Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 221100173-9.doi: 10.11896/jsjkx.221100173

• Big Data & Data Science • Previous Articles     Next Articles

Study on Credit Anti-fraud Based on Heterogeneous Information Network

LIU Hualing, ZHANG Guoxiang, WANG Liuyue, LIANG Huabi   

  1. School of Statistics and Information,Shanghai University of International Business and Economics,Shanghai 201620,China
  • Published:2023-11-09
  • About author:LIU Hualing,born in 1964,Ph.D,professor.Her main research interests include financial risk control,data mining and intelligent decision-making.

Abstract: In recent years,the digitization of mobile terminal equipment has risen sharply,and fraudulent behaviors in the credit industry have shown new characteristics such as dynamic development,concealment of behavior,and professional camouflage.The cross-order growth of massive data has brought considerable challenges to the effectiveness and computational efficiency of traditional anti-fraud algorithms.Therefore,this paper aims to fully learn the interaction information between different entities in the credit scene,reduce the computational consumption of the algorithm to make it suitable for large-scale graph data tasks,and propose a specific group mining algorithm BKH-II(Bron-Kerbosh-H-II) based on heterogeneous information networks.First,defining and classifing the credit entities and the relationships between them in the source data,and using the similarity between different entities as the relationship weight to build a credit heterogeneous information network.A two-stage H-graph-based maximal clique enumeration algorithm is adopted for the network to mine unique groups.Finally,potential fraud groups are obtained through local feature engineering correction and division.Experiments prove that the accuracy of BKH-II on the four evaluation indicators is NMI=0.983,NRI=0.96,F-score=0.943,Omega=0.95,and shows good generalization and low computational complexity.

Key words: Heterogeneous information network, Credit anti-fraud, Specific group mining, Community discovery, Graph embedding

CLC Number: 

