{"id":"https://openalex.org/W4415505966","doi":"https://doi.org/10.1145/3772076","title":"Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation","display_name":"Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation","publication_year":2025,"publication_date":"2025-10-24","ids":{"openalex":"https://openalex.org/W4415505966","doi":"https://doi.org/10.1145/3772076"},"language":"en","primary_location":{"id":"doi:10.1145/3772076","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3772076","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084681155","display_name":"R Chen","orcid":"https://orcid.org/0009-0003-2939-0698"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rujia Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-Sen University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006633399","display_name":"Yi Xie","orcid":"https://orcid.org/0000-0002-8899-4032"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Xie","raw_affiliation_strings":["School of Computer Science and Engineering (and the Guangdong Province Key Laboratory of Information Security Technology and the MoE Key Laboratory of Information Technology), Sun Yat-Sen University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (and the Guangdong Province Key Laboratory of Information Security Technology and the MoE Key Laboratory of Information Technology), Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111347389","display_name":"Mingjun Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minglang Liao","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-Sen University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales Canberra at ADFA"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales Canberra at ADFA","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044610505","display_name":"Xingcheng Liu","orcid":"https://orcid.org/0000-0003-1836-2205"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingcheng Liu","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-Sen University"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084681155"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44499413,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"1","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5891000032424927},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.4853000044822693},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4666000008583069},{"id":"https://openalex.org/keywords/discriminant","display_name":"Discriminant","score":0.44769999384880066},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4081999957561493},{"id":"https://openalex.org/keywords/user-profile","display_name":"User profile","score":0.40619999170303345},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.38940000534057617},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.3691999912261963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7631999850273132},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5891000032424927},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5802000164985657},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.506600022315979},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.498199999332428},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.4853000044822693},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4666000008583069},{"id":"https://openalex.org/C78397625","wikidata":"https://www.wikidata.org/wiki/Q192487","display_name":"Discriminant","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4081999957561493},{"id":"https://openalex.org/C2780150774","wikidata":"https://www.wikidata.org/wiki/Q252500","display_name":"User profile","level":2,"score":0.40619999170303345},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.3605000078678131},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3772076","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3772076","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1978239142","https://openalex.org/W2533835508","https://openalex.org/W2571178338","https://openalex.org/W2746167089","https://openalex.org/W2901141332","https://openalex.org/W2961333734","https://openalex.org/W2971644666","https://openalex.org/W2978244143","https://openalex.org/W3001594217","https://openalex.org/W3036655852","https://openalex.org/W3082828314","https://openalex.org/W3089258356","https://openalex.org/W3100280481","https://openalex.org/W3105256075","https://openalex.org/W3124813513","https://openalex.org/W3140676842","https://openalex.org/W3158777740","https://openalex.org/W3159675196","https://openalex.org/W3175747747","https://openalex.org/W3201675643","https://openalex.org/W4309796907","https://openalex.org/W4312106615","https://openalex.org/W4404636525","https://openalex.org/W4406293625"],"related_works":[],"abstract_inverted_index":{"The":[0,110],"swift":[1],"growth":[2],"of":[3,78,91,118,126,189,192,227],"e-commerce":[4,31],"has":[5,84],"led":[6],"to":[7,81,142,160,180,216,239],"an":[8],"increase":[9],"in":[10,15,68,88,107,114],"fraudulent":[11,28,104,162],"activities,":[12],"which":[13,222],"results":[14],"significant":[16],"financial":[17],"losses":[18],"for":[19,60,103],"both":[20],"suppliers":[21],"and":[22,121,137,149,196,254,259],"consumers.":[23],"Current":[24],"research":[25],"on":[26,35],"detecting":[27],"activities":[29],"within":[30],"platforms":[32],"primarily":[33],"focuses":[34],"analyzing":[36],"individual":[37],"user":[38,105,119,151],"behavioral":[39,166],"patterns":[40],"over":[41],"time":[42],"or":[43,53],"examining":[44],"the":[45,72,76,79,89,115,122,144,157,187,193,198,225,231,241],"spatial":[46,54,199,219],"relationships":[47],"among":[48],"users.":[49],"However,":[50],"considering":[51],"temporal":[52],"contexts":[55],"alone":[56],"is":[57,101,178],"not":[58,66,85],"sufficient":[59],"fraud":[61,92,172],"detection":[62,106],"since":[63],"they":[64],"may":[65],"exist":[67],"real":[69,235],"scenarios.":[70],"Additionally,":[71],"issue":[73,226],"caused":[74],"by":[75],"imbalance":[77],"data":[80,228],"be":[82],"classified":[83],"been":[86],"solved":[87],"field":[90],"identification.":[93],"To":[94],"address":[95],"these":[96],"challenges,":[97],"a":[98,132,138,175,213],"novel":[99],"scheme":[100],"proposed":[102,242],"this":[108],"work.":[109],"main":[111],"contribution":[112],"lies":[113],"spatiotemporal":[116],"fusion":[117],"behavior":[120],"layer-by-layer":[123],"selective":[124],"aggregation":[125],"graph":[127,182,194],"models.":[128],"Specifically,":[129],"we":[130],"utilize":[131],"long":[133],"short-term":[134],"memory":[135],"model":[136,141,195],"multi-layer":[139],"perceptron":[140],"extract":[143],"discriminant":[145],"features":[146],"from":[147],"time-dependent":[148],"time-independent":[150,171],"behavior,":[152],"respectively.":[153],"This":[154,202],"approach":[155],"enhances":[156],"model\u2019s":[158],"ability":[159],"detect":[161],"users":[163],"with":[164,212,250],"different":[165],"characteristics,":[167],"including":[168,246],"time-correlated":[169],"and/or":[170],"behavior.":[173],"Furthermore,":[174],"shared":[176],"classifier":[177],"added":[179],"general":[181],"neural":[183],"network,":[184],"it":[185],"reclassifies":[186],"output":[188],"each":[190],"layer":[191],"reconstructs":[197],"neighbor":[200,220],"relationship.":[201],"little":[203],"trick":[204],"makes":[205],"minority":[206],"class":[207],"samples":[208,211],"select":[209],"similar":[210],"greater":[214],"probability":[215],"build":[217],"their":[218],"relationships,":[221],"can":[223],"alleviate":[224],"imbalance.":[229],"In":[230],"numerical":[232],"experiments,":[233],"three":[234],"datasets":[236],"are":[237,257],"used":[238],"validate":[240],"scheme.":[243],"Experiment":[244],"results,":[245],"performance":[247],"evaluation,":[248],"comparison":[249],"existing":[251],"benchmark":[252],"approaches":[253],"ablation":[255],"analysis,":[256],"presented":[258],"discussed.":[260]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-24T00:00:00"}
