{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:55:30Z","timestamp":1771700130660,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61906219"],"award-info":[{"award-number":["61906219"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412690","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T07:01:44Z","timestamp":1603090904000},"page":"2901-2908","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["BotSpot"],"prefix":"10.1145","author":[{"given":"Tianjun","family":"Yao","sequence":"first","affiliation":[{"name":"Mobvista Inc., Guangzhou, China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Mobvista Inc., Guangzhou, China"}]},{"given":"Shangsong","family":"Liang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Yadong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Mobvista Inc., Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AppsFlyer. 2019. 2019 Fraud Trends Uncover Fascinating Results. https:\/\/scalarr. io\/research\/articles\/latest-trends-in-mobile-ad-fraud-2019. Accessed on 2019- 12--19.  AppsFlyer. 2019. 2019 Fraud Trends Uncover Fascinating Results. https:\/\/scalarr. io\/research\/articles\/latest-trends-in-mobile-ad-fraud-2019. Accessed on 2019- 12--19."},{"key":"e_1_3_2_2_2_1","volume-title":"Random forests. Machine learning 45, 1","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine learning 45, 1 ( 2001 ), 5--32. Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5--32."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A scalable tree boosting system. In KDD.  Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A scalable tree boosting system. In KDD.","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_4_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NIPS.  Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NIPS."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3345306"},{"key":"e_1_3_2_2_6_1","volume-title":"Worldwide mobile ad spending increases to 240.95 billion dollars","year":"2019","unstructured":"eMarketer. 2019. Worldwide mobile ad spending increases to 240.95 billion dollars in 2019 . https:\/\/www.emarketer.com\/forecasts\/5a4e4662d8690c0c28d1f233. eMarketer. 2019. Worldwide mobile ad spending increases to 240.95 billion dollars in 2019. https:\/\/www.emarketer.com\/forecasts\/5a4e4662d8690c0c28d1f233."},{"key":"e_1_3_2_2_7_1","unstructured":"Marco Gori Dipartimento Ingegneria and Gabriele Monfardini. 2005. A New Model for Learning in Graph Domains. In IJCNN.  Marco Gori Dipartimento Ingegneria and Gabriele Monfardini. 2005. A New Model for Learning in Graph Domains. In IJCNN."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Aditya Grover and Jure Leskovec. 2016. Node2vec: Scalable feature learning for networks. In KDD.  Aditya Grover and Jure Leskovec. 2016. Node2vec: Scalable feature learning for networks. In KDD.","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_9_1","volume-title":"Atif Hasan Rahman, and M. Sohel Rahman","author":"Rakin Haider Ch Md","year":"2018","unstructured":"Ch Md Rakin Haider , Anindya Iqbal , Atif Hasan Rahman, and M. Sohel Rahman . 2018 . An ensemble learning based approach for impression fraud detection in mobile advertising. Journal of Network and Computer Applications ( 2018). Ch Md Rakin Haider, Anindya Iqbal, Atif Hasan Rahman, and M. Sohel Rahman. 2018. An ensemble learning based approach for impression fraud detection in mobile advertising. Journal of Network and Computer Applications (2018)."},{"key":"e_1_3_2_2_10_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034."},{"key":"e_1_3_2_2_11_1","volume-title":"IEEE 12th International Conference on Ubiquitous Intelligence and Computing.","author":"Jiarui Xu","year":"2016","unstructured":"Xu Jiarui and Li Chen . 2016 . Detecting crowdsourcing click fraud in search advertising based on clustering analysis . In IEEE 12th International Conference on Ubiquitous Intelligence and Computing. Xu Jiarui and Li Chen. 2016. Detecting crowdsourcing click fraud in search advertising based on clustering analysis. In IEEE 12th International Conference on Ubiquitous Intelligence and Computing."},{"key":"e_1_3_2_2_12_1","unstructured":"Guolin Ke Qi Meng Thomas Finley Taifeng Wang Wei Chen Weidong Ma Qiwei Ye and Tie Yan Liu. 2017. LightGBM: A highly efficient gradient boosting decision tree. In NIPS.  Guolin Ke Qi Meng Thomas Finley Taifeng Wang Wei Chen Weidong Ma Qiwei Ye and Tie Yan Liu. 2017. LightGBM: A highly efficient gradient boosting decision tree. In NIPS."},{"key":"e_1_3_2_2_13_1","volume-title":"BERT paper. arXiv:1810.04805 [cs]","author":"Kenton Chang","year":"2017","unstructured":"Ming-wei Chang Kenton , Lee Kristina , and Jacob Devlin . 2017. BERT paper. arXiv:1810.04805 [cs] ( 2017 ). Ming-wei Chang Kenton, Lee Kristina, and Jacob Devlin. 2017. BERT paper. arXiv:1810.04805 [cs] (2017)."},{"key":"e_1_3_2_2_14_1","volume-title":"ICLR","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Lei Ba. 2015. Adam: A method for stochastic optimization . In ICLR 2015 . Diederik P. Kingma and Jimmy Lei Ba. 2015. Adam: A method for stochastic optimization. In ICLR 2015."},{"key":"e_1_3_2_2_15_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling . 2017 . Semi-supervised classification with graph convolutional networks. In ICLR. Thomas N. Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM.  Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM.","DOI":"10.1145\/3357384.3357820"},{"key":"e_1_3_2_2_17_1","unstructured":"Qimai Li Zhichao Han and Xiao Ming Wu. 2018. Deeper insights into graph convolutional networks for semi-supervised learning. In AAAI.  Qimai Li Zhichao Han and Xiao Ming Wu. 2018. Deeper insights into graph convolutional networks for semi-supervised learning. In AAAI."},{"key":"e_1_3_2_2_18_1","volume-title":"Unsupervised Semantic Generative Adversarial Networks for Expert Retrieval. In The World Wide Web Conference. 1039--1050","author":"Liang Shangsong","year":"2019","unstructured":"Shangsong Liang . 2019 . Unsupervised Semantic Generative Adversarial Networks for Expert Retrieval. In The World Wide Web Conference. 1039--1050 . Shangsong Liang. 2019. Unsupervised Semantic Generative Adversarial Networks for Expert Retrieval. In The World Wide Web Conference. 1039--1050."},{"key":"e_1_3_2_2_19_1","volume-title":"SSD: Single shot multibox detector. In ECCV. 21--37.","author":"Liu Wei","year":"2016","unstructured":"Wei Liu , Dragomir Anguelov , Dumitru Erhan , Christian Szegedy , Scott Reed , Cheng-Yang Fu , and Alexander C Berg . 2016 . SSD: Single shot multibox detector. In ECCV. 21--37. Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. SSD: Single shot multibox detector. In ECCV. 21--37."},{"key":"e_1_3_2_2_20_1","unstructured":"Zaiqiao Meng Shangsong Liang Jinyuan Fang and Teng Xiao. 2019. Semisupervisedly co-embedding attributed networks. In Advances in Neural Information Processing Systems. 6507--6516.  Zaiqiao Meng Shangsong Liang Jinyuan Fang and Teng Xiao. 2019. Semisupervisedly co-embedding attributed networks. In Advances in Neural Information Processing Systems. 6507--6516."},{"key":"e_1_3_2_2_21_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed representations ofwords and phrases and their compositionality. In NIPS.  Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed representations ofwords and phrases and their compositionality. In NIPS."},{"key":"e_1_3_2_2_22_1","first-page":"8024","article-title":"PyTorch: An Imperative Style, High-Performance Deep Learning Library","volume":"32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019 . PyTorch: An Imperative Style, High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems 32. 8024 -- 8035 . Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. 8024--8035.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Bryan Perozzi Rami Al-Rfou and Steven Skiena. 2014. DeepWalk: Online learning of social representations. In KDD.  Bryan Perozzi Rami Al-Rfou and Steven Skiena. 2014. DeepWalk: Online learning of social representations. In KDD.","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_24_1","volume-title":"2014 IEEE International Conference on Computational Intelligence and Computing Research.","author":"Purwar Archana","year":"2015","unstructured":"Archana Purwar and Sandeep Kumar Singh . 2015 . Issues in data mining: A comprehensive survey . In 2014 IEEE International Conference on Computational Intelligence and Computing Research. Archana Purwar and Sandeep Kumar Singh. 2015. Issues in data mining: A comprehensive survey. In 2014 IEEE International Conference on Computational Intelligence and Computing Research."},{"key":"e_1_3_2_2_25_1","volume-title":"Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava , Geoffrey Hinton , Alex Krizhevsky , Ilya Sutskever , and Ruslan Salakhutdinov . 2014 . Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research (2014). Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research (2014)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2015.7346672"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 2019 ACM Southeast Conference.","author":"Thejas G. S.","unstructured":"G. S. Thejas , Kianoosh G. Boroojeni , Kshitij Chandna , Isha Bhatia , S. S. Iyengar , and N. R. Sunitha . 2019. Deep learning-based model to fight against Ad click fraud . In Proceedings of the 2019 ACM Southeast Conference. G. S. Thejas, Kianoosh G. Boroojeni, Kshitij Chandna, Isha Bhatia, S. S. Iyengar, and N. R. Sunitha. 2019. Deep learning-based model to fight against Ad click fraud. In Proceedings of the 2019 ACM Southeast Conference."},{"key":"e_1_3_2_2_29_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS. 5998--6008."},{"key":"e_1_3_2_2_30_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Cucurull Guillem","year":"2017","unstructured":"Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Lio , and Yoshua Bengio . 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 ( 2017 ). Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.98"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50039-1"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:54Z","timestamp":1750197774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412690"}},"subtitle":["A Hybrid Learning Framework to Uncover Bot Install Fraud in Mobile Advertising"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":32,"alternative-id":["10.1145\/3340531.3412690","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412690","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}