Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3397271.3401253acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
short-paper
Public Access

Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection

Published: 25 July 2020 Publication History

Abstract

Graph-based models have been widely used to fraud detection tasks. Owing to the development of Graph Neural Networks~(GNNs), recent works have proposed many GNN-based fraud detectors based on either homogeneous or heterogeneous graphs. These works leverage existing GNNs and aggregate the neighborhood information to learn the node embeddings, which relies on the assumption that the neighbors share similar context, features, and relations. However, the inconsistency problem incurred by fraudsters is hardly investigated, i.e., the context inconsistency, feature inconsistency, and relation inconsistency. In this paper, we introduce these inconsistencies and design a new GNN framework, GraphConsis, to tackle the inconsistency problem: (1) for the context inconsistency, we propose to combine the context embeddings with node features; (2) for the feature inconsistency, we design a consistency score to filter the inconsistent neighbors and generate corresponding sampling probability; (3) for the relation inconsistency, we learn the relation attention weights associated with the sampled nodes. Empirical analysis on four datasets demonstrates that the inconsistency problem is critical in fraud detection tasks. Extensive experiments show the effectiveness of GraphConsis. We also released a GNN-based fraud detection toolbox with implementations of SOTA models. The code is available at \urlhttps://github.com/safe-graph/DGFraud

Supplementary Material

MP4 File (3397271.3401253.mp4)
Owing to the development of Graph Neural Networks (GNNs), recent works have proposed many GNN-based fraud detectors based on either homogeneous or heterogeneous graphs. These works leverage existing GNNs and aggregate the neighborhood information to learn the node embeddings, which relies on the assumption that the neighbors share similar context, features, and relations. However, the inconsistency problem incurred by fraudsters is hardly investigated, i.e., the context inconsistency, feature inconsistency, and relation inconsistency. In this paper, we introduce these inconsistencies and design a new GNN framework, GraphConsis, to tackle the inconsistency problems. We also released a GNN-based fraud detection toolbox with implementations of SOTA models. The code is available at https://github.com/safe-graph/DGFraud.\r\n

References

[1]
Y. Dou, W. Li, Z. Liu, Z. Dong, J. Luo, and P. S. Yu. 2019. Uncovering download fraud activities in mobile app markets. In ASONAM.
[2]
W. Hamilton, Z. Ying, and J. Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS.
[3]
Y. Hou, J. Zhang, J. Cheng, K. Ma, R. T. B. Ma, H. Chen, and M. Yang. 2020. Measuring and Improving the Use of Graph Information in Graph Neural Networks. In ICLR.
[4]
M. Jiang, P. Cui, and C. Faloutsos. 2016. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems (2016).
[5]
P. Kaghazgaran, M. Alfifi, and J. Caverlee. 2019. Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures. In CIKM.
[6]
P. Kaghazgaran, J. Caverlee, and A. Squicciarini. 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In WSDM.
[7]
T.N. Kipf and M. Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.
[8]
A. Li, Z. Qin, R. Liu, Y. Yang, and D. Li. 2019. Spam Review Detection with Graph Convolutional Networks. In CIKM.
[9]
Z. Liu, C. Chen, X. Yang, J. Zhou, X. Li, and L. Song. 2018. Heterogeneous Graph Neural Networks for Malicious Account Detection. In CIKM.
[10]
H. Peng, J. Li, Q. Gong, Y. Song, Y. Ning, K. Lai, and P. S. Yu. 2019. Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks. In IJCAI.
[11]
S. Rayana and L. Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In KDD.
[12]
L. Sun, Y. Dou, C. Yang, J. Wang, P. S. Yu, and B. Li. 2018. Adversarial Attack and Defense on Graph Data: A Survey. arXiv preprint arXiv:1812.10528 (2018).
[13]
P. Velivc ković, G. Cucurull, A. Casanova, A. Romero, P. Lio, and Y. Bengio. 2017. Graph attention networks. In ICLR.
[14]
D. Wang, J. Lin, P. Cui, Q. Jia, Z. Wang, Y. Fang, Q. Yu, J. Zhou, S. Yang, and Y. Qi. 2019 a. A Semi-supervised Graph Attentive Network for Fraud Detection. In ICDM.
[15]
J. Wang, R. Wen, C. Wu, Y. Huang, and J. Xion. 2019 b. FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System. In WWW Workshops.
[16]
Y. Zhang, Y. Fan, Y. Ye, L. Zhao, and C. Shi. 2019. Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework. In CIKM.
[17]
Q. Zhong, Y. Liu, X. Ao, B. Hu, J. Feng, J. Tang, and Q. He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-View Attributed Heterogeneous Information Network. In WWW.

Cited By

View all
  • (2025)A Universal Adaptive Algorithm for Graph Anomaly DetectionInformation Processing & Management10.1016/j.ipm.2024.10390562:1(103905)Online publication date: Jan-2025
  • (2025)Multiplex graph fusion network with reinforcement structure learning for fraud detection in online e-commerce platformsExpert Systems with Applications10.1016/j.eswa.2024.125598262(125598)Online publication date: Mar-2025
  • (2024)Multi-Relational Graph Representation Learning for Financial Statement Fraud DetectionBig Data Mining and Analytics10.26599/BDMA.2024.90200137:3(920-941)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGIR '20: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
July 2020
2548 pages
ISBN:9781450380164
DOI:10.1145/3397271
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 July 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fraud detection
  2. graph neural networks
  3. inconsistency problem

Qualifiers

  • Short-paper

Funding Sources

Conference

SIGIR '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 792 of 3,983 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)746
  • Downloads (Last 6 weeks)80
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2025)A Universal Adaptive Algorithm for Graph Anomaly DetectionInformation Processing & Management10.1016/j.ipm.2024.10390562:1(103905)Online publication date: Jan-2025
  • (2025)Multiplex graph fusion network with reinforcement structure learning for fraud detection in online e-commerce platformsExpert Systems with Applications10.1016/j.eswa.2024.125598262(125598)Online publication date: Mar-2025
  • (2024)Multi-Relational Graph Representation Learning for Financial Statement Fraud DetectionBig Data Mining and Analytics10.26599/BDMA.2024.90200137:3(920-941)Online publication date: Sep-2024
  • (2024)Accelerating Sampling and Aggregation Operations in GNN Frameworks with GPU Initiated Direct Storage AccessesProceedings of the VLDB Endowment10.14778/3648160.364816617:6(1227-1240)Online publication date: 1-Feb-2024
  • (2024)A new fusion neural network model and credit card fraud identificationPLOS ONE10.1371/journal.pone.031198719:10(e0311987)Online publication date: 28-Oct-2024
  • (2024)Heterophilic Graph Invariant Learning for Out-of-Distribution of Fraud DetectionProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681312(11032-11040)Online publication date: 28-Oct-2024
  • (2024)Unsupervised Heterogeneous Graph Rewriting Attack via Node ClusteringProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671716(3057-3068)Online publication date: 25-Aug-2024
  • (2024)SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask LearningProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671534(5329-5338)Online publication date: 25-Aug-2024
  • (2024)Graph Machine Learning Meets Multi-Table Relational DataProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671471(6502-6512)Online publication date: 25-Aug-2024
  • (2024)LEX-GNN: Label-Exploring Graph Neural Network for Accurate Fraud DetectionProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679956(3802-3806)Online publication date: 21-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media