{"id":"https://openalex.org/W4224310669","doi":"https://doi.org/10.1145/3485447.3512195","title":"H2-FDetector: A GNN-based Fraud Detector with Homophilic and Heterophilic Connections","display_name":"H2-FDetector: A GNN-based Fraud Detector with Homophilic and Heterophilic Connections","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4224310669","doi":"https://doi.org/10.1145/3485447.3512195"},"language":"en","primary_location":{"id":"doi:10.1145/3485447.3512195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3485447.3512195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3485447.3512195","source":{"id":"https://openalex.org/S4363608783","display_name":"Proceedings of the ACM Web Conference 2022","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2022","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3485447.3512195","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038647123","display_name":"Fengzhao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengzhao Shi","raw_affiliation_strings":["UCAS, School of Cyber Security, University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"UCAS, School of Cyber Security, University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100627572","display_name":"Yanan Cao","orcid":"https://orcid.org/0000-0003-3534-1094"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanan Cao","raw_affiliation_strings":["CAS, Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"CAS, Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061036091","display_name":"Yanmin Shang","orcid":"https://orcid.org/0000-0002-0106-0676"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanmin Shang","raw_affiliation_strings":["CAS, Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"CAS, Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102991359","display_name":"Yuchen Zhou","orcid":"https://orcid.org/0000-0002-7041-559X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchen Zhou","raw_affiliation_strings":["UCAS, School of Cyber Security, University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"UCAS, School of Cyber Security, University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085319576","display_name":"Chuan Zhou","orcid":"https://orcid.org/0000-0001-9958-8673"},"institutions":[{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhou","raw_affiliation_strings":["CAS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"CAS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007475662","display_name":"Jia Wu","orcid":"https://orcid.org/0000-0002-1371-5801"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jia Wu","raw_affiliation_strings":["School of Computing, Macquarie University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038647123"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":11.5835,"has_fulltext":true,"cited_by_count":124,"citation_normalized_percentile":{"value":0.99077901,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1486","last_page":"1494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8016972541809082},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5481030941009521},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.48216456174850464},{"id":"https://openalex.org/keywords/homophily","display_name":"Homophily","score":0.4426000416278839},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4360671043395996},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4103944003582001},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3523164689540863},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3134353756904602}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8016972541809082},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5481030941009521},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.48216456174850464},{"id":"https://openalex.org/C2779812341","wikidata":"https://www.wikidata.org/wiki/Q5891525","display_name":"Homophily","level":2,"score":0.4426000416278839},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4360671043395996},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4103944003582001},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3523164689540863},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3134353756904602},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3485447.3512195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3485447.3512195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3485447.3512195","source":{"id":"https://openalex.org/S4363608783","display_name":"Proceedings of the ACM Web Conference 2022","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2022","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3485447.3512195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3485447.3512195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3485447.3512195","source":{"id":"https://openalex.org/S4363608783","display_name":"Proceedings of the ACM Web Conference 2022","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2022","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7451196295","display_name":null,"funder_award_id":"2018192","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4224310669.pdf","grobid_xml":"https://content.openalex.org/works/W4224310669.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W2064058256","https://openalex.org/W2089394015","https://openalex.org/W2136891251","https://openalex.org/W2620964324","https://openalex.org/W2897862648","https://openalex.org/W2911286998","https://openalex.org/W2912484932","https://openalex.org/W2945996535","https://openalex.org/W2963017945","https://openalex.org/W2963415211","https://openalex.org/W2964190417","https://openalex.org/W2966360566","https://openalex.org/W2970971581","https://openalex.org/W2984239289","https://openalex.org/W2988801199","https://openalex.org/W3009901425","https://openalex.org/W3022945404","https://openalex.org/W3033991488","https://openalex.org/W3068123808","https://openalex.org/W3081300507","https://openalex.org/W3090999459","https://openalex.org/W3094291586","https://openalex.org/W3099064659","https://openalex.org/W3099825604","https://openalex.org/W3102969158","https://openalex.org/W3128443161","https://openalex.org/W3153858161","https://openalex.org/W3166257724","https://openalex.org/W3169637772","https://openalex.org/W3172402898","https://openalex.org/W3175164304","https://openalex.org/W3177385106","https://openalex.org/W3187966659"],"related_works":["https://openalex.org/W3185373886","https://openalex.org/W3010567961","https://openalex.org/W4200127153","https://openalex.org/W4385338594","https://openalex.org/W2588006872","https://openalex.org/W3119171992","https://openalex.org/W2560747187","https://openalex.org/W1971924293","https://openalex.org/W2011190096","https://openalex.org/W3175275009"],"abstract_inverted_index":{"In":[0],"the":[1,22,27,35,40,47,55,62,67,73,78,108,114,129,136,150],"fraud":[2,50,58,161],"graph,":[3],"fraudsters":[4],"often":[5],"interact":[6],"with":[7,97,113],"a":[8,91,122,143],"large":[9],"number":[10],"of":[11,69,82,116,152],"benign":[12],"entities":[13],"to":[14,65,127,148],"hide":[15],"themselves.":[16],"So,":[17],"there":[18],"are":[19],"not":[20],"only":[21],"homophilic":[23,109,130],"connections":[24,37,112,131,138],"formed":[25,38],"by":[26,39],"same":[28],"label":[29,42],"nodes":[30,43],"(similar":[31],"nodes),":[32],"but":[33],"also":[34],"heterophilic":[36,83,111,137],"different":[41],"(dissimilar":[44],"nodes).":[45],"However,":[46],"existing":[48],"GNN-based":[49],"detection":[51,162],"methods":[52],"just":[53],"enhance":[54],"homophily":[56],"in":[57],"graph":[59],"and":[60,99,110,135],"use":[61],"low-pass":[63],"filter":[64],"retain":[66],"commonality":[68],"node":[70],"features":[71],"among":[72,80],"neighbors,":[74],"which":[75],"inevitably":[76],"ignore":[77],"difference":[79,140],"neighbor":[81],"connections.":[84],"To":[85],"address":[86],"this":[87],"problem,":[88],"we":[89,106,120],"propose":[90],"Graph":[92],"Neural":[93],"Network-based":[94],"Fraud":[95],"Detector":[96],"Homophilic":[98],"Heterophilic":[100],"Interactions":[101],"(H2-FDetector":[102],"for":[103],"short).":[104],"Firstly,":[105],"identify":[107],"supervision":[115],"labeled":[117],"nodes.":[118],"Next,":[119],"design":[121],"new":[123],"information":[124,134],"aggregation":[125],"strategy":[126],"make":[128],"propagate":[132,139],"similar":[133],"information.":[141],"Finally,":[142],"prototype":[144],"prior":[145],"is":[146],"introduced":[147],"guide":[149],"identification":[151],"fraudsters.":[153],"Extensive":[154],"experiments":[155],"on":[156],"two":[157],"real":[158],"public":[159],"benchmark":[160],"tasks":[163],"demonstrate":[164],"that":[165],"our":[166],"method":[167],"apparently":[168],"outperforms":[169],"state-of-the-art":[170],"baselines.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":13},{"year":2025,"cited_by_count":50},{"year":2024,"cited_by_count":38},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
