{"id":"https://openalex.org/W4399418675","doi":"https://doi.org/10.1145/3651671.3651690","title":"Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous Graph","display_name":"Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous Graph","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418675","doi":"https://doi.org/10.1145/3651671.3651690"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651690","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099043669","display_name":"Abhishek Periwal","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Abhishek Periwal","raw_affiliation_strings":["Flipkart Internet Private Limited, India"],"raw_orcid":"https://orcid.org/0009-0005-1075-5591","affiliations":[{"raw_affiliation_string":"Flipkart Internet Private Limited, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5099043670","display_name":"Adhish Prasoon","orcid":"https://orcid.org/0009-0009-6038-5014"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adhish Prasoon","raw_affiliation_strings":["Flipkart Internet Private Limited, India"],"raw_orcid":"https://orcid.org/0009-0009-6038-5014","affiliations":[{"raw_affiliation_string":"Flipkart Internet Private Limited, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5099043669"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10579152,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"478","last_page":"484"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13702","display_name":"Machine Learning in Healthcare","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11396","display_name":"Artificial Intelligence in Healthcare","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7574646472930908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7440599799156189},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7340826988220215},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6002583503723145},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5845180749893188},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5444782972335815},{"id":"https://openalex.org/keywords/graph-embedding","display_name":"Graph embedding","score":0.46067556738853455},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40749964118003845},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3958469331264496},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.33625975251197815},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3323599100112915},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09764683246612549}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7574646472930908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7440599799156189},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7340826988220215},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6002583503723145},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5845180749893188},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5444782972335815},{"id":"https://openalex.org/C75564084","wikidata":"https://www.wikidata.org/wiki/Q5597085","display_name":"Graph embedding","level":3,"score":0.46067556738853455},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40749964118003845},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3958469331264496},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.33625975251197815},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3323599100112915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09764683246612549}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3651671.3651690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399418675.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1986760892","https://openalex.org/W2062797058","https://openalex.org/W2154851992","https://openalex.org/W2189149359","https://openalex.org/W2618851150","https://openalex.org/W2743104969","https://openalex.org/W2766736793","https://openalex.org/W2899457523","https://openalex.org/W2951626319","https://openalex.org/W2953812218","https://openalex.org/W2962756421","https://openalex.org/W2962862931","https://openalex.org/W3012901223","https://openalex.org/W3034563984","https://openalex.org/W3045200674","https://openalex.org/W3101707147","https://openalex.org/W3104097132","https://openalex.org/W3195253249","https://openalex.org/W3216460961","https://openalex.org/W4286850364"],"related_works":["https://openalex.org/W3036264823","https://openalex.org/W3206528106","https://openalex.org/W2912814903","https://openalex.org/W2123605750","https://openalex.org/W2088740331","https://openalex.org/W3038102983","https://openalex.org/W2950907416","https://openalex.org/W1559483280","https://openalex.org/W2082479932","https://openalex.org/W2932872266"],"abstract_inverted_index":{"Machine":[0],"Learning":[1],"based":[2,8,12,32,137],"credit":[3,14],"risk":[4,25,145],"models":[5],"are":[6,98,161],"often":[7],"on":[9,13],"handcrafted":[10,50,141,152],"features":[11,48,51,142,165],"history":[15],"and":[16,56,80],"financial":[17],"transactions.":[18],"In":[19],"this":[20],"work,":[21],"we":[22,111],"develop":[23],"a":[24,64,127],"model":[26],"for":[27,126],"Equated":[28],"Monthly":[29],"Installment":[30],"(EMI)":[31],"loans":[33],"offered":[34],"by":[35],"one":[36],"of":[37,47,83,89,117,175],"the":[38,78,84,95,114,144,151,158,172,179],"biggest":[39],"e-commerce":[40],"companies":[41],"in":[42,100,107],"India":[43],"using":[44,68,134,149],"two":[45],"types":[46],"(a)":[49],"derived":[52],"from":[53,63,94],"customer":[54,60,129],"actions":[55],"account":[57],"details":[58],"(b)":[59],"embedding":[61,93,123,138,160],"learned":[62],"heterogeneous":[65],"graph":[66,96,119,136,159],"built":[67],"their":[69],"shopping":[70],"behavior":[71],"across":[72],"various":[73],"product":[74],"segments":[75],"to":[76,105,120],"leverage":[77],"purchase":[79,173],"co-purchase":[81,180],"patterns":[82,174,181],"users.":[85],"Popular":[86],"algorithms":[87],"capable":[88],"learning":[90,124],"powerful":[91,163],"node":[92],"structure":[97],"transductive":[99],"nature,":[101],"making":[102],"them":[103],"difficult":[104],"use":[106],"large":[108,128],"graphs.":[109],"However,":[110],"could":[112],"exploit":[113],"special":[115],"nature":[116],"our":[118,122,135],"generalize":[121],"method":[125],"population.":[130],"We":[131,154],"show":[132,156],"that":[133,157],"along":[139],"with":[140],"improves":[143],"model\u2019s":[146],"performance":[147],"trained":[148],"just":[150],"features.":[153],"also":[155],"more":[162],"than":[164],"learnt":[166],"through":[167],"autoencoder":[168],"which":[169],"can":[170],"capture":[171],"customers":[176],"but":[177],"not":[178],"among":[182],"them.":[183]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
