Publications
2023
- ICC 2023User and Interaction both Matter: Social Relationship Mining via Interaction Graph PropagatingYilong Zang, Ruimin Hu, Xixi Li, Zheng Wang, and Dengshi LiICC 2023-IEEE International Conference on Communications, 2023
Social relationship mining benefits many applications such as leadership analysis and advisor recommendation. Existing methods focus on mining user relationships only from the perspective of user-level. To our knowledge, from this perspective, representing the user interactions by edges is not sufficient for the complex information about interactions between users. In addition, mining users’ relationship independently ignores the propagation of social interaction across networks. In this paper, we investigate social relationship mining from a new perspective of interaction-level. We propose an Interaction Graph Propagating(IGP) model which constructs an interaction graph. It not only captures the user interaction information as the union but also exploits the propagation between user interactions. In particular, we utilize the graph attention mechanism to distinguish the contributions of each neighbor union. Experimental results on several public datasets demonstrate that IGP achieves significant improvements over state-of-the-art methods.
- IJCAI 2023Don’t Ignore Alienation and Marginalization: Correlating Fraud DetectionYilong Zang, Ruimin Hu, Zheng Wang, Danni Xu, Jia Wu, Dengshi Li, Junhang Wu, and Ren LingfeiIn IJCAI 2023, 2023
The anonymity of online networks makes tackling fraud increasingly costly. Thanks to the superiority of graph representation learning, graph-based fraud detection has made significant progress in recent years. However, upgrading fraudulent strategies produces more advanced and difficult scams. One common strategy is synergistic camouflage —— combining multiple means to deceive others. Existing methods mostly investigate the differences between relations on individual frauds, that neglect the correlation among multi-relation fraudulent behaviors. In this paper, we design several statistics to validate the existence of synergistic camouflage of fraudsters by exploring the correlation among multi-relation interactions. From the perspective of multi-relation, we find two distinctive features of fraudulent behaviors, i.e., alienation and marginalization. Based on the finding, we propose COFRAUD, a correlation-aware fraud detection model, which innovatively incorporates synergistic camouflage into fraud detection. It captures the correlation among multi-relation fraudulent behaviors. Experimental results on two public datasets demonstrate that COFRAUD achieves significant improvements over state-of-the-art methods.
- KBSDynamic graph neural network-based fraud detectors against collaborative fraudstersLingfei Ren, Ruimin Hu, Dengshi Li, Yang Liu, Junhang Wu, Yilong Zang, and Wenyi HuKnowledge-Based Systems, 2023
Telecom fraud detection is a challenging task since the fact that fraudulent behaviors are hidden in the vast amount of telecom records. More concerning, the ongoing coronavirus pandemic (COVID-19) accelerated the use of mobile internet, providing more criminal opportunities for fraudsters. However, current telecom fraud detection mostly focuses on individual sequences representation, rarely noticing the collaboration of fraudsters, making it exhibit unsatisfactory performance in the face of gang crimes. To address this problem, we propose to extract collaborative networks from user call logs with an emphasis on unveiling collaborative fraud. We employ eight months of telecom datasets in China with 6,106 users and 5.0 million call logs between 1.25 million telephone recipients. Through our study, we find that the social structure of fraudsters evolute rapidly while the normal users remain stable relatively. In addition, we find that mining collaborative fraud strategies help to detect fraudsters with less distinct fraud characteristics. To this end, we propose a novel model named COllaborative-REsistant Dynamic Graph Neural Network (CORE-DGNN), to enhance the dynamic GNN aggregation process. Specifically, we first use co-recipients to obtain the collaborative network under each time slice. Then, we design a multi-frequency graph neural network to adaptively aggregate the features of node neighbors at different frequencies to address the problem of heterophily in collaborative networks. Finally, a self-attentive temporal convolutional network is designed to aggregate node embedding features across multiple time spans. Comprehensive experiments on two real-world telecom fraud datasets show that our approach outperforms several state-of-the-art algorithms.
