{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:48Z","timestamp":1772119908427,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Alibaba Innovative Research Program"},{"name":"the National Key Research and Development Program of China under Grant","award":["No.2017YFB1002104"],"award-info":[{"award-number":["No.2017YFB1002104"]}]},{"name":"the National Natural Science Foundation of China under Grant","award":["No.61976204, U1811461"],"award-info":[{"award-number":["No.61976204, U1811461"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,23]]},"DOI":"10.1145\/3394486.3403354","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:03:59Z","timestamp":1597964639000},"page":"3035-3043","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Fraud Transactions Detection via Behavior Tree with Local Intention Calibration"],"prefix":"10.1145","author":[{"given":"Can","family":"Liu","sequence":"first","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Qiwei","family":"Zhong","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Xiang","family":"Ao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Wangli","family":"Lin","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Jinghua","family":"Feng","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Qing","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jiayu","family":"Tang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Muhammad Rifayat Samee, and Robert E Mercer","author":"Ahmed Mahtab","year":"2019","unstructured":"Mahtab Ahmed , Muhammad Rifayat Samee, and Robert E Mercer . 2019 . Improving Tree-LSTM with tree attention. In ICSC. Mahtab Ahmed, Muhammad Rifayat Samee, and Robert E Mercer. 2019. Improving Tree-LSTM with tree attention. In ICSC."},{"key":"e_1_3_2_1_2_1","unstructured":"Xiang Ao Ping Luo Chengkai Li Fuzhen Zhuang and Qing He. 2015. Online frequent episode mining. In ICDE. 891--902.  Xiang Ao Ping Luo Chengkai Li Fuzhen Zhuang and Qing He. 2015. Online frequent episode mining. In ICDE. 891--902."},{"key":"e_1_3_2_1_3_1","first-page":"530","article-title":"Mining precise-positioning episode rules from event sequences","volume":"30","author":"Ao Xiang","year":"2017","unstructured":"Xiang Ao , Ping Luo , Jin Wang , Fuzhen Zhuang , and Qing He . 2017 . Mining precise-positioning episode rules from event sequences . IEEE TKDE 30 , 3 (2017), 530 -- 543 . Xiang Ao, Ping Luo, Jin Wang, Fuzhen Zhuang, and Qing He. 2017. Mining precise-positioning episode rules from event sequences. IEEE TKDE 30, 3 (2017), 530--543.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_3_2_1_5_1","unstructured":"Junyoung Chung Caglar Gulcehre Kyunghyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS.  Junyoung Chung Caglar Gulcehre Kyunghyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Akiko Eriguchi Kazuma Hashimoto and Yoshimasa Tsuruoka. 2016. Tree-tosequence attentional neural machine translation. In ACL.  Akiko Eriguchi Kazuma Hashimoto and Yoshimasa Tsuruoka. 2016. Tree-tosequence attentional neural machine translation. In ACL.","DOI":"10.18653\/v1\/P16-1078"},{"key":"e_1_3_2_1_7_1","unstructured":"Kang Fu Dawei Cheng Yi Tu and Liqing Zhang. 2016. Credit card fraud detection using convolutional neural networks. In ICONIP.  Kang Fu Dawei Cheng Yi Tu and Liqing Zhang. 2016. Credit card fraud detection using convolutional neural networks. In ICONIP."},{"key":"e_1_3_2_1_8_1","unstructured":"Qingyu Guo Zhao Li Bo An Pengrui Hui Jiaming Huang Long Zhang and Mengchen Zhao. 2019. Securing the deep fraud detector in large-scale ecommerce platform via adversarial machine learning approach. In WWW.  Qingyu Guo Zhao Li Bo An Pengrui Hui Jiaming Huang Long Zhang and Mengchen Zhao. 2019. Securing the deep fraud detector in large-scale ecommerce platform via adversarial machine learning approach. In WWW."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.037"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional neural networks for sentence classification. In EMNLP.  Yoon Kim. 2014. Convolutional neural networks for sentence classification. In EMNLP.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_12_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A method for stochastic optimization. In ICLR. Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In ICLR."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Renxin Mao Zhao Li and Jinhua Fu. 2015. Fraud transaction recognition: A money flow network approach. In CIKM.  Renxin Mao Zhao Li and Jinhua Fu. 2015. Fraud transaction recognition: A money flow network approach. In CIKM.","DOI":"10.1145\/2806416.2806647"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Makoto Miwa and Mohit Bansal. 2016. End-to-end relation extraction using lstms on sequences and tree structures. In ACL.  Makoto Miwa and Mohit Bansal. 