{"id":"https://openalex.org/W7151959191","doi":"https://doi.org/10.1109/isdfs69419.2026.11458985","title":"Weakly Supervised Knowledge Base Construction for Telegram Gift-Card Fraud Messages","display_name":"Weakly Supervised Knowledge Base Construction for Telegram Gift-Card Fraud Messages","publication_year":2026,"publication_date":"2026-03-19","ids":{"openalex":"https://openalex.org/W7151959191","doi":"https://doi.org/10.1109/isdfs69419.2026.11458985"},"language":null,"primary_location":{"id":"doi:10.1109/isdfs69419.2026.11458985","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs69419.2026.11458985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 14th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034723191","display_name":"Chunlan Gao","orcid":"https://orcid.org/0009-0003-1929-4037"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chunlan Gao","raw_affiliation_strings":["Georgia State University,Department of Computer Science,Atlanta,GA,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,Atlanta,GA,USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058183240","display_name":"Yubao Wu","orcid":"https://orcid.org/0000-0001-9356-8508"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yubao Wu","raw_affiliation_strings":["Georgia State University,Department of Computer Science,Atlanta,GA,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,Atlanta,GA,USA","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034723191"],"corresponding_institution_ids":["https://openalex.org/I181565077"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.73190211,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.22460000216960907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.22460000216960907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.08619999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.07349999994039536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.4869000017642975},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.3824000060558319},{"id":"https://openalex.org/keywords/knowledge-based-systems","display_name":"Knowledge-based systems","score":0.32440000772476196},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.30140000581741333},{"id":"https://openalex.org/keywords/knowledge-representation-and-reasoning","display_name":"Knowledge representation and reasoning","score":0.25200000405311584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725000143051147},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.4869000017642975},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.3824000060558319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3546999990940094},{"id":"https://openalex.org/C115925183","wikidata":"https://www.wikidata.org/wiki/Q1412694","display_name":"Knowledge-based systems","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3111000061035156},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26269999146461487},{"id":"https://openalex.org/C161301231","wikidata":"https://www.wikidata.org/wiki/Q3478658","display_name":"Knowledge representation and reasoning","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs69419.2026.11458985","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs69419.2026.11458985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 14th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6059166789054871}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310607","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2172852798","https://openalex.org/W2604259521","https://openalex.org/W2767845755","https://openalex.org/W3137947038","https://openalex.org/W4235216760","https://openalex.org/W4388201783","https://openalex.org/W4394687858","https://openalex.org/W4407938195"],"related_works":[],"abstract_inverted_index":{"Telegram":[0,47,83],"has":[1],"emerged":[2],"as":[3,15],"a":[4,100,114],"major":[5],"platform":[6],"for":[7,192],"advertising":[8],"discounted":[9],"or":[10,33],"resold":[11],"digital":[12],"assets":[13],"such":[14,44],"Amazon,":[16],"Vanilla,":[17],"and":[18,59,113,121,141,149],"Walmart":[19],"gift":[20],"cards.":[21],"Many":[22],"of":[23,36,57,63,90,157,188],"these":[24],"promotions":[25],"are":[26],"linked":[27],"to":[28,52,170],"underground":[29,163],"commerce,":[30],"coupon":[31],"abuse,":[32],"the":[34,60,91,143,167,185],"resale":[35],"compromised":[37],"balances.":[38],"Extracting":[39],"structured":[40,87],"financial":[41,174],"information":[42],"from":[43,131],"loosely":[45],"formatted":[46],"messages":[48],"is":[49],"challenging":[50],"due":[51],"inconsistent":[53],"layouts,":[54],"frequent":[55],"use":[56],"emojis,":[58],"inherent":[61],"scarcity":[62],"labeled":[64],"data.":[65],"To":[66],"overcome":[67],"this,":[68],"we":[69],"present":[70],"an":[71],"end-to-end":[72],"Weakly":[73],"Supervised":[74],"Knowledge":[75],"Base":[76],"Construction":[77],"(KBC)":[78],"system":[79,98],"that":[80,127,142],"transforms":[81],"raw":[82],"chat":[84],"exports":[85],"into":[86],"discount":[88],"triples":[89,159],"form":[92],"(brand,":[93],"original_price,":[94],"discount_price,":[95],"discount_rate).":[96],"The":[97],"integrates":[99],"tailored":[101],"pattern-based":[102],"candidate":[103],"generation":[104],"module,":[105],"probabilistic":[106],"weak":[107,147],"labeling":[108],"using":[109],"multiple":[110],"heuristic":[111],"cues,":[112],"classifier":[115],"refinement":[116],"step":[117],"leveraging":[118],"both":[119],"structural":[120],"semantic":[122],"features.":[123],"Experimental":[124],"results":[125],"demonstrate":[126],"features":[128],"derived":[129],"purely":[130],"message":[132],"structure":[133],"achieve":[134],"strong":[135],"predictive":[136],"performance":[137],"(<tex":[138],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[139],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$F_{1}=0.89$</tex>),":[140],"agreement":[144],"between":[145],"automated":[146],"labels":[148],"human":[150],"judgment":[151],"reaches":[152],"80.6":[153],"%.":[154],"Brand-level":[155],"analysis":[156],"extracted":[158],"further":[160],"reveals":[161],"realistic":[162],"pricing":[164],"trends,":[165],"confirming":[166],"system's":[168],"ability":[169],"capture":[171],"semantically":[172],"meaningful":[173],"relationships":[175],"without":[176],"reliance":[177],"on":[178],"manual":[179],"annotation.":[180],"This":[181],"proposed":[182],"framework":[183],"enables":[184],"scalable":[186],"population":[187],"domain-specific":[189],"knowledge":[190],"bases":[191],"financial-fraud":[193],"analytics.":[194]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-04-09T00:00:00"}
