{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:20:47Z","timestamp":1766067647060,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031209833"},{"type":"electronic","value":"9783031209840"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20984-0_44","type":"book-chapter","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T01:02:58Z","timestamp":1669078978000},"page":"616-631","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["IDGL: An Imbalanced Disassortative Graph Learning Framework for\u00a0Fraud Detection"],"prefix":"10.1007","author":[{"given":"Junhang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ruimin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Dengshi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lingfei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wenyi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yilong","family":"Zang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,22]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Bo, D., Wang, X., Shi, C., Shen, H.: Beyond low-frequency information in graph convolutional networks. arXiv preprint arXiv:2101.00797 (2021)","DOI":"10.1609\/aaai.v35i5.16514"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Cui, G., Zhou, J., Yang, C., Liu, Z.: Adaptive graph encoder for attributed graph embedding. In: KDD, pp. 976\u2013985 (2020)","DOI":"10.1145\/3394486.3403140"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: CIKM, pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Dou, Y., Ma, G., Yu, P.S., Xie, S.: Robust spammer detection by nash reinforcement learning. In: KDD, pp. 924\u2013933 (2020)","DOI":"10.1145\/3394486.3403135"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Ge, S., Ma, G., Xie, S., Philip, S.Y.: Securing behavior-based opinion spam detection. In: 2018 IEEE BigData, pp. 112\u2013117. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622582"},{"key":"44_CR6","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: NeurIPS, vol. 30 (2017)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Kaghazgaran, P., Alfifi, M., Caverlee, J.: Wide-ranging review manipulation attacks: model, empirical study, and countermeasures. In: CIKM, pp. 981\u2013990 (2019)","DOI":"10.1145\/3357384.3358034"},{"key":"44_CR8","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Li, Q., Wu, X.M., Liu, H., Zhang, X., Guan, Z.: Label efficient semi-supervised learning via graph filtering. In: CVPR, pp. 9582\u20139591 (2019)","DOI":"10.1109\/CVPR.2019.00981"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Pick and choose: a GNN-based imbalanced learning approach for fraud detection. In: WWW, pp. 3168\u20133177 (2021)","DOI":"10.1145\/3442381.3449989"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: SIGIR, pp. 1569\u20131572 (2020)","DOI":"10.1145\/3397271.3401253"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Yang, X., Zhou, J., Li, X., Song, L.: Heterogeneous graph neural networks for malicious account detection. In: CIKM, pp. 2077\u20132085 (2018)","DOI":"10.1145\/3269206.3272010"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"McAuley, J.J., Leskovec, J.: From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In: WWW, pp. 897\u2013908 (2013)","DOI":"10.1145\/2488388.2488466"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., Wu, J.: H2-FDetector: a GNN-based fraud detector with homophilic and heterophilic connections. In: WWW, pp. 1486\u20131494 (2022)","DOI":"10.1145\/3485447.3512195"},{"key":"44_CR15","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: ICDM, pp. 598\u2013607. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Wang, J., Wen, R., Wu, C., Huang, Y., Xion, J.: FdGars: fraudster detection via graph convolutional networks in online app review system. In: WWW, pp. 310\u2013316 (2019)","DOI":"10.1145\/3308560.3316586"},{"key":"44_CR18","unstructured":"Wu, F., Souza, A., Zhang, T., Fifty, C., Yu, T., Weinberger, K.: Simplifying graph convolutional networks. In: ICML, pp. 6861\u20136871. PMLR (2019)"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, G., et al.: FRAUDRE: fraud detection dual-resistant to graph inconsistency and imbalance. In: 2021 ICDM, pp. 867\u2013876. IEEE (2021)","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Zhong, Q., et al.: Financial defaulter detection on online credit payment via multi-view attributed heterogeneous information network. In: WWW, pp. 785\u2013795 (2020)","DOI":"10.1145\/3366423.3380159"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20984-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T20:05:17Z","timestamp":1734984317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20984-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209833","9783031209840"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20984-0_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc2022.spilab.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}