2016. End-to-end relation extraction using lstms on sequences and tree structures. In ACL.","DOI":"10.18653\/v1\/P16-1105"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Lili Mou Rui Men Ge Li Yan Xu Lu Zhang Rui Yan and Zhi Jin. 2015. Natural language inference by tree-based convolution and heuristic matching. In ACL.  Lili Mou Rui Men Ge Li Yan Xu Lu Zhang Rui Yan and Zhi Jin. 2015. Natural language inference by tree-based convolution and heuristic matching. In ACL.","DOI":"10.18653\/v1\/P16-2022"},{"key":"e_1_3_2_1_16_1","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga etal 2019. PyTorch: An imperative style high-performance deep learning library. In NeurIPS.  Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga et al. 2019. PyTorch: An imperative style high-performance deep learning library. In NeurIPS."},{"key":"e_1_3_2_1_17_1","volume-title":"Real-time credit card fraud detection using computational intelligence. Expert systems with applications 35, 4","author":"Quah Jon TS","year":"2008","unstructured":"Jon TS Quah and M Sriganesh . 2008. Real-time credit card fraud detection using computational intelligence. Expert systems with applications 35, 4 ( 2008 ), 1721--1732. Jon TS Quah and M Sriganesh. 2008. Real-time credit card fraud detection using computational intelligence. Expert systems with applications 35, 4 (2008), 1721--1732."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_19_1","unstructured":"Ning Su Yiqun Liu Zhao Li Yuli Liu Min Zhang and Shaoping Ma. 2018. Detecting crowdturfing add to favorites activities in online shopping. In WWW.  Ning Su Yiqun Liu Zhao Li Yuli Liu Min Zhang and Shaoping Ma. 2018. Detecting crowdturfing add to favorites activities in online shopping. In WWW."},{"key":"e_1_3_2_1_20_1","unstructured":"Kai Sheng Tai Richard Socher and Christopher D Manning. 2015. Improved semantic representations from tree-structured long short-term memory networks. In ACL.  Kai Sheng Tai Richard Socher and Christopher D Manning. 2015. Improved semantic representations from tree-structured long short-term memory networks. In ACL."},{"key":"e_1_3_2_1_21_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Haiqin Weng Zhao Li Shouling Ji Chen Chu Haifeng Lu Tianyu Du and Qinming He. 2018. Online e-commerce fraud: a large-scale detection and analysis. In ICDE.  Haiqin Weng Zhao Li Shouling Ji Chen Chu Haifeng Lu Tianyu Du and Qinming He. 2018. Online e-commerce fraud: a large-scale detection and analysis. In ICDE.","DOI":"10.1109\/ICDE.2018.00162"},{"key":"e_1_3_2_1_23_1","unstructured":"Dianmin Yue Xiaodan Wu Yunfeng Wang Yue Li and Chao-Hsien Chu. 2007. A review of data mining-based financial fraud detection research. In IWCMC.  Dianmin Yue Xiaodan Wu Yunfeng Wang Yue Li and Chao-Hsien Chu. 2007. A review of data mining-based financial fraud detection research. In IWCMC."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.042"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Mengchen Zhao Zhao Li Bo An Haifeng Lu Yifan Yang and Chen Chu. 2018. Impression allocation for combating fraud in e-commerce via deep reinforcement learning with action norm penalty. In IJCAI.  Mengchen Zhao Zhao Li Bo An Haifeng Lu Yifan Yang and Chen Chu. 2018. Impression allocation for combating fraud in e-commerce via deep reinforcement learning with action norm penalty. In IJCAI.","DOI":"10.24963\/ijcai.2018\/548"},{"key":"e_1_3_2_1_26_1","volume-title":"Safe: A neural survival analysis model for fraud early detection. In AAAI.","author":"Zheng Panpan","year":"2019","unstructured":"Panpan Zheng , Shuhan Yuan , and Xintao Wu . 2019 . Safe: A neural survival analysis model for fraud early detection. In AAAI. Panpan Zheng, Shuhan Yuan, and Xintao Wu. 2019. Safe: A neural survival analysis model for fraud early detection. In AAAI."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Panpan Zheng Shuhan Yuan XintaoWu Jun Li and Aidong Lu. 2019. One-class adversarial nets for fraud detection. In AAAI.  Panpan Zheng Shuhan Yuan XintaoWu Jun Li and Aidong Lu. 2019. One-class adversarial nets for fraud detection. In AAAI.","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Qiwei Zhong Yang Liu Xiang Ao Binbin Hu Jinghua Feng Jiayu Tang and Qing He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network. In WWW. 785--795.  Qiwei Zhong Yang Liu Xiang Ao Binbin Hu Jinghua Feng Jiayu Tang and Qing He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network. In WWW. 785--795.","DOI":"10.1145\/3366423.3380159"}],"event":{"name":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event CA USA","acronym":"KDD '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403354","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394486.3403354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:29Z","timestamp":1750195889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403354"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"references-count":28,"alternative-id":["10.1145\/3394486.3403354","10.1145\/3394486"],"URL":"https:\/\/doi.org\/10.1145\/3394486.3403354","relation":{},"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}