{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:18:00Z","timestamp":1778084280079,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380172","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"928-938","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Modeling Users\u2019 Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection"],"prefix":"10.1145","author":[{"given":"Yongchun","family":"Zhu","sequence":"first","affiliation":[{"name":"Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences &amp; Alipay (Hangzhou) Information &amp; Technology Co., Ltd"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dongbo","family":"Xi","sequence":"additional","affiliation":[{"name":"Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences &amp; Alipay (Hangzhou) Information &amp; Technology Co., Ltd"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bowen","family":"Song","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fuzhen","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China and University of Chinese Academy of Sciences, Beijing 100049, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuai","family":"Chen","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xi","family":"Gu","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qing","family":"He","sequence":"additional","affiliation":[{"name":"Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China and University of Chinese Academy of Sciences, Beijing 100049, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","volume-title":"Passenger demand forecasting with multi-task convolutional recurrent neural networks","author":"Bai Lei","DOI":"10.1007\/978-3-030-16145-3_3"},{"key":"e_1_3_2_1_2_1","first-page":"163","article-title":"Automated fraud management in transaction-based networks","volume":"6","author":"Baulier Gerald\u00a0Donald","year":"2000","journal-title":"US Patent"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","volume-title":"Neural data mining for credit card fraud detection","author":"Brause R","DOI":"10.1109\/TAI.1999.809773"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Heng-Tze Cheng Levent Koc Jeremiah Harmsen Tal Shaked Tushar Chandra Hrishi Aradhye Glen Anderson Greg Corrado Wei Chai Mustafa Ispir 2016. Wide & deep learning for recommender systems. In RS. ACM 7\u201310.  Heng-Tze Cheng Levent Koc Jeremiah Harmsen Tal Shaked Tushar Chandra Hrishi Aradhye Glen Anderson Greg Corrado Wei Chai Mustafa Ispir 2016. Wide & deep learning for recommender systems. In RS. ACM 7\u201310.","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091622.3091637"},{"key":"e_1_3_2_1_6_1","unstructured":"Fernando Fastoso Jeryl Whitelock Constanza Bianchi and Lynda Andrews. 2012. Risk trust and consumer online purchasing behaviour: a Chilean perspective. International Marketing Review(2012).  Fernando Fastoso Jeryl Whitelock Constanza Bianchi and Lynda Andrews. 2012. Risk trust and consumer online purchasing behaviour: a Chilean perspective. International Marketing Review(2012)."},{"key":"e_1_3_2_1_7_1","volume-title":"An introduction to ROC analysis. Pattern recognition letters 27, 8","author":"Fawcett Tom","year":"2006"},{"key":"e_1_3_2_1_8_1","volume-title":"Credit card fraud detection using convolutional neural networks","author":"Fu Kang"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","volume-title":"Speech recognition with deep recurrent neural networks","author":"Graves Alex","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_11_1","volume-title":"Fusing similarity models with markov chains for sparse sequential recommendation","author":"He Ruining"},{"key":"e_1_3_2_1_12_1","unstructured":"Xiangnan He and Tat-Seng Chua. 2017. Neural factorization machines for sparse predictive analytics. In SIGIR. ACM 355\u2013364.  Xiangnan He and Tat-Seng Chua. 2017. Neural factorization machines for sparse predictive analytics. In SIGIR. ACM 355\u2013364."},{"key":"e_1_3_2_1_13_1","volume-title":"A fast learning algorithm for deep belief nets. Neural computation 18, 7","author":"Hinton E","year":"2006"},{"key":"e_1_3_2_1_14_1","unstructured":"Guangneng Hu Yu Zhang and Qiang Yang. 2019. Transfer Meets Hybrid: A Synthetic Approach for Cross-Domain Collaborative Filtering with Text. In WWW. ACM 2822\u20132829.  