{"id":"https://openalex.org/W2897698945","doi":"https://doi.org/10.1109/ijcnn.2018.8489585","title":"FraudNE: a Joint Embedding Approach for Fraud Detection","display_name":"FraudNE: a Joint Embedding Approach for Fraud Detection","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2897698945","doi":"https://doi.org/10.1109/ijcnn.2018.8489585","mag":"2897698945"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2018.8489585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2018.8489585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10453/133230","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016702781","display_name":"Mengyu Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengyu Zheng","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085319576","display_name":"Chuan Zhou","orcid":"https://orcid.org/0000-0001-9958-8673"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhou","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007475662","display_name":"Jia Wu","orcid":"https://orcid.org/0000-0002-1371-5801"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jia Wu","raw_affiliation_strings":["Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008056593","display_name":"Shirui Pan","orcid":"https://orcid.org/0000-0003-0794-527X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shirui Pan","raw_affiliation_strings":["Centre for Artificial Intelligence, University of Technology, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Artificial Intelligence, University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinqiao Shi","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100675165","display_name":"Li Guo","orcid":"https://orcid.org/0000-0002-9723-3294"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Guo","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016702781"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.0153,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.83032196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029763698577881},{"id":"https://openalex.org/keywords/a-priori-and-a-posteriori","display_name":"A priori and a posteriori","score":0.7246029376983643},{"id":"https://openalex.org/keywords/bipartite-graph","display_name":"Bipartite graph","score":0.715466320514679},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7048647403717041},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.6558964848518372},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.6005013585090637},{"id":"https://openalex.org/keywords/graph-embedding","display_name":"Graph embedding","score":0.5429555773735046},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4799064099788666},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45172542333602905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3650810122489929},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3433883786201477}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029763698577881},{"id":"https://openalex.org/C75553542","wikidata":"https://www.wikidata.org/wiki/Q178161","display_name":"A priori and a posteriori","level":2,"score":0.7246029376983643},{"id":"https://openalex.org/C197657726","wikidata":"https://www.wikidata.org/wiki/Q174733","display_name":"Bipartite graph","level":3,"score":0.715466320514679},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7048647403717041},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.6558964848518372},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.6005013585090637},{"id":"https://openalex.org/C75564084","wikidata":"https://www.wikidata.org/wiki/Q5597085","display_name":"Graph embedding","level":3,"score":0.5429555773735046},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4799064099788666},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45172542333602905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3650810122489929},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3433883786201477},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn.2018.8489585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2018.8489585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/133230","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/133230","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:opus.lib.uts.edu.au:10453/133230","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/133230","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W81017276","https://openalex.org/W1560607100","https://openalex.org/W1775665607","https://openalex.org/W1888005072","https://openalex.org/W1975223096","https://openalex.org/W2001141328","https://openalex.org/W2011863672","https://openalex.org/W2016440973","https://openalex.org/W2047756776","https://openalex.org/W2048030021","https://openalex.org/W2053186076","https://openalex.org/W2062797058","https://openalex.org/W2067752346","https://openalex.org/W2097308346","https://openalex.org/W2103063352","https://openalex.org/W2107793528","https://openalex.org/W2111639622","https://openalex.org/W2132914434","https://openalex.org/W2136922672","https://openalex.org/W2144211451","https://openalex.org/W2154851992","https://openalex.org/W2157444450","https://openalex.org/W2159359879","https://openalex.org/W2206195341","https://openalex.org/W2348679751","https://openalex.org/W2421165030","https://openalex.org/W2427862964","https://openalex.org/W2513234781","https://openalex.org/W2574817444","https://openalex.org/W2586047314","https://openalex.org/W2604912600","https://openalex.org/W2613993493","https://openalex.org/W2736065754","https://openalex.org/W2743104969","https://openalex.org/W2758068744","https://openalex.org/W2767404761","https://openalex.org/W2770250693","https://openalex.org/W2788872664","https://openalex.org/W2913932916","https://openalex.org/W2949957935","https://openalex.org/W2964234429","https://openalex.org/W3104097132","https://openalex.org/W4293355737","https://openalex.org/W6633459302","https://openalex.org/W6637998964","https://openalex.org/W6644037917","https://openalex.org/W6683161245","https://openalex.org/W6684043126","https://openalex.org/W6717211576","https://openalex.org/W6731976766","https://openalex.org/W6736235882","https://openalex.org/W6744723629","https://openalex.org/W6746218673","https://openalex.org/W6748406900","https://openalex.org/W6936242187"],"related_works":["https://openalex.org/W3036264823","https://openalex.org/W3206528106","https://openalex.org/W2123605750","https://openalex.org/W2912814903","https://openalex.org/W2088740331","https://openalex.org/W2950907416","https://openalex.org/W3038102983","https://openalex.org/W2082479932","https://openalex.org/W2932872266","https://openalex.org/W4281484020"],"abstract_inverted_index":{"Detecting":[0],"fraudsters":[1],"is":[2,68,86],"a":[3,29,46,102],"meaningful":[4],"problem":[5],"for":[6,53],"both":[7],"users":[8,34],"and":[9,35],"e-commerce":[10],"platform.":[11],"Existing":[12],"graph-based":[13],"approaches":[14],"mainly":[15],"adopt":[16],"shallow":[17],"models,":[18],"which":[19],"cannot":[20],"capture":[21],"the":[22,60,81,97],"highly":[23,61],"non-linear":[24,62],"relationship":[25],"between":[26],"vertexes":[27,78],"in":[28,41,80],"bipartite":[30],"graph":[31],"composed":[32],"of":[33,65,77,99],"items.":[36],"To":[37],"address":[38],"this":[39,42],"issue,":[40],"paper":[43],"we":[44,90],"propose":[45],"joint":[47],"deep":[48],"structure":[49],"embedding":[50],"approach":[51],"FraudNE":[52],"fraud":[54],"detection":[55],"that":[56,89],"(a)":[57],"can":[58,91],"preserve":[59],"structural":[63],"information":[64],"networks,":[66,72],"(b)":[67],"robust":[69],"to":[70],"sparse":[71],"(c)":[73],"embeds":[74],"different":[75],"types":[76],"jointly":[79],"same":[82],"latent":[83],"space.":[84],"It":[85],"worth":[87],"mentioning":[88],"detect":[92],"multiple":[93],"fraudulent":[94],"groups":[95,100],"without":[96],"number":[98],"as":[101],"priori.":[103],"Compared":[104],"with":[105],"baselines,":[106],"our":[107],"method":[108],"achieved":[109],"significant":[110],"accuracy":[111],"improvement.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