- ACM MM 2023Collaborative Fraud Detection: How Collaboration Impacts Fraud DetectionJinzhang Hu, Ruimin Hu, Zheng Wang, Dengshi Li, Junhang Wu, Lingfei Ren, Yilong Zang, Zijun Huang, and Mei WangIn The ACM Multimedia 2023, 2023
Collaborative fraud has become increasingly serious in telecom and social networks, but is hard to detect by traditional fraud detection methods. In this paper, we find a significant positive correlation between the increase of collaborative fraud and the degraded detection performance of traditional techniques, implying that those fraudsters that are difficult to detect with traditional methods are often collaborative in their fraudulent behavior. As we know, multiple objects may contact a single target object over a period of time. We define multiple objects with the same contact target as generalized objects, and their social behaviors can be combined and processed as the social behaviors of one object. We propose Fraud Detection Model based on Second-order and Collaborative Relationship Mining (COFD), exploring new research avenues for collaborative fraud detection. Our code and data are released at https://anonymous.4open.science/r/cofd-18D4
2022
- ICSOC 2022IDGL: An Imbalanced Disassortative Graph Learning Framework for Fraud DetectionJunhang Wu, Ruimin Hu, Dengshi Li, Lingfei Ren, Wenyi Hu, and Yilong ZangService-Oriented Computing: 20th International Conference, 2022
The thriving growth of Internet service not only facilitates our daily lives but also incubates various fraudulent activities with concealment. The traceable interactive behaviors forming the graph-like data provide a great opportunity for graph-based fraud detection. Owing to the stellar performance of assortative graph learning, GNN-based fraud detection methods escalate much attention. However, the fraud graph is not always assortative but more likely disassortative as the fraudsters usually camouflage themselves via building numerous connections with normal users. Additionally, the GNN-based fraud detection methods also suffer from graph imbalance issues as the number of fraudsters is far less than that of the normal users. To address these problems, an imbalanced disassortative graph learning framework (IDGL) is proposed with two key components. First, an adaptive dual-channel convolution filter is developed to adaptively combine the advantage of low- and high-frequency signals from its neighbors so as to assimilate the nodes with assortative edges and discriminate the nodes with disassortative edges. Second, a label-aware nodes and edges sampler is designed with the consideration of nodes’ popularity and corresponding label class frequency, which helps the model simultaneously eliminate the bias towards the major classes and pay more attention to the valuable connections (fraud-fraud, fraud-benign). Extensive experiments on two public fraud datasets demonstrate the effectiveness of our method.
@inproceedings{wu2022idgl, title={IDGL: An Imbalanced Disassortative Graph Learning Framework for Fraud Detection}, author={Wu, Junhang and Hu, Ruimin and Li, Dengshi and Ren, Lingfei and Hu, Wenyi and Zang, Yilong}, booktitle={Service-Oriented Computing: 20th International Conference, ICSOC 2022, Seville, Spain, November 29–December 2, 2022, Proceedings}, pages={616–631}, year={2022}, organization={Springer} }
- ICSOC 2022A Bi-directional Category-Aware Multi-task Learning Framework for Missing Check-in POI IdentificationJunhang Wu, Ruimin Hu, Dengshi Li, Lingfei Ren, Wenyi Hu, and Yilong ZangService-Oriented Computing: 20th International Conference, 2022
The prevalence of Location-based Social Networks (LBSNs) services makes next personalized Point-of-Interest (POI) prediction become a research topic. However, due to device failure or intention camouflage, geolocation information missing prevents existing POI-oriented studies for advanced user preference analysis. Herein, we proposed a Bi-directional category-aware multi-task learning (Bi-CatMTL) framework, which fuses bi-direction spatiotemporal transition patterns and personalized dynamic preference to identify where the user has been at a past specific time, namely missing POI identification. Specifically, Bi-CatMTL introduces: (1) a two-channel encoder, i.e., spatial-aware POI encoder and temporal-aware category encoder, to capture user bi-directional dual-grained mobility transition patterns; (2) a task-oriented decoder to fuse learned transition patterns and personalized preference for multi-task prediction; (3) a POI2Cat matrix to make full use of both types of sequential dependencies. Extensive experiments demonstrate the superiority of our model, and it can also be adaptively extended to next POI prediction task with the convincing performance.
