{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T20:04:23Z","timestamp":1770235463359,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["NSFC (61702447)"],"award-info":[{"award-number":["NSFC (61702447)"]}]},{"name":"Chinese Knowledge Center of Engineering Science and Technology (CKCEST)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3358052","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"2043-2052","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Understanding Default Behavior in Online Lending"],"prefix":"10.1145","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Yuhong","family":"Xu","sequence":"additional","affiliation":[{"name":"Netease Inc., Hangzhou, China"}]},{"given":"Chunping","family":"Wang","sequence":"additional","affiliation":[{"name":"PPDAI Group Inc., Shanghai, China"}]},{"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Fei","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Yueting","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[{"name":"PPDAI Group Inc., Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Opinion Fraud Detection in Online Reviews by Network Effects","volume":"13","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013 . Opinion Fraud Detection in Online Reviews by Network Effects . ICWSM 13 (2013), 2 -- 11 . Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. ICWSM 13 (2013), 2--11.","journal-title":"ICWSM"},{"key":"e_1_3_2_1_2_1","unstructured":"Leman Akoglu and Christos Faloutsos. 2010. Event detection in time series of mobile communication graphs. In Army science conference. 77--79.  Leman Akoglu and Christos Faloutsos. 2010. Event detection in time series of mobile communication graphs. In Army science conference. 77--79."},{"key":"e_1_3_2_1_3_1","volume-title":"PAKDD'10","author":"Akoglu Leman","unstructured":"Leman Akoglu , Mary McGlohon , and Christos Faloutsos . 2010. Oddball: Spotting anomalies in weighted graphs. In PAKDD'10 . Springer , 410--421. Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball:Spotting anomalies in weighted graphs. In PAKDD'10. Springer, 410--421."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0362-z"},{"key":"e_1_3_2_1_5_1","volume-title":"Statistical fraud detection: A review. Statistical science","author":"Bolton Richard J","year":"2002","unstructured":"Richard J Bolton and David J Hand . 2002. Statistical fraud detection: A review. Statistical science ( 2002 ), 235--249. Richard J Bolton and David J Hand. 2002. Statistical fraud detection: A review. Statistical science (2002), 235--249."},{"key":"e_1_3_2_1_6_1","volume-title":"A graph-theoretic approach to enterprise network dynamics","author":"Bunke Horst","unstructured":"Horst Bunke , Peter J Dickinson , Miro Kraetzl , and Walter D Wallis . 2007. A graph-theoretic approach to enterprise network dynamics . Vol. 24 . Springer Science & Business Media . Horst Bunke, Peter J Dickinson, Miro Kraetzl, and Walter D Wallis. 2007. A graph-theoretic approach to enterprise network dynamics. Vol. 24. Springer Science & Business Media."},{"key":"e_1_3_2_1_7_1","volume-title":"Predicting Credit Risk in Peer-to-Peer Lending: A Neural Network Approach. IEEE Symposium Series on Computational Intelligence","author":"Byanjankar Ajay","year":"2015","unstructured":"Ajay Byanjankar , Markku Heikkila , and Jozsef Mezei . 2015 . Predicting Credit Risk in Peer-to-Peer Lending: A Neural Network Approach. IEEE Symposium Series on Computational Intelligence (2015). Ajay Byanjankar, Markku Heikkila, and Jozsef Mezei. 2015. Predicting Credit Risk in Peer-to-Peer Lending: A Neural Network Approach. IEEE Symposium Series on Computational Intelligence (2015)."},{"key":"e_1_3_2_1_8_1","volume-title":"Mortgage fraud: A risk factor analysis of affected communities. Crime, law and social change 52, 4","author":"Carswell Andrew T","year":"2009","unstructured":"Andrew T Carswell and Douglas C Bachtel . 2009. Mortgage fraud: A risk factor analysis of affected communities. Crime, law and social change 52, 4 ( 2009 ), 347--364. Andrew T Carswell and Douglas C Bachtel. 2009. Mortgage fraud: A risk factor analysis of affected communities. Crime, law and social change 52, 4 (2009), 347--364."},{"key":"e_1_3_2_1_9_1","volume-title":"EEE'04","author":"Chiu Chuang-Cheng","year":"2004","unstructured":"Chuang-Cheng Chiu and Chieh-Yuan Tsai . 2004 . A web services-based collaborative scheme for credit card fraud detection. In e-Technology, e-Commerce and e-Service, 2004 . EEE'04 . 2004 IEEE International Conference on. IEEE, 177--181. Chuang-Cheng Chiu and Chieh-Yuan Tsai. 2004. A web services-based collaborative scheme for credit card fraud detection. In e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004 IEEE International Conference on. IEEE, 177--181."},{"key":"e_1_3_2_1_10_1","volume-title":"Chawla","author":"Dong Yuxiao","year":"2014","unstructured":"Yuxiao Dong , Yang Yang , Jie Tang , Yang Yang , and Nitesh V . Chawla . 2014 . Inferring user demographics and social strategies in mobile social networks. In KDD '14. 15--24. Yuxiao Dong, Yang Yang, Jie Tang, Yang Yang, and Nitesh V. Chawla. 2014. Inferring user demographics and social strategies in mobile social networks. In KDD'14. 15--24."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835907"},{"key":"e_1_3_2_1_12_1","volume-title":"Markov fields on finite graphs and lattices. Unpublished manuscript","author":"Hammersley John M","year":"1971","unstructured":"John M Hammersley and Peter Clifford . 1971. Markov fields on finite graphs and lattices. Unpublished manuscript ( 1971 ). John M Hammersley and Peter Clifford. 1971. Markov fields on finite graphs and lattices. Unpublished manuscript (1971)."