{"id":"https://openalex.org/W3210278576","doi":"https://doi.org/10.1145/3459637.3482053","title":"Adversarial Reprogramming of Pretrained Neural Networks for Fraud Detection","display_name":"Adversarial Reprogramming of Pretrained Neural Networks for Fraud Detection","publication_year":2021,"publication_date":"2021-10-26","ids":{"openalex":"https://openalex.org/W3210278576","doi":"https://doi.org/10.1145/3459637.3482053","mag":"3210278576"},"language":"en","primary_location":{"id":"doi:10.1145/3459637.3482053","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459637.3482053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lingwei Chen","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101916154","display_name":"Yujie Fan","orcid":"https://orcid.org/0000-0002-2635-9420"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yujie Fan","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027601906","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0002-6038-2173"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]},{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Case Western Reserve University &amp; University of Notre Dame, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University &amp; University of Notre Dame, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616","https://openalex.org/I107639228"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017524689"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":1.0877,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.82173164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2935","last_page":"2939"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.9194999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.847327470779419},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7346658706665039},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6513996720314026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5772610306739807},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5345090627670288},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5331190228462219},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5312399864196777},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.47585079073905945},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4319087266921997},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14694899320602417},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08227774500846863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.847327470779419},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7346658706665039},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6513996720314026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5772610306739807},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5345090627670288},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5331190228462219},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5312399864196777},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.47585079073905945},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4319087266921997},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14694899320602417},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08227774500846863}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3459637.3482053","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459637.3482053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2116988482","https://openalex.org/W2122922389","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2186489521","https://openalex.org/W2194775991","https://openalex.org/W2543927648","https://openalex.org/W2779931100","https://openalex.org/W2780061022","https://openalex.org/W2781800156","https://openalex.org/W2808857778","https://openalex.org/W2930363294","https://openalex.org/W3022945404","https://openalex.org/W3099825604","https://openalex.org/W3198200562"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W4285263558","https://openalex.org/W2900159906","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4283221438","https://openalex.org/W2899811703"],"abstract_inverted_index":{"Machine":[0],"learning":[1,40],"models":[2,15],"have":[3,121],"been":[4],"widely":[5],"used":[6],"for":[7,59,106],"fraud":[8,129],"detection,":[9],"while":[10],"developing":[11],"and":[12,27,45,77,118,133],"maintaining":[13],"these":[14,32],"often":[16],"suffers":[17],"from":[18],"significant":[19],"limitations":[20],"in":[21,34],"terms":[22],"of":[23,93],"training":[24],"data":[25,132],"scarcity":[26],"constrained":[28],"resources.":[29,134],"To":[30],"address":[31],"issues,":[33],"this":[35],"paper,":[36],"we":[37],"leverage":[38],"machine":[39],"vulnerability":[41],"to":[42,72,83,86,101,127],"adversarial":[43],"attacks,":[44],"design":[46],"a":[47,69,80],"novel":[48],"model":[49,96],"AdvRFD":[50,63,124],"that":[51,90,123],"Adversarially":[52],"Reprograms":[53],"an":[54],"ImageNet":[55,75],"classification":[56],"neural":[57],"network":[58],"Fraud":[60],"Detection":[61],"task.":[62],"first":[64],"embeds":[65],"transaction":[66,113],"features":[67],"into":[68],"host":[70],"image":[71],"construct":[73],"new":[74],"data,":[76],"then":[78],"learns":[79],"universal":[81],"perturbation":[82],"be":[84,98],"added":[85],"all":[87,107],"inputs,":[88],"such":[89],"the":[91,94,102],"outputs":[92],"pretrained":[95],"can":[97],"accordingly":[99],"mapped":[100],"final":[103],"detection":[104],"decisions":[105],"transactions.":[108],"Extensive":[109],"experiments":[110],"on":[111],"two":[112],"datasets":[114],"made":[115],"over":[116],"Ethereum":[117],"credit":[119],"cards":[120],"demonstrated":[122],"is":[125],"effective":[126],"detect":[128],"using":[130],"limited":[131]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