Guangneng Hu Yu Zhang and Qiang Yang. 2019. Transfer Meets Hybrid: A Synthetic Approach for Cross-Domain Collaborative Filtering with Text. In WWW. ACM 2822\u20132829."},{"key":"e_1_3_2_1_15_1","volume-title":"EKT: Exercise-aware Knowledge Tracing for Student Performance Prediction","author":"Huang Zhenya","year":"2019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.037"},{"key":"e_1_3_2_1_17_1","volume-title":"Adam: A method for stochastic optimization. In ICLR, Vol.\u00a05.","author":"Kingma P","year":"2015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Zhi Li Hongke Zhao Qi Liu Zhenya Huang Tao Mei and Enhong Chen. 2018. Learning from history and present: Next-item recommendation via discriminatively exploiting user behaviors. In KDD. ACM 1734\u20131743.  Zhi Li Hongke Zhao Qi Liu Zhenya Huang Tao Mei and Enhong Chen. 2018. Learning from history and present: Next-item recommendation via discriminatively exploiting user behaviors. In KDD. ACM 1734\u20131743.","DOI":"10.1145\/3219819.3220014"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jianxun Lian Xiaohuan Zhou Fuzheng Zhang Zhongxia Chen Xing Xie and Guangzhong Sun. 2018. xdeepfm: Combining explicit and implicit feature interactions for recommender systems. In KDD. ACM 1754\u20131763.  Jianxun Lian Xiaohuan Zhou Fuzheng Zhang Zhongxia Chen Xing Xie and Guangzhong Sun. 2018. xdeepfm: Combining explicit and implicit feature interactions for recommender systems. In KDD. ACM 1754\u20131763.","DOI":"10.1145\/3219819.3220023"},{"key":"e_1_3_2_1_20_1","unstructured":"Mingsheng Long Yue Cao Jianmin Wang and Michael\u00a0I Jordan. 2015. Learning transferable features with deep adaptation networks. In ICML. JMLR. org 97\u2013105.  Mingsheng Long Yue Cao Jianmin Wang and Michael\u00a0I Jordan. 2015. Learning transferable features with deep adaptation networks. In ICML. JMLR. org 97\u2013105."},{"key":"e_1_3_2_1_21_1","unstructured":"Mingsheng Long Jianmin Wang Guiguang Ding Jiaguang Sun and Philip\u00a0S Yu. 2013. Transfer feature learning with joint distribution adaptation. In ICCV. 2200\u20132207.  Mingsheng Long Jianmin Wang Guiguang Ding Jiaguang Sun and Philip\u00a0S Yu. 2013. Transfer feature learning with joint distribution adaptation. In ICCV. 2200\u20132207."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X8900900307"},{"key":"e_1_3_2_1_23_1","first-page":"1345","article-title":"A survey on transfer learning","volume":"22","author":"Pan Sinno\u00a0Jialin","year":"2009","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_24_1","unstructured":"Clifton Phua Vincent Lee Kate Smith and Ross Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119(2010).  Clifton Phua Vincent Lee Kate Smith and Ross Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119(2010)."},{"key":"e_1_3_2_1_25_1","volume-title":"Learning logical definitions from relations. Machine learning 5, 3","author":"Quinlan Ross","year":"1990"},{"key":"e_1_3_2_1_26_1","volume-title":"Factorization machines","author":"Rendle Steffen"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Saharon Rosset Uzi Murad Einat Neumann Yizhak Idan and Gadi Pinkas. 1999. Discovery of fraud rules for telecommunications-challenges and solutions. In KDD. ACM 409\u2013413.  Saharon Rosset Uzi Murad Einat Neumann Yizhak Idan and Gadi Pinkas. 1999. Discovery of fraud rules for telecommunications-challenges and solutions. In KDD. ACM 409\u2013413.","DOI":"10.1145\/312129.312303"},{"key":"e_1_3_2_1_28_1","volume-title":"Deep coral: Correlation alignment for deep domain adaptation","author":"Sun Baochen"},{"key":"e_1_3_2_1_29_1","volume-title":"H\u00a0Chi","author":"Tang Jiaxi","year":"2019"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Jiaxi Tang and Ke Wang. 2018. Personalized top-n sequential recommendation via convolutional sequence embedding. In WSDM. ACM 565\u2013573.  