},{"key":"e_1_3_2_1_13_1","volume-title":"Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos.","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi , Hyun Ah Song , Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016 . FRAUDAR : Bounding Graph Fraud in the Face of Camouflage. In KDD '16. 895--904. Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. In KDD'16. 895--904."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014102"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.12.031"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(03)00016-1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547453"},{"key":"e_1_3_2_1_19_1","volume-title":"UAI'99","author":"Murphy Kevin P","year":"1999","unstructured":"Kevin P Murphy , Yair Weiss , and Michael I Jordan . 1999 . Loopy belief propagation for approximate inference: An empirical study . In UAI'99 . 467--475. Kevin P Murphy, Yair Weiss, and Michael I Jordan. 1999. Loopy belief propagation for approximate inference: An empirical study. In UAI'99. 467--475."},{"key":"e_1_3_2_1_21_1","volume-title":"Finding groups of graphs in databases. Ph.D.Dissertation","author":"Peabody Mitchell A","unstructured":"Mitchell A Peabody . 2002. Finding groups of graphs in databases. Ph.D.Dissertation . Drexel University . Mitchell A Peabody. 2002. Finding groups of graphs in databases. Ph.D.Dissertation. Drexel University."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623682"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Bryan Perozzi Rami Al-Rfou and Steven Skiena.2014.Deepwalk:Online learning of social representations. In KDD'14. 701--710.  Bryan Perozzi Rami Al-Rfou and Steven Skiena.2014.Deepwalk:Online learning of social representations. In KDD'14. 701--710.","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_24_1","volume-title":"Communication and Electrical Technology (ICC-CET), 2011 International Conference on. 152--156","author":"Raj S Benson Edwin","year":"2011","unstructured":"S Benson Edwin Raj and A Annie Portia . 2011 . Analysis on credit card fraud detection methods. In Computer , Communication and Electrical Technology (ICC-CET), 2011 International Conference on. 152--156 . S Benson Edwin Raj and A Annie Portia. 2011. Analysis on credit card fraud detection methods. In Computer, Communication and Electrical Technology (ICC-CET), 2011 International Conference on. 152--156."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219265902000562"},{"key":"e_1_3_2_1_26_1","volume-title":"Survey of insurance fraud detection using data mining techniques. arXiv preprint arXiv:1309.0806","author":"Lookman Sithic H","year":"2013","unstructured":"H Lookman Sithic and T Balasubramanian . 2013. Survey of insurance fraud detection using data mining techniques. arXiv preprint arXiv:1309.0806 ( 2013 ). H Lookman Sithic and T Balasubramanian. 2013. Survey of insurance fraud detection using data mining techniques. arXiv preprint arXiv:1309.0806 (2013)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281266"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1345477.1345482"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Zhe Sun Marco A Wiering and Nicolai Petkov. 2014. Classification system for mortgage arrear management. In Computational Intelligence for Financial Engi- neering & Economics (CIFEr) 2104 IEEE Conference on. 489--496.  Zhe Sun Marco A Wiering and Nicolai Petkov. 2014. Classification system for mortgage arrear management. In Computational Intelligence for Financial Engi- neering & Economics (CIFEr) 2104 IEEE Conference on. 489--496.","DOI":"10.1109\/CIFEr.2014.6924113"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2010.831"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186144"},{"key":"e_1_3_2_1_32_1","volume-title":"Urban Dreams of Migrants: A Case Study of Migrant Integration in Shanghai. In AAAI'18","author":"Yang Yang","year":"2018","unstructured":"Yang Yang , Chenhao Tan , Zongtao Liu , Fei Wu , and Yueting Zhuang . 2018 . Urban Dreams of Migrants: A Case Study of Migrant Integration in Shanghai. In AAAI'18 . Yang Yang, Chenhao Tan, Zongtao Liu, Fei Wu, and Yueting Zhuang. 2018. Urban Dreams of Migrants: A Case Study of Migrant Integration in Shanghai. In AAAI'18."},{"key":"e_1_3_2_1_33_1","volume-title":"Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks","author":"Yang Yang","year":"2019","unstructured":"Yang Yang , Yuhong Xu , Yizhou Sun , Yuxiao Dong , Fei Wu ,and Yueting Zhuang . 2019. Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks . IEEE Transactions on Knowledge and Data Engineering ( 2019 ). Yang Yang,Yuhong Xu,Yizhou Sun,Yuxiao Dong,Fei Wu,and Yueting Zhuang. 2019. Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks. IEEE Transactions on Knowledge and Data Engineering (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium 8","author":"Yedidia Jonathan S","year":"2003","unstructured":"Jonathan S Yedidia , William T Freeman , and Yair Weiss . 2003. Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium 8 ( 2003 ), 236--239. Jonathan S Yedidia, William T Freeman, and Yair Weiss. 2003. Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium 8 (2003), 236--239."}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","location":"Beijing China","acronym":"CIKM '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3358052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3358052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:18Z","timestamp":1750203858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3358052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":33,"alternative-id":["10.1145\/3357384.3358052","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3358052","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}