{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:28:37Z","timestamp":1767864517799,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030953874","type":"print"},{"value":"9783030953881","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95388-1_40","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"603-614","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel GNN Model for\u00a0Fraud Detection in\u00a0Online Trading Activities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5381-7925","authenticated-orcid":false,"given":"Jing","family":"Long","sequence":"first","affiliation":[]},{"given":"Fei","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Awoyemi, J.O., Adetunmbi, A.O., Oluwadare, S.A.: Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 International Conference on Computing Networking and Informatics (ICCNI) (2017)","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"40_CR2","first-page":"235","volume":"17","author":"RJ Bolton","year":"2004","unstructured":"Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Oper. Res. 17, 235\u2013255 (2004)","journal-title":"Oper. Res."},{"key":"40_CR3","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.neunet.2018.07.011","volume":"106","author":"M Buda","year":"2018","unstructured":"Buda, M., Maki, A., Mazurowski, M.A.: A systematic study of the class imbalance problem in convolutional neural networks. Neural Netw. 106, 249\u2013259 (2018)","journal-title":"Neural Netw."},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2019","unstructured":"Carcillo, F., Borgne, Y., Caelen, O., Kessaci, Y., Bontempi, G.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. 557, 317\u2013331 (2019)","journal-title":"Inf. Sci."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., Liang, W., Xu, J., Wang, C., Li, K.C., Qiu, M.: An efficient service recommendation algorithm for cyber-physical-social systems. IEEE Trans. Netw. Sci. Eng. 1, 1\u201311 (2021)","DOI":"10.1109\/TNSE.2021.3092204"},{"key":"40_CR6","unstructured":"Dai, H., et al.: Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115\u20131124. PMLR (2018)"},{"key":"40_CR7","doi-asserted-by":"publisher","first-page":"24649","DOI":"10.1109\/ACCESS.2019.2899578","volume":"7","author":"SH Ebenuwa","year":"2019","unstructured":"Ebenuwa, S.H., Sharif, M.S., Alazab, M., Al-Nemrat, A.: Variance ranking attributes selection techniques for binary classification problem in imbalance data. IEEE Access 7, 24649\u201324666 (2019)","journal-title":"IEEE Access"},{"key":"40_CR8","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","volume":"479","author":"U Fiore","year":"2017","unstructured":"Fiore, U., Santis, A., Perla, F., Zanetti, P., Palmieri, F.: Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Inf. Sci. 479, 448\u2013455 (2017)","journal-title":"Inf. Sci."},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Gidaris, S., Komodakis, N.: Generating classification weights with GNN denoising autoencoders for few-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 21\u201330 (2019)","DOI":"10.1109\/CVPR.2019.00011"},{"key":"40_CR10","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 1025\u20131035 (2017)"},{"key":"40_CR11","unstructured":"Hechtlinger, Y., Chakravarti, P., Qin, J.: A generalization of convolutional neural networks to graph-structured data. arXiv preprint arXiv:1704.08165 (2017)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Hu, B., Zhang, Z., Shi, C., Zhou, J., Qi, Y.: Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism (2019)","DOI":"10.1609\/aaai.v33i01.3301946"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Kabuye, F., Nkundabanyanga, S.K., Opiso, J., Nakabuye, Z.: Internal audit organisational status, competencies, activities and fraud management in the financial services sector. Manag. Audit. J. 32(9), 924\u2013944 (2018)","DOI":"10.1108\/MAJ-09-2016-1452"},{"key":"40_CR14","doi-asserted-by":"publisher","first-page":"101694","DOI":"10.1016\/j.jcorpfin.2020.101694","volume":"66","author":"JM Karpoff","year":"2020","unstructured":"Karpoff, J.M.: The future of financial fraud. J. Corp. Finan. 66, 101694 (2020)","journal-title":"J. Corp. Finan."},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Li, A., Qin, Z., Liu, R., Yang, Y., Li, D.: Spam review detection with graph convolutional networks. In: 28th ACM International Conference on Information and Knowledge Management, pp. 2703\u20132711 (2019)","DOI":"10.1145\/3357384.3357820"},{"issue":"2","key":"40_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391297","volume":"17","author":"W Liang","year":"2021","unstructured":"Liang, W., Long, J., Li, K.C., Xu, J., Ma, N., Lei, X.: A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 17(2), 1\u201316 (2021)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., Li, K.C.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J. 1, 1\u201311 (2021)","DOI":"10.1109\/JIOT.2021.3053842"},{"key":"40_CR18","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1109\/TETC.2020.2993032","volume":"9","author":"W Liang","year":"2020","unstructured":"Liang, W., Zhang, D., Lei, X., Tang, M., Li, K.C., Zomaya, A.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 9, 1410\u20131420 (2020)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"40_CR19","unstructured":"Liu, Z., Chen, C., Yang, X., Zhou, J., Song, L.: Heterogeneous graph neural networks for malicious account detection (2020)"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection (2020)","DOI":"10.1145\/3397271.3401253"},{"issue":"5","key":"40_CR21","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1111\/joes.12294","volume":"16","author":"A Reurink","year":"2016","unstructured":"Reurink, A.: Financial fraud: a literature review. J. Econ. Surv. 16(5), 1292\u20131325 (2016)","journal-title":"J. Econ. Surv."},{"key":"40_CR22","first-page":"4175","volume":"13","author":"SS Waghade","year":"2018","unstructured":"Waghade, S.S., Karandikar, A.M.: A comprehensive study of healthcare fraud detection based on machine learning. Int. J. Appl. Eng. Res. 13, 4175\u20134178 (2018)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"40_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/11564096_42","volume-title":"Machine Learning: ECML 2005","author":"J Vermorel","year":"2005","unstructured":"Vermorel, J., Mohri, M.: Multi-armed bandit algorithms and empirical evaluation. In: Gama, J., Camacho, R., Brazdil, P.B., Jorge, A.M., Torgo, L. (eds.) ECML 2005. LNCS (LNAI), vol. 3720, pp. 437\u2013448. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11564096_42"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: 2019 IEEE International Conference on Data Mining (ICDM) (2020)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"40_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Heterogeneous graph attention network. In: The World Wide Web Conference, pp. 2022\u20132032 (2019)","DOI":"10.1145\/3308558.3313562"},{"issue":"jan.","key":"40_CR26","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.dss.2017.11.001","volume":"105","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Xu, W.: Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud. Decis. Supp. Syst. 105(jan.), 87\u201395 (2018)","journal-title":"Decis. Supp. Syst."},{"key":"40_CR27","unstructured":"Yu, Y., Chen, J., Gao, T., Yu, M.: DAG-GNN: dag structure learning with graph neural networks. In: International Conference on Machine Learning, pp. 7154\u20137163. PMLR (2019)"},{"key":"40_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Fan, Y., Ye, Y., Zhao, L., Shi, C.: Key player identification in underground forums over attributed heterogeneous information network embedding framework. In: the 28th ACM International Conference, pp. 549\u2013558 (2019)","DOI":"10.1145\/3357384.3357876"},{"key":"40_CR29","first-page":"1","volume":"2018","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Zhou, X., Zhang, X., Wang, L., Wang, P.: A model based on convolutional neural network for online transaction fraud detection. Secur. Commun. Netw. 2018, 1\u20139 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"40_CR30","unstructured":"Zhou, K., Song, Q., Huang, X., Hu, X.: Auto-GNN: Neural architecture search of graph neural networks. arXiv preprint arXiv:1909.03184 (2019)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95388-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:32:45Z","timestamp":1645518765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95388-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953874","9783030953881"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95388-1_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}