectronics10.3390/electronics1214307012:14(3070)Online publication date: 14-Jul-2023
  • (2023)Beyond homophilyProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/234(2104-2113)Online publication date: 19-Aug-2023
  • Show More Cited By

Index Terms

  1. Modeling Heterogeneous Graph Network on Fraud Detection: A Community-based Framework with Attention Mechanism

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '21: Proceedings of the 30th ACM International Conference on Information & Knowledge Management
      October 2021
      4966 pages
      ISBN:9781450384469
      DOI:10.1145/3459637
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. community detection
      2. fraud detection
      3. heterogeneous graph
      4. neural networks

      Qualifiers

      • Research-article

      Conference

      CIKM '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)170
      • Downloads (Last 6 weeks)23
      Reflects downloads up to 22 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Unsupervised Heterogeneous Graph Rewriting Attack via Node ClusteringProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671716(3057-3068)Online publication date: 25-Aug-2024
      • (2023)Research on Fraud Detection Method Based on Heterogeneous Graph Representation LearningElectronics10.3390/electronics1214307012:14(3070)Online publication date: 14-Jul-2023
      • (2023)Beyond homophilyProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/234(2104-2113)Online publication date: 19-Aug-2023
      • (2023)Knowledge-inspired Subdomain Adaptation for Cross-Domain Knowledge TransferProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614946(234-244)Online publication date: 21-Oct-2023
      • (2023)Removing Camouflage and Revealing Collusion: Leveraging Gang-crime Pattern in Fraudster DetectionProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599895(5104-5115)Online publication date: 6-Aug-2023
      • (2023)Homophily-oriented Heterogeneous Graph RewiringProceedings of the ACM Web Conference 202310.1145/3543507.3583454(511-522)Online publication date: 30-Apr-2023
      • (2023)Detecting Malicious Accounts in Online Developer Communities Using Deep LearningIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.323783835:10(10633-10649)Online publication date: 1-Oct-2023
      • (2023)Temporal burstiness and collaborative camouflage aware fraud detectionInformation Processing and Management: an International Journal10.1016/j.ipm.2022.10317060:2Online publication date: 1-Mar-2023
      • (2023)AHEAD: A Triple Attention Based Heterogeneous Graph Anomaly Detection ApproachProceedings of 2023 Chinese Intelligent Automation Conference10.1007/978-981-99-6187-0_53(542-552)Online publication date: 23-Sep-2023
      • (2023)Anti-Money Laundering in Cryptocurrency via Multi-Relational Graph Neural NetworkAdvances in Knowledge Discovery and Data Mining10.1007/978-3-031-33377-4_10(118-130)Online publication date: 25-May-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media