A Network Embedding Based Approach for Telecommunications Fraud Detection

被引:1
|
作者
Liu, Xiao [1 ]
Wang, Xiaoguo [1 ]
机构
[1] Tongji Univ, Coll Elect & Informat Engn, Shanghai 201800, Peoples R China
关键词
Telecommunications fraud; Data mining; Cooperative application; Fraud detection; Network embedding;
D O I
10.1007/978-3-030-00560-3_31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the last few years, telecommunications fraud has caused substantial economic losses. A bank fraud management system is a cooperative system, which needs the data integrated from multiple sources and cooperative work among different departments. In this paper, we design a cooperative workflow for telecommunications fraud control and propose a network embedding based approach for telecommunications fraud detection. We conduct experiments on real-world data to demonstrate the effectiveness of the proposed method.
引用
收藏
页码:229 / 236
页数:8
相关论文
共 50 条
  • [21] A Network Embedding-Enhanced Approach for Generalized Community Detection
    He, Dongxiao
    Yang, Xue
    Feng, Zhiyong
    Chen, Shizhan
    Fogelman-Soulie, Francoise
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2018, PT II, 2018, 11062 : 383 - 395
  • [22] CORPORATE FRAUD DETECTION BASED ON IMPROVED BP NEURAL NETWORK
    Liu, Wei
    Liu, MingMing
    Yan, Chun
    Qi, Man
    Zhang, LuLu
    COMPUTING AND INFORMATICS, 2024, 43 (03) : 611 - 632
  • [23] Community detection based on unsupervised attributed network embedding
    Zhou, Xinchuang
    Su, Lingtao
    Li, Xiangju
    Zhao, Zhongying
    Li, Chao
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
  • [24] Credit Card Fraud Detection Based on Unsupervised Attentional Anomaly Detection Network
    Jiang, Shanshan
    Dong, Ruiting
    Wang, Jie
    Xia, Min
    SYSTEMS, 2023, 11 (06):
  • [25] Auditing Network Embedding: An Edge Influence Based Approach
    Wang, Yaojing
    Yao, Yuan
    Tong, Hanghang
    Xu, Feng
    Lu, Jian
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (11) : 5211 - 5224
  • [26] An application of decision trees for rule extraction towards telecommunications fraud detection
    Hilas, Constantinos S.
    Sahalos, John N.
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 1112 - 1121
  • [27] Addressing fraud detection and management in next-generation telecommunications networks
    Hearne, S
    McGibney, J
    Patel, A
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 29 - 33
  • [28] EnsemFDet: An Ensemble Approach to Fraud Detection based on Bipartite Graph
    Ren, Yuxiang
    Zhu, Hao
    Zhang, Jiawei
    Dai, Peng
    Bo, Liefeng
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 2039 - 2044
  • [29] Fraud detection in telecommunication: A rough fuzzy set based approach
    Xu, Wei
    Pang, Ye
    Ma, Jian
    Wang, Shou-Yang
    Hao, Gang
    Zeng, Shuo
    Qian, Yu-Hua
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1249 - +
  • [30] On an Ant Colony-Based Approach for Business Fraud Detection
    Liu, Ou
    Ma, Jian
    Poon, Pak-Lok
    Zhang, Jun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1104 - +