Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200024-8.doi: 10.11896/jsjkx.240200024
• Information Security • Previous Articles Next Articles
QIN Zhongpiao1, ZHOU Yatong1, LI Zhe2
CLC Number:
[1]BECKER R A,VOLINSKY C,WILKS A R.Fraud Detection inTelecommunications:History and Lessons Learned [J].Technometrics,2010,52(1):20-33. [2]BARSON P,FIELD S,DAVEY N,et al.The detection of fraud in mobile phone networks [J].Neural Network World,1996,6(4):477-484. [3]HILAS C S.Designing an expert system for fraud detection inprivate telecommunications networks [J].Expert Systems with Applications,2009,36(9):11559-69. [4]ELMI A H,IBRAHIM S,SALLEHUDDIN R.Detecting SIM Box Fraud Using Neural Network[C]//Proceedings of the IT Convergence and Security.2012. [5]ZHENG Y J,ZHOU X H,SHENG W G,et al.Generative adversarial network based telecom fraud detection at the receiving bank [J].Neural Networks,2018,102:78-86. [6]YANG H B,MA Y C,LI J L.Telecommunication Fraud Identification System Based on Convolutional neural network [J].Telecommunications Technology,2019,(6):60-63,68. [7]YANG H T,WANG H P,CHU X T,et al.Fake speech detection based on deep Convolutional neural network[J].Police Technology,2022,190(1):3336. [8]LIU S,JI X,LIU C,et al.Extended resource allocation index for link prediction of complex network [J].Physica A:Statistical Mechanics and its Applications,2017,479:174-183. [9]ZHENG Q Z,XU P F.Structure Learning of Gaussian Graphical Models with Latent Variables Based on Adaptive Penalties [J].Journal of Jilin University(Scinence Edition),2023,61(5):1056-1062. [10]WEST D B.Introduction to graph theory [M].Prentice hall Upper Saddle River,2001. [11]ZHANG J J,TANG Y C,JI S Y,et al,A telecom fraud identification method based on graph neural network [J].Electronics Science Technology and Application,2021,47(6):25-29,34. [12]LIU M,LIAO J,WANG J,et al.AGRM:attention-based graph representation model for telecom fraud detection[C]//2019 IEEE International Conference on Communications(ICC 2019).IEEE.2019. [13]XU B,SHEN H,SUN B,et al.Towards consumer loan fraud detection:Graph neural networks with role-constrained conditional random field[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2021. [14]LIANG T,ZENG G,ZHONG Q,et al.Credit risk and limits forecasting in e-commerce consumer lending service via multi-view-aware mixture-of-experts nets[C]//Proceedings of the 14th ACM international Conference on Web Search and Data Mining.2021. [15]ZHANG Y,FAN Y,YE Y,et al.Key player identification in underground forums over attributed heterogeneous information network embedding framework[C]//Proceedings of the 28th ACM International Conference on Information and Knowledge Management.2019. [16]DING K,ZHOU Q,TONG H,et al.Few-shot network anomaly detection via cross-network meta-learning[C]//Proceedings of the Web Conference.2021. [17]DING K,SHU K,SHAN X,et al.Cross-domain graph anomaly detection [J].IEEE Transactions on Neural Networks and Learning Systems,2021,33(6):2406-2415. [18]HAMILTON W,YING Z,LESKOVEC J.Inductive representation learning on large graphs [J].Advances in Neural Information Processing Systems,2017,30. [19]VELIČKOVIĆ P,CUCURULL G,CASANOVA A,et al.Graph attention networks [J].arXiv:171010903,2017. [20]WU Z,PAN S,CHEN F,et al.A comprehensive survey ongraph neural networks [J].IEEE Transactions on Neural Networks and Learning Systems,2020,32(1):4-24. [21]HAMILTON W L,YING R,LESKOVEC J.Representationlearning on graphs:Methods and applications [J].arXiv:170905584,2017. [22]ZHOU J,CUI G,HU S,et al.Graph neural networks:Areview of methods and applications [J].AI Open,2020,1:57-81. [23]FISCHER A,BOTERO J F,BECK M T,et al.Virtual network embedding:A survey [J].IEEE Communications Surveys & Tutorials,2013,15(4):1888-1906. [24]WU Z,PAN S,CHEN F,et al.A Comprehensive Survey onGraph Neural Networks [J].IEEE Transactions on Neural Networks and Learning Systems,2021,32(1):4-24. [25]KANG J M.Distance Metrics [M]//Encyclopedia of GIS.Cham;Springer International Publishing.2017:483-484. [26]CHOWDHURY G G.Introduction to modern information re-trieval [M].Facet Publishing,2010. [27]CORTES C,VAPNIK V.Support-vector networks [J].Machine Learning,1995,20:273-97. [28]KIPF T N,WELLING M.Semi-supervised classification withgraph convolutional networks [J].arXiv:1609.02907,2016. [29]XU K,HU W,LESKOVEC J,et al.How powerful are graphneural networks? [J].arXiv:1810.00826,2018. [30]TANG J,LI J,GAO Z,et al.Rethinking graph neural networks for anomaly detection[C]//Proceedings of the International Conference on Machine Learning.PMLR,2022. [31]LIU Y,AO X,QIN Z,et al.Pick and choose:a GNN-based imbalanced learning approach for fraud detection[C]//Proceedings of the Web Conference.2021. [32]HU X,CHEN H,CHEN H,et al.Mining Mobile NetworkFraudsters with Augmented Graph Neural Networks [J].Entropy,2023,25(1):150. [33]DOU Y,LIU Z,SUN L,et al.Enhancing graph neural network-based fraud detectors against camouflaged fraudsters[C]//Proceedings of the 29th ACM International Conference on Information & Knowledge Management.2020. |
[1] | CHEN Liang, SUN Cong. Deep-learning Based DKOM Attack Detection for Linux System [J]. Computer Science, 2024, 51(9): 383-392. |
[2] | TANG Ying, WANG Baohui. Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks [J]. Computer Science, 2024, 51(9): 365-370. |
[3] | CHEN Shanshan, YAO Subin. Study on Recommendation Algorithms Based on Knowledge Graph and Neighbor PerceptionAttention Mechanism [J]. Computer Science, 2024, 51(8): 313-323. |
[4] | HU Haibo, YANG Dan, NIE Tiezheng, KOU Yue. Graph Contrastive Learning Incorporating Multi-influence and Preference for Social Recommendation [J]. Computer Science, 2024, 51(7): 146-155. |
[5] | WEI Ziang, PENG Jian, HUANG Feihu, JU Shenggen. Text Classification Method Based on Multi Graph Convolution and Hierarchical Pooling [J]. Computer Science, 2024, 51(7): 303-309. |
[6] | LIU Wei, SONG You, ZHUO Peiyan, WU Weiqiang, LIAN Xin. Study on Kcore-GCN Anti-fraud Algorithm Fusing Multi-source Graph Features [J]. Computer Science, 2024, 51(6A): 230600040-7. |
[7] | LI Jinxia, BIAN Huaxing, WEN Fuguo, HU Tianmu, QIN Shihan, WU Han, MA Hui. Performance Risk Prediction of Power Grid Material Suppliers Based on XGBoost [J]. Computer Science, 2024, 51(6A): 230400115-9. |
[8] | DONG Wanqing, ZHAO Zirong, LIAO Huimin, XIAO Hui, ZHANG Xiaoliang. Research and Implementation of Urban Traffic Accident Risk Prediction in Dynamic Road Network [J]. Computer Science, 2024, 51(6A): 230500118-10. |
[9] | PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5. |
[10] | CHU Xiaoxi, ZHANG Jianhui, ZHANG Desheng, SU Hui. Browser Fingerprint Tracking Based on Improved GraphSAGE Algorithm [J]. Computer Science, 2024, 51(6): 409-415. |
[11] | CHEN Sishuo, WANG Xiaodong, LIU Xiyang. Survey of Breast Cancer Pathological Image Analysis Methods Based on Graph Neural Networks [J]. Computer Science, 2024, 51(6): 172-185. |
[12] | LU Min, YUAN Ziting. Graph Contrast Learning Based Multi-graph Neural Network for Session-based RecommendationMethod [J]. Computer Science, 2024, 51(5): 54-61. |
[13] | LAN Yongqi, HE Xingxing, LI Yingfang, LI Tianrui. New Graph Reduction Representation and Graph Neural Network Model for Premise Selection [J]. Computer Science, 2024, 51(5): 193-199. |
[14] | ZHANG Liying, SUN Haihang, SUN Yufa , SHI Bingbo. Review of Node Classification Methods Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(4): 95-105. |
[15] | ZHANG Tao, LIAO Bin, YU Jiong, LI Ming, SUN Ruina. Benchmarking and Analysis for Graph Neural Network Node Classification Task [J]. Computer Science, 2024, 51(4): 132-150. |
|