{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:19:57Z","timestamp":1767453597165,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608201"},{"type":"electronic","value":"9789819608218"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0821-8_19","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:02:30Z","timestamp":1734152550000},"page":"275-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GEM-GNN: Group Enhanced Multi-relation Graph Neural Networks for\u00a0Fraud Detection"],"prefix":"10.1007","author":[{"given":"Longxun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ziyang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Mengmeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Han","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Huaming","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ali, A., Abd\u00a0Razak, S., Othman, S.H., Eisa, T.A.E., Al-Dhaqm, A., Nasser, M., Elhassan, T., Elshafie, H., Saif, A.: Financial fraud detection based on machine learning: a systematic literature review. Applied Sciences 12(19), 9637 (2022)","DOI":"10.3390\/app12199637"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Asha, R., KR, S.K.: Credit card fraud detection using artificial neural network. Global Transitions Proceedings 2(1), 35\u201341 (2021)","DOI":"10.1016\/j.gltp.2021.01.006"},{"issue":"6","key":"19_CR3","first-page":"6278","volume":"35","author":"D Cheng","year":"2022","unstructured":"Cheng, D., Niu, Z., Li, J., Jiang, C.: Regulating systemic crises: Stemming the contagion risk in networked-loans through deep graph learning. IEEE Trans. Knowl. Data Eng. 35(6), 6278\u20136289 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR4","unstructured":"Cheng, D., Wang, X., Zhang, Y., Zhang, L.: Graph neural network for fraud detection via spatial-temporal attention. IEEE Transactions on Knowledge and Data Engineering (2020)"},{"key":"19_CR5","volume-title":"Consumer sentinel network data book 2023","author":"FT Commission","year":"2023","unstructured":"Commission, F.T.: Consumer sentinel network data book 2023. Tech. rep, Federal Trade Commission (2023)"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ins.2022.10.072","volume":"618","author":"Z Deng","year":"2022","unstructured":"Deng, Z., Xin, G., Liu, Y., Wang, W., Wang, B.: Contrastive graph neural network-based camouflaged fraud detector. Inf. Sci. 618, 39\u201352 (2022)","journal-title":"Inf. Sci."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM international conference on information & knowledge management. pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","volume":"479","author":"U Fiore","year":"2019","unstructured":"Fiore, U., De Santis, A., Perla, F., Zanetti, P., Palmieri, F.: Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Inf. Sci. 479, 448\u2013455 (2019)","journal-title":"Inf. Sci."},{"issue":"4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TBDATA.2021.3132672","volume":"8","author":"N Jiang","year":"2021","unstructured":"Jiang, N., Duan, F., Chen, H., Huang, W., Liu, X.: Mafi: Gnn-based multiple aggregators and feature interactions network for fraud detection over heterogeneous graph. IEEE Transactions on Big Data 8(4), 905\u2013919 (2021)","journal-title":"IEEE Transactions on Big Data"},{"key":"19_CR10","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"19_CR11","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Li, A., Qin, Z., Liu, R., Yang, Y., Li, D.: Spam review detection with graph convolutional networks. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management. pp. 2703\u20132711 (2019)","DOI":"10.1145\/3357384.3357820"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ao, X., Qin, Z., Chi, J., Feng, J., Yang, H., He, Q.: Pick and choose: a gnn-based imbalanced learning approach for fraud detection. In: Proceedings of the web conference 2021. pp. 3168\u20133177 (2021)","DOI":"10.1145\/3442381.3449989"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Li, L., Zhou, J., Li, X., Song, L., Qi, Y.: Geniepath: Graph neural networks with adaptive receptive paths. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a033, pp. 4424\u20134431 (2019)","DOI":"10.1609\/aaai.v33i01.33014424"},{"issue":"12","key":"19_CR15","doi-asserted-by":"publisher","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma, X., Wu, J., Xue, S., Yang, J., Zhou, C., Sheng, Q.Z., Xiong, H., Akoglu, L.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. 35(12), 12012\u201312038 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"McAuley, J.J., Leskovec, J.: From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In: Proceedings of the 22nd international conference on World Wide Web. pp. 897\u2013908 (2013)","DOI":"10.1145\/2488388.2488466"},{"key":"19_CR17","unstructured":"McMahan, B.: Follow-the-regularized-leader and mirror descent: Equivalence theorems and l1 regularization. