{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:30:23Z","timestamp":1776184223930,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["III-1526499, III-1763325, III-1909323, CNS-1930941"],"award-info":[{"award-number":["III-1526499, III-1763325, III-1909323, CNS-1930941"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2018YFC0830804"],"award-info":[{"award-number":["2018YFC0830804"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401253","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"1569-1572","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":261,"title":["Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection"],"prefix":"10.1145","author":[{"given":"Zhiwei","family":"Liu","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Yingtong","family":"Dou","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Yutong","family":"Deng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Y. Dou W. Li Z. Liu Z. Dong J. Luo and P. S. Yu. 2019. Uncovering download fraud activities in mobile app markets. In ASONAM.  Y. Dou W. Li Z. Liu Z. Dong J. Luo and P. S. Yu. 2019. Uncovering download fraud activities in mobile app markets. In ASONAM.","DOI":"10.1145\/3341161.3345306"},{"key":"e_1_3_2_2_2_1","volume":"201","author":"Hamilton W.","unstructured":"W. Hamilton , Z. Ying , and J. Leskovec. 201 7. Inductive representation learning on large graphs. In NeurIPS. W. Hamilton, Z. Ying, and J. Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS.","journal-title":"J. Leskovec."},{"key":"e_1_3_2_2_3_1","unstructured":"Y. Hou J. Zhang J. Cheng K. Ma R. T. B. Ma H. Chen and M. Yang. 2020. Measuring and Improving the Use of Graph Information in Graph Neural Networks. In ICLR.  Y. Hou J. Zhang J. Cheng K. Ma R. T. B. Ma H. Chen and M. Yang. 2020. Measuring and Improving the Use of Graph Information in Graph Neural Networks. In ICLR."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"M. Jiang P. Cui and C. Faloutsos. 2016. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems (2016).  M. Jiang P. Cui and C. Faloutsos. 2016. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems (2016).","DOI":"10.1109\/MIS.2016.5"},{"key":"e_1_3_2_2_5_1","volume":"201","author":"Kaghazgaran P.","unstructured":"P. Kaghazgaran , M. Alfifi , and J. Caverlee. 201 9. Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures. In CIKM. P. Kaghazgaran, M. Alfifi, and J. Caverlee. 2019. Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures. In CIKM.","journal-title":"J. Caverlee."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"P. Kaghazgaran J. Caverlee and A. Squicciarini. 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In WSDM.  P. Kaghazgaran J. Caverlee and A. Squicciarini. 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In WSDM.","DOI":"10.1145\/3159652.3159726"},{"key":"e_1_3_2_2_7_1","unstructured":"T.N. Kipf and M. Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.  T.N. Kipf and M. Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"A. Li Z. Qin R. Liu Y. Yang and D. Li. 2019. Spam Review Detection with Graph Convolutional Networks. In CIKM.  A. Li Z. Qin R. Liu Y. Yang and D. Li. 2019. Spam Review Detection with Graph Convolutional Networks. In CIKM.","DOI":"10.1145\/3357384.3357820"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Z. Liu C. Chen X. Yang J. Zhou X. Li and L. Song. 2018. Heterogeneous Graph Neural Networks for Malicious Account Detection. In CIKM.  Z. Liu C. Chen X. Yang J. Zhou X. Li and L. Song. 2018. Heterogeneous Graph Neural Networks for Malicious Account Detection. In CIKM.","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"H. Peng J. Li Q. Gong Y. Song Y. Ning K. Lai and P. S. Yu. 2019. Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks. In IJCAI.  H. Peng J. Li Q. Gong Y. Song Y. Ning K. Lai and P. S. Yu. 2019. Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks. In IJCAI.","DOI":"10.24963\/ijcai.2019\/449"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"S. Rayana and L. Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In KDD.  S. Rayana and L. Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In KDD.","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_2_12_1","volume-title":"Graph Data: A Survey. arXiv preprint arXiv:1812.10528","author":"Sun L.","year":"2018","unstructured":"L. Sun , Y. Dou , C. Yang , J. Wang , P. S. Yu , and B. Li . 2018 . Adversarial Attack and Defense on Graph Data: A Survey. arXiv preprint arXiv:1812.10528 (2018). L. Sun, Y. Dou, C. Yang, J. Wang, P. S. Yu, and B. Li. 2018. Adversarial Attack and Defense on Graph Data: A Survey. arXiv preprint arXiv:1812.10528 (2018)."},{"key":"e_1_3_2_2_13_1","unstructured":"P. Velivc kovi\u0107 G. Cucurull A. Casanova A. Romero P. Lio and Y. Bengio. 2017. Graph attention networks. In ICLR.  P. Velivc kovi\u0107 G. Cucurull A. Casanova A. Romero P. Lio and Y. Bengio. 2017. Graph attention networks. In ICLR."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"D. Wang J. Lin P. Cui Q. Jia Z. Wang Y. Fang Q. Yu J. Zhou S. Yang and Y. Qi. 2019 a. A Semi-supervised Graph Attentive Network for Fraud Detection. In ICDM.  D. Wang J. Lin P. Cui Q. Jia Z. Wang Y. Fang Q. Yu J. Zhou S. Yang and Y. Qi. 2019 a. A Semi-supervised Graph Attentive Network for Fraud Detection. In ICDM.","DOI":"10.1109\/ICDM.2019.00070"},{"key":"e_1_3_2_2_15_1","volume-title":"WWW Workshops.","author":"Wang J.","unstructured":"J. Wang , R. Wen , C. Wu , Y. Huang , and J. Xion . 2019 b. FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System . In WWW Workshops. J. Wang, R. Wen, C. Wu, Y. Huang, and J. Xion. 2019 b. FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System. In WWW Workshops."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang Y. Fan Y. Ye L. Zhao and C. Shi. 2019. Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework. In CIKM.  Y. Zhang Y. Fan Y. Ye L. Zhao and C. Shi. 2019. Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework. In CIKM.","DOI":"10.1145\/3357384.3357876"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Q. Zhong Y. Liu X. Ao B. Hu J. Feng J. Tang and Q. He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-View Attributed Heterogeneous Information Network. In WWW.  Q. Zhong Y. Liu X. Ao B. Hu J. Feng J. Tang and Q. He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