  • TP391
[1]SHEN H,CHENG X,CAI K,et al.Detect overlapping and hie-rarchical community structure in networks[J].Physica A:Statistical Mechanics and its Applications,2009,388(8):1706-1712.
[2]LU Q,JU C.Research on Credit Card Fraud Detection Model Based on Class Weighted Support Vector Machine[J].Journal of Convergence Information Technology,2011,6(1):62-68.
[3]NIAN K,ZHANG H,TAYAL A,et al.Auto insurance fraud detection using unsupervised spectralranking for anomaly[J].The Journal of Finance and Data Science,2016,2(1):58-75.
[4]KELLER F,MULLER E,BOHM K.HiCS:High Contrast Subspaces for Density-Based Outlier Ranking[C]//2012 IEEE 28th International Conference on Data Engineering.Arlington,VA,USA,2012:1037-1048.
[5]NGUYEN H V,GOPALKRISHNAN V,ASSENT I.An unbiased distance-based outlier detection approach for high-dimensional data[C]//International Conference on Database Systems for Advanced Applications.Springer,Berlin,Heidelberg,2011:138-152.
[6]BHATTACHARYYA S,JHA S,THARAKUNNEL K,et al.Data mining for credit card fraud:A comparative study[J].Decision Support Systems,2011,50(3):602-613.
[7]YAN H,JIANG Y,LIU G.Telecomm Fraud Detection via Attributed Bipartite Network[C]//2018 15th International Conference on Service Systems and Service Management(IC-SSSM).IEEE,2018:1-6.
[8]HE Y,SONG Y,LI J,et al.Hetespaceywalk:A heterogeneous spacey random walk for heterogeneous information network embedding[C]//Proceedings of the 28th ACM International Conference on Information and Knowledge Management.2019:639-648.
[9]XIE Y,WANG Q,LI H H,et al.A Spatial-Temporal GraphMining Algorithm based on Spatial-Temporal Sparse Attention Network[J/OL].Computer Engineering:1-8.https://kns.cnki.net/kcms2/article/abstract?v=3uoqIhG8C44YLTlOAiTRKibYlV5Vjs7ioT0BO4yQ4m_mOgeS2ml3UBXRVwfAzJsIi3Bsco8ZcxE_qZ4dUCMa-vfFpV0QH1EQ&uniplatform=NZKPT.
[10]ROY A,SUN J,MAHONEY R,et al.Deep learning detectingfraud in credit card transactions[C]//2018 Systems and Information Engineering Design Symposium (SIEDS).IEEE,2018:129-134.
[11]CAI H Y,YUAN S L,WEN Y,et al.Shilling Attacks Detection Based on CNN and Hesitant Fuzzy Sets[J].Engineering Science and Technology,2022,54(3):80-90.
[12]WANG W M,ZHI L P.Fraud detection model generalizationperformance improvement and interpretability study based on ADASYN-SFS-RF[J/OL].Computer application research:1-11.https://kns.cnki.net/kcms2/article/abstract?v=3uoqIhG8C44YLTlOAiTRKibYlV5Vjs7ioT0BO4yQ4m_mOgeS2ml3UH_TYrVERVm5vryPl24sxfOcsIMT5f6OT61zKGh0xRSr&uniplat-form=NZKPT.
[13]SHI C,LI Y,ZHANG J,et al.A survey of heterogeneous information network analysis[J].IEEE Transactions on Knowledge and Data Engineering,2016,29(1):17-37.
[14]LUSSEAU D,NEWMAN M E J.Identifying the role that animals play in their social networks[J].Proceedings of the Royal Society of London.Series B:Biological Sciences,2004,271(suppl_6):S477-S481.
[15]ZHAO Y Q,WU Y,CHEN X.An Algorithm for Large-scale Social Network Community Detection and Visualization[J].Journal of Computer-Aided Design and Graphics,2017,29 (2):328-336.
[16]GREGORY S.An algorithm to find overlapping communitystructure in networks[C]//European conference on principles of data mining and knowledge discovery.Springer,Berlin,Heidelberg,2007:91-102.
[17]SHEN H W,CHENG X Q,GUO J F.Quantifying and identifying the overlapping community structure in networks[J].Journal of Statistical Mechanics:Theory and Experiment,2009,2009(7):P07042.
[18]QIAN Y,LI Y,ZHANG M,et al.Quantifying edge significance on maintaining global connectivity[J].Scientific Reports,2017,7(1):1-13.
[19]LIU H,FEN L,JIAN J,et al.Overlapping community discovery algorithm based on hierarchical agglomerative clustering[J].International Journal of Pattern Recognition and Artificial Intelligence,2018,32(3):1850008.
[20]LI J,LI X,GAO Y,et al.Dynamic trustworthiness overlapping community discovery in mobile internet of things[J].IEEE Access,2018,6:74579-74597.
[21]HUANG F,LI X,ZHANG S,et al.Overlapping community detection for multimedia social networks[J].IEEE Transactions on multimedia,2017,19(8):1881-1893.
[22]YOSHIDA T.Weighted line graphs for overlapping community discovery[J].Social Network Analysis and Mining,2013,3(4):1001-1013.
[23]HUANG F L,ZHANG S C,ZHU X F.Discovering NetworkCommunity Based on Multi-Objective Optimization[J].Software Journal,2013,24(9):2062-2077.
[24]XIE J,SZYMANSKI B K.Community detection using a neighborhood strength driven label propagation algorithm[C]//2011 IEEE Network Science Workshop.IEEE,2011:188-195.
[25]GARZA S E,SCHAEFFER S E.Community detection with the Label Propagation Algorithm:A survey[J].Physica A:Statistical Mechanics and its Applications,2019,534:122058.
[26]HU J,DONG Y H,YANG B R.Community structure discovery algorithms in large complex networks [J].Computer Engineering,2008 (19):92-93,100.
[27]ZHANG X K,REN J,SONG C,et al.Label propagation algorithm for community detection based on node importance and label influence[J].Physics Letters A,2017,381(33):2691-2698.
[28]CORDASCO G,GARGANO L.Label propagation algorithm:a semi-synchronous approach[J].International Journal of Social Network Mining,2012,1(1):3-26.
[29]ZHANG Y L,XIA X W,XU X,et al.Review on Label Propagation Algorithms for Community Detection[J].Small Microcomputer System,2021,42(5):1093-1102.
[30]GAN C,WANG B,WANG Z J,et al.A Solution for High Avai-lability Memory Access[C]//19th International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP 2019).2019.
[1] LI Haiming, ZHU Zhiheng, LIU Lei, GUO Chenkai. Multi-task Graph-embedding Deep Prediction Model for Mobile App Rating Recommendation [J]. Computer Science, 2023, 50(9): 160-167.
[2] DU Ming, YANG Wen, ZHOU Junfeng. Maximum Influential Community Search in Heterogeneous Information Network [J]. Computer Science, 2023, 50(8): 16-26.
[3] WANG Huiyan, YU Minghe, YU Ge. Deep Learning-based Heterogeneous Information Network Representation:A Survey [J]. Computer Science, 2023, 50(5): 103-114.
[4] GUO Ruyan, WANG Yan, FAN Jianxi, FAN Weibei. Optimal Embedding of Hierarchical Cubic Networks into Linear Arrays of NoC [J]. Computer Science, 2023, 50(4): 249-256.
[5] ZHOU Mingqiang, DAI Kailang, WU Quanwang, ZHU Qingsheng. Attention-aware Multi-channel Graph Convolutional Rating Prediction Model for Heterogeneous Information Networks [J]. Computer Science, 2023, 50(3): 129-138.
[6] HUANG Feihu, SHUAI Jianbo, PENG Jian. Collaborative Recommendation Based on Curriculum Learning and Graph Embedding [J]. Computer Science, 2023, 50(11A): 221100030-8.
[7] ZHU Jianyong, LI Zhaoxiang, XU Bin, YANG Hui, NIE Feiping. Orthogonal Locality Preserving Projection Unsupervised Feature Selection Based on Graph Embedding [J]. Computer Science, 2023, 50(11A): 220900003-9.
[8] CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11.
[9] ZHAO Xingwang, XUE Jinfang. Community Discovery Algorithm for Attributed Networks Based on Bipartite Graph Representation [J]. Computer Science, 2023, 50(11): 107-113.
[10] LIN Xueyuan, E Haihong , SONG Wenyu, LUO Haoran, SONG Meina. QubitE:Qubit Embedding for Knowledge Graph Completion [J]. Computer Science, 2023, 50(11): 201-209.
[11] LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100.
[12] DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178.
[13] HE Yi-chen, MAO Yi-jun, XIE Xian-fen, GU Wan-rong. Matrix Transformation and Factorization Based on Graph Partitioning by Vertex Separator for Recommendation [J]. Computer Science, 2022, 49(6A): 272-279.
[14] LI Yong, WU Jing-peng, ZHANG Zhong-ying, ZHANG Qiang. Link Prediction for Node Featureless Networks Based on Faster Attention Mechanism [J]. Computer Science, 2022, 49(4): 43-48.
[15] TANG Chun-yang, XIAO Yu-zhi, ZHAO Hai-xing, YE Zhong-lin, ZHANG Na. EWCC Community Discovery Algorithm for Two-Layer Network [J]. Computer Science, 2022, 49(4): 49-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!