{"id":"https://openalex.org/W4210269999","doi":"https://doi.org/10.1109/icmla52953.2021.00067","title":"Temporal Debiasing using Adversarial Loss based GNN architecture for Crypto Fraud Detection","display_name":"Temporal Debiasing using Adversarial Loss based GNN architecture for Crypto Fraud Detection","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210269999","doi":"https://doi.org/10.1109/icmla52953.2021.00067"},"language":"en","primary_location":{"id":"doi:10.1109/icmla52953.2021.00067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmla52953.2021.00067","pdf_url":null,"source":{"id":"https://openalex.org/S4363607906","display_name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036427078","display_name":"Aditya Singh","orcid":"https://orcid.org/0000-0001-6281-9431"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aditya Singh","raw_affiliation_strings":["AI Garage Mastercard, India"],"affiliations":[{"raw_affiliation_string":"AI Garage Mastercard, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025098067","display_name":"Anubhav Gupta","orcid":"https://orcid.org/0000-0003-0187-8192"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anubhav Gupta","raw_affiliation_strings":["AI Garage Mastercard, India"],"affiliations":[{"raw_affiliation_string":"AI Garage Mastercard, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110851736","display_name":"Hardik Wadhwa","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hardik Wadhwa","raw_affiliation_strings":["AI Garage Mastercard, India"],"affiliations":[{"raw_affiliation_string":"AI Garage Mastercard, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076286184","display_name":"Siddhartha Asthana","orcid":"https://orcid.org/0000-0002-6798-1240"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Siddhartha Asthana","raw_affiliation_strings":["AI Garage Mastercard, India"],"affiliations":[{"raw_affiliation_string":"AI Garage Mastercard, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059891327","display_name":"Ankur Arora","orcid":"https://orcid.org/0000-0003-4350-5773"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ankur Arora","raw_affiliation_strings":["AI Garage Mastercard, India"],"affiliations":[{"raw_affiliation_string":"AI Garage Mastercard, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036427078"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.4035,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93814822,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"391","last_page":"396"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7938456535339355},{"id":"https://openalex.org/keywords/debiasing","display_name":"Debiasing","score":0.6056348085403442},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5658974051475525},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5535288453102112},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5307486057281494},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5296537280082703},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5238209366798401},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5028116106987},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45199257135391235},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4469149708747864},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3273719549179077},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3122245967388153},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20142638683319092}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7938456535339355},{"id":"https://openalex.org/C2779458634","wikidata":"https://www.wikidata.org/wiki/Q24963715","display_name":"Debiasing","level":2,"score":0.6056348085403442},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5658974051475525},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5535288453102112},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5307486057281494},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5296537280082703},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5238209366798401},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5028116106987},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45199257135391235},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4469149708747864},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3273719549179077},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3122245967388153},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20142638683319092},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C188147891","wikidata":"https://www.wikidata.org/wiki/Q147638","display_name":"Cognitive