Sale Fraud Behavior Detection over Multidimensional Sparse Data Warehouse

被引:0
|
作者
Zheng J.-L. [1 ,2 ]
Qiao S.-J. [1 ,2 ]
Shu H.-P. [1 ,2 ]
Ying G.-H. [3 ]
Gutierrez L.A. [4 ]
机构
[1] Sichuan Key Laboratory of Software Automatic Generation and Intelligent Service, Chengdu University of Information Technology, Chengdu
[2] School of Software Engineering, Chengdu University of Information Technology, Chengdu
[3] Alibaba (China) Technology Co. Ltd., Hangzhou
[4] Department of Computer Science, Rensselaer Polytechnic Institute, New York
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 03期
基金
中国国家自然科学基金;
关键词
Artificial intelligence; Deal cheating pattern; Distribution channel fraud; Partially ordered lattice; Tensor;
D O I
10.13328/j.cnki.jos.005905
中图分类号
学科分类号
摘要
In distribution channel system, product manufacturer will often reward retail trader who makes big deal to increase the sales. On the other hand, in order to obtain high reward, retail traders may form alliance, where a cheating retail trader accumulates the deals of other retail traders. This type of commercial fraud is called deal cheating or cross region sale. Because the sales contain a lot of normal big deals, traditional outlier detection methods cannot distinguish the normal extreme value and the true outlier generated by deal cheating behavior. Meanwhile, the sparsity of the multidimensional sales data makes the outlier detection methods based on multidimensional space cannot work effectively. To handle the aforementioned problems, this study proposes deal cheating mining algorithms based on ratio characteristic and tensor reconstruction method. These algorithms combine artificial intelligence and database technique. Meanwhile, because there are multiple types of deal cheating patterns, this study proposes deal cheating pattern classification methods based on the partially ordered lattice of deal cheating patterns. In the experiments on synthetic data, the deal cheating detection algorithm based on the ratio characteristic can achieve an average AUC-value of 65%. The traditional feature extraction methods can only achieve average AUC-values of 36% and 30%. In the experiments on the real data, the results shows the deal cheating detection algorithm is capable of distinguishing normal big deal from abnormal big deal which may be generated by the deal cheating behaviors. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
下载
收藏
页码:710 / 725
页数:15
相关论文
共 24 条
  • [1] Kenneth G., Magrath A.J., Dealing with cheating in distribution, European Journal of Marketing, 23, 2, pp. 123-129, (1989)
  • [2] Shu K., Luo P., Li W., Yin F., Tang L., Deal or deceit: Detecting cheating in distribution channels, Proc. of the 23rd ACM CIKM Int'l Conf. on Information and Knowledge Management, pp. 1419-1428, (2013)
  • [3] Zhang R., Zheng F., Sequential behavioral data processing using deep learning and the Markov transition field in online fraud detection, Proc. of the 24th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pp. 1-5, (2018)
  • [4] De Roux D., Perez B., Moreno A., Villamil M.D.P., Figueroa C., Tax fraud detection for under-reporting declarations using an unsupervised machine learning approach, Proc. of the 24th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pp. 215-222, (2018)
  • [5] Jiang S.T., Min W., Gao Q., Question and answer feature extracting framework for online lending collection risk modeling with xencoder, Proc. of the 11th ACM WSDM Int'l Conf. on Web Search and Data Mining, pp. 1211-1215, (2018)
  • [6] Min W., Tang Z.Y., Zhu M., Dai Y.X., Wei Y., Zhang R.N., Behavior language processing with graph based feature generation for fraud detection in online lending, Proc. of the 11th ACM WSDM Int'l Conf. on Web Search and Data Mining, pp. 1430-1436, (2018)
  • [7] Vlasselaer V., Eliassi-Rad T., Akoglu L., Snoeck M., Baesens B., Afraid: Fraud detection via active inference in time-evolving social networks, Proc. of the 11th ACM ASONAM Int'l Conf. on Advances in Social Networks Analysis and Mining, pp. 659-666, (2015)
  • [8] Vlasselaer V., Akoglu L., Eliassi-Rad T., Snoeck M., Guilt-by-constellation: Fraud detection by suspicious clique memberships, Proc. of the 48th IEEE HICSS Hawaii Int'l Conf. on System Sciences, pp. 918-927, (2015)
  • [9] Zhu H., Xiong H., Ge Y., Chen E., Discovery of ranking fraud for mobile apps, IEEE Trans. on Knowledge and Data Engineering, 27, 1, pp. 74-87, (2015)
  • [10] Heindorf S., Potthast M., Stein B., Engels G., Vandalism detection in wikidata, Proc. of the 25th ACM CIKM Int'l on Conf. on Information and Knowledge Management, pp. 327-336, (2016)