@inproceedings{wu2022bi, title={A Bi-directional Category-Aware Multi-task Learning Framework for Missing Check-in POI Identification}, author={Wu, Junhang and Hu, Ruimin and Li, Dengshi and Ren, Lingfei and Hu, Wenyi and Zang, Yilong}, booktitle={Service-Oriented Computing: 20th International Conference, ICSOC 2022, Seville, Spain, November 29–December 2, 2022, Proceedings}, pages={584–599}, year={2022}, organization={Springer} }
- LCN 2022Cross-Regional Friendship Inference via Category-Aware Multi-Bipartite Graph EmbeddingLingfei Ren, Ruimin Hu, Dengshi Li, Junhang Wu, Yilong Zang, and Wenyi HuIn 2022 IEEE 47th Conference on Local Computer Networks (LCN), 2022
This paper proposes a novel problem of cross-regional friendship inference to solve the geographically restricted friends recommendation. Traditional approaches rely on a fundamental assumption that friends tend to be co-location, which is unrealistic for inferring friendship across regions. By reviewing a large-scale Location-based Social Networks (LBSNs) dataset, we spot that cross-regional users are more likely to form a friendship when their mobility neighbors are of high similarity. To this end, we propose Category-Aware Multi-Bipartite Graph Embedding (CMGE for short) for cross-regional friendship inference. We first utilize multi-bipartite graph embedding to capture users’ Point of Interest (POI) neighbor similarity and activity category similarity simultaneously, then the contributions of each POI and category are learned by a category-aware heterogeneous graph attention network. Experiments on the real-world LBSNs datasets demonstrate that CMGE outperforms state-of-the-art baselines.
- HPCC 2022Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network.Dengshi Li, Lu Zeng, Rumin Hu, Zijun Huang, Xiaocong Liang, and Yilong ZangIn 2022 IEEE 23rd Int Conf on High Performance Computing & Communications (HPCC), 2022
In telecom network fraud, the fraud method of the fraudsters varies significantly in different periods. However, the traditional method of telecom fraud is to train the telecom fraud mining model through the user’s long-term telephone data. So they can not detect the new fraud method of fraudsters and can not identify those with only have short-term telephone data. To increase the identification precision of telecom fraudsters, the dynamic changes in social structure and behavior pattern features of fraudsters were studied in this paper. Specifically, from the perspective of social structure change, the social structure of fraudsters changes rapidly over time. In contrast, the social structure of normal users is stable over time. From the perspective of user behavior pattern features, we found that the behavior patterns of fraudsters and normal users were very different. The behavior pattern of fraudsters in the different periods also changes significantly. Therefore, a telecom network fraud detection framework based on the social relationship evolution model was proposed. We designed the feature extraction method of dynamic telephone social behavior patterns based on time slices. The method combines the features of social structure and behavior patterns of users. And the Telephone Network Fraud Detection(TNFD) model is built using LSTM. We set up a sliding time window to enable the model to identify users with only short-term telephone data. This time window dynamically takes the features of the user’s telephone social behavior pattern as the input of the TNFD model. Experiments on real dataset show that the precision of TNFD is 7% higher than that of the latest method. Our research may reference public security organs in telecom fraud cases.
- IJCNN 2022ITC: Influential-Truss Community SearchDengshi Li, Lu Zeng, Ruimin Hu, Xiaocong Liang, and Yilong ZangIn 2022 International Joint Conference on Neural Networks (IJCNN), 2022
Community search is a method of finding a com-munity closely related to a query node. The latest influence community search considers both the structural cohesion of the community and the influence between nodes. It sets the influence threshold to constrain the output community. However, artificially setting the influence threshold makes the output community too large or too small, which leads to low accuracy of the output community. In order to avoid the low accuracy of community search caused by artificially setting influence thresh-old constraints, this paper studies the community search problem based on community influence score. In this paper, an influence-truss community (ITC) model is proposed for community search by combining structural cohesion and community influence score. This model aims to obtain a connected subgraph in a social network containing the query node, which satisfies structural cohesion and satisfies the subgraph’s maximum community in-fluence score. In order to obtain ITC, an effective pruning method is proposed, which strips other nodes far away from the query node. Then, the ITCS algorithm is designed, which firstly imposes structural cohesion constraints on query nodes. Then, the search community’s influence scores are iteratively calculated until the community has the highest community influence score under the condition of meeting the structural cohesion. Experiments on real-world networks of different scales show that the community search accuracy index of ITCS is improved by about 20% compared with the traditional method.