science","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmla52953.2021.00067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmla52953.2021.00067","pdf_url":null,"source":{"id":"https://openalex.org/S4363607906","display_name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1535521592","https://openalex.org/W1994130174","https://openalex.org/W2111362445","https://openalex.org/W2154851992","https://openalex.org/W2283695185","https://openalex.org/W2563852449","https://openalex.org/W2756202949","https://openalex.org/W2762598207","https://openalex.org/W2766032006","https://openalex.org/W2786808285","https://openalex.org/W2884755130","https://openalex.org/W2903199860","https://openalex.org/W2962756421","https://openalex.org/W2962831337","https://openalex.org/W2963261224","https://openalex.org/W2971932763","https://openalex.org/W2998313947","https://openalex.org/W2998369447","https://openalex.org/W3104060014","https://openalex.org/W3104097132","https://openalex.org/W3138941680","https://openalex.org/W3203824217","https://openalex.org/W4285790115","https://openalex.org/W4288276219","https://openalex.org/W6677069268","https://openalex.org/W6756622538","https://openalex.org/W6766612752","https://openalex.org/W6767327189","https://openalex.org/W6771794067","https://openalex.org/W6778141293"],"related_works":["https://openalex.org/W4362554880","https://openalex.org/W4386875279","https://openalex.org/W4281684980","https://openalex.org/W2171721708","https://openalex.org/W3214527415","https://openalex.org/W4287887864","https://openalex.org/W4388915157","https://openalex.org/W2957710009","https://openalex.org/W3115531728","https://openalex.org/W4205096204"],"abstract_inverted_index":{"The":[0,40,175,198],"tremendous":[1],"rise":[2],"of":[3,70,94,215],"cryptocurrency":[4,47,89],"in":[5,18,87,119,243],"the":[6,92,111,133,180,202,213,220,225],"payment":[7],"domain":[8],"has":[9,53],"unlocked":[10],"huge":[11],"opportunities":[12],"but":[13],"also":[14],"raised":[15],"numerous":[16],"challenges":[17],"parallel":[19],"involving":[20],"cybercriminal":[21],"activities":[22,86],"like":[23],"money":[24],"laundering,":[25],"terrorist":[26],"financing,":[27],"illegal":[28],"and":[29,37,74,96,172,223,231,238],"risky":[30],"services,":[31],"etc,":[32],"owing":[33],"to":[34,50,61,83,182],"its":[35],"anonymous":[36],"decentralized":[38],"setup.":[39],"demand":[41],"for":[42],"building":[43],"a":[44,68,88,124,152],"more":[45,57],"transparent":[46],"network,":[48,91],"resilient":[49],"such":[51],"activities,":[52],"risen":[54],"extensively":[55],"as":[56],"financial":[58],"institutions":[59],"look":[60],"incorporate":[62],"it":[63],"into":[64],"their":[65,142],"network.":[66],"While":[67],"plethora":[69],"traditional":[71],"machine":[72,229],"learning":[73,78,165,230],"graph":[75],"based":[76,158],"deep":[77],"techniques":[79],"have":[80],"been":[81],"developed":[82],"detect":[84],"illicit":[85,239],"transaction":[90],"challenge":[93],"generalization":[95,162],"robust":[97],"model":[98,112],"performance":[99,143,214,226],"on":[100,114,132,144,188,219],"future":[101,145],"timesteps":[102,134],"still":[103],"exists.":[104],"In":[105],"this":[106,244],"paper,":[107],"we":[108,150],"show":[109],"that":[110,160,206],"learned":[113],"transactional":[115],"feature":[116],"set":[117],"provided":[118],"dataset":[120,222],"(Elliptic":[121],"Dataset)":[122],"carry":[123],"temporal":[125,153,173,196],"bias,":[126],"i.e.":[127],"they":[128,135,184],"are":[129,240],"highly":[130],"dependent":[131],"occur.":[136],"Deploying":[137],"temporally":[138],"biased":[139],"models":[140],"limits":[141],"timesteps.":[146],"To":[147],"address":[148],"this,":[149],"propose":[151],"debiasing":[154],"technique":[155],"using":[156],"GNN":[157],"architecture":[159,200,218],"ensures":[161],"by":[163],"adversarially":[164],"between":[166],"fraud":[167,189,204],"<sup":[168,234],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[169,235],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[170,236],"classification":[171,190],"classification.":[174],"adversarial":[176],"loss":[177],"constructed":[178],"optimizes":[179],"embeddings":[181],"ensure":[183],"1.)":[185],"perform":[186],"well":[187],"task":[191],"2.)":[192],"does":[193],"not":[194],"contain":[195],"bias.":[197],"proposed":[199,217],"capture":[201],"underlying":[203],"patterns":[205],"remain":[207],"consistent":[208],"over":[209],"time.":[210],"We":[211],"evaluate":[212],"our":[216],"Elliptic":[221],"compare":[224],"with":[227],"existing":[228],"graph-based":[232],"architectures.":[233],"Fraud":[237],"used":[241],"interchangeably":[242],"paper":[245]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