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. pp. 525\u2013533. JMLR Workshop and Conference Proceedings (2011)"},{"issue":"13","key":"19_CR18","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.14778\/3007263.3007285","volume":"9","author":"T Milo","year":"2016","unstructured":"Milo, T., Novgorodov, S., Tan, W.C.: Rudolf: interactive rule refinement system for fraud detection. Proceedings of the VLDB Endowment 9(13), 1465\u20131468 (2016)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: Bridging review networks and metadata. In: Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining. pp. 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"19_CR20","unstructured":"Sahin, Y., Duman, E.: Detecting credit card fraud by decision trees and support vector machines. In: Proceedings of the International MultiConference of Engineers and Computer Scientists. vol.\u00a01, pp.\u00a01\u20136 (2011)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., Wu, J.: H2-fdetector: A gnn-based fraud detector with homophilic and heterophilic connections. In: Proceedings of the ACM Web Conference 2022. pp. 1486\u20131494 (2022)","DOI":"10.1145\/3485447.3512195"},{"key":"19_CR22","unstructured":"Srivastava, A., Yadav, M., Basu, S., Salunkhe, S., Shabad, M.: Credit card fraud detection at merchant side using neural networks. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). pp. 667\u2013670. IEEE (2016)"},{"key":"19_CR23","unstructured":"Su, J., Zhang, H.: A fast decision tree learning algorithm. In: Aaai. vol.\u00a06, pp. 500\u2013505 (2006)"},{"key":"19_CR24","unstructured":"Tang, J., Li, J., Gao, Z., Li, J.: Rethinking graph neural networks for anomaly detection. In: International Conference on Machine Learning. pp. 21076\u201321089. PMLR (2022)"},{"key":"19_CR25","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C.: Overview of digital finance anti-fraud. In: Anti-Fraud Engineering for Digital Finance: Behavioral Modeling Paradigm, pp. 1\u201310. Springer (2023)","DOI":"10.1007\/978-981-99-5257-1_1"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Wang, D., Lin, J., Cui, P., Jia, Q., Wang, Z., Fang, Y., Yu, Q., Zhou, J., Yang, S., Qi, Y.: A semi-supervised graph attentive network for financial fraud detection. In: 2019 IEEE International Conference on Data Mining (ICDM). pp. 598\u2013607. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Wang, X., Ji, H., Shi, C., Wang, B., Ye, Y., Cui, P., Yu, P.S.: Heterogeneous graph attention network. In: The world wide web conference. pp. 2022\u20132032 (2019)","DOI":"10.1145\/3308558.3313562"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Wang, X., Dong, G.: Research on money laundering detection based on improved minimum spanning tree clustering and its application. In: 2009 Second international symposium on knowledge acquisition and modeling. vol.\u00a02, pp. 62\u201364. IEEE (2009)","DOI":"10.1109\/KAM.2009.221"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Wu, J., Liu, X., Cheng, D., Ouyang, Y., Wu, X., Zheng, Y.: Safeguarding fraud detection from attacks: A robust graph learning approach. In: Proceedings of the 33rd International Joint Conference on Artificial Intelligence (2024)","DOI":"10.24963\/ijcai.2024\/830"},{"issue":"1","key":"19_CR31","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE transactions on neural networks and learning systems 32(1), 4\u201324 (2020)","journal-title":"IEEE transactions on neural networks and learning systems"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Xiang, S., Zhu, M., Cheng, D., Li, E., Zhao, R., Ouyang, Y., Chen, L., Zheng, Y.: Semi-supervised credit card fraud detection via attribute-driven graph representation. In: Proceedings of the AAAI Conference on Artificial Intelligence (2023)","DOI":"10.1609\/aaai.v37i12.26702"},{"key":"19_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2023.114037","volume":"175","author":"B Xu","year":"2023","unstructured":"Xu, B., Wang, Y., Liao, X., Wang, K.: Efficient fraud detection using deep boosting decision trees. Decis. Support Syst. 175, 114037 (2023)","journal-title":"Decis. Support Syst."},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, G., Wu, J., Yang, J., Beheshti, A., Xue, S., Zhou, C., Sheng, Q.Z.: Fraudre: Fraud detection dual-resistant to graph inconsistency and imbalance. In: 2021 IEEE International Conference on Data Mining (ICDM). pp. 867\u2013876. IEEE (2021)","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Zou, Y., Cheng, D.: Effective high-order graph representation learning for credit card fraud detection. In: Proceedings of the 33rd International Joint Conference on Artificial Intelligence (2024)","DOI":"10.24963\/ijcai.2024\/839"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0821-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:09:13Z","timestamp":1734152953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0821-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9789819608201","9789819608218"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0821-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}