Jiaxi Tang and Ke Wang. 2018. Personalized top-n sequential recommendation via convolutional sequence embedding. In WSDM. ACM 565\u2013573.","DOI":"10.1145\/3159652.3159656"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741136"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788623"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Eric Tzeng Judy Hoffman Trevor Darrell and Kate Saenko. 2015. Simultaneous deep transfer across domains and tasks. In ICCV. 4068\u20134076.  Eric Tzeng Judy Hoffman Trevor Darrell and Kate Saenko. 2015. Simultaneous deep transfer across domains and tasks. In ICCV. 4068\u20134076.","DOI":"10.1109\/ICCV.2015.463"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.003"},{"key":"e_1_3_2_1_35_1","volume-title":"Balanced distribution adaptation for transfer learning","author":"Wang Jindong"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Ruoxi Wang Bin Fu Gang Fu and Mingliang Wang. 2017. Deep & cross network for ad click predictions. In ADKDD. ACM 12.  Ruoxi Wang Bin Fu Gang Fu and Mingliang Wang. 2017. Deep & cross network for ad click predictions. In ADKDD. ACM 12.","DOI":"10.1145\/3124749.3124754"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_20"},{"key":"e_1_3_2_1_38_1","unstructured":"Shaoan Xie Zibin Zheng Liang Chen and Chuan Chen. 2018. Learning semantic representations for unsupervised domain adaptation. In ICML. 5419\u20135428.  Shaoan Xie Zibin Zheng Liang Chen and Chuan Chen. 2018. Learning semantic representations for unsupervised domain adaptation. In ICML. 5419\u20135428."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.042"},{"key":"e_1_3_2_1_40_1","unstructured":"Ruinan Zhang Fanglan Zheng and Wei Min. 2018. Sequential Behavioral Data Processing Using Deep Learning and the Markov Transition Field in Online Fraud Detection. arXiv preprint arXiv:1808.05329(2018).  Ruinan Zhang Fanglan Zheng and Wei Min. 2018. Sequential Behavioral Data Processing Using Deep Learning and the Markov Transition Field in Online Fraud Detection. arXiv preprint arXiv:1808.05329(2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Guorui Zhou Xiaoqiang Zhu Chenru Song Ying Fan Han Zhu Xiao Ma Yanghui Yan Junqi Jin Han Li and Kun Gai. 2018. Deep interest network for click-through rate prediction. In KDD. ACM 1059\u20131068.  Guorui Zhou Xiaoqiang Zhu Chenru Song Ying Fan Han Zhu Xiao Ma Yanghui Yan Junqi Jin Han Li and Kun Gai. 2018. Deep interest network for click-through rate prediction. In KDD. ACM 1059\u20131068.","DOI":"10.1145\/3219819.3219823"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Yongchun Zhu Fuzhen Zhuang and Deqing Wang. 2019. Aligning domain-specific distribution and classifier for cross-domain classification from multiple sources. In AAAI Vol.\u00a033. 5989\u20135996.  Yongchun Zhu Fuzhen Zhuang and Deqing Wang. 2019. Aligning domain-specific distribution and classifier for cross-domain classification from multiple sources. In AAAI Vol.\u00a033. 5989\u20135996.","DOI":"10.1609\/aaai.v33i01.33015989"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.07.010"},{"key":"e_1_3_2_1_44_1","volume-title":"Adaptively Transfer Category-Classifier for Handwritten Chinese Character Recognition","author":"Zhu Yongchun"},{"key":"e_1_3_2_1_45_1","unstructured":"Fuzhen Zhuang Xiaohu Cheng Ping Luo Sinno\u00a0Jialin Pan and Qing He. 2015. Supervised representation learning: Transfer learning with deep autoencoders. In IJCAI.  Fuzhen Zhuang Xiaohu Cheng Ping Luo Sinno\u00a0Jialin Pan and Qing He. 2015. Supervised representation learning: Transfer learning with deep autoencoders. In IJCAI."},{"key":"e_1_3_2_1_46_1","unstructured":"Fuzhen Zhuang Zhiyuan Qi Keyu Duan Dongbo Xi Yongchun Zhu Hengshu Zhu Hui Xiong and Qing He. 2019. A Comprehensive Survey on Transfer Learning. arXiv preprint arXiv:1911.02685(2019).  Fuzhen Zhuang Zhiyuan Qi Keyu Duan Dongbo Xi Yongchun Zhu Hengshu Zhu Hui Xiong and Qing He. 2019. A Comprehensive Survey on Transfer Learning. arXiv preprint arXiv:1911.02685(2019)."}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:00Z","timestamp":1750199580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":46,"alternative-id":["10.1145\/3366423.3380172","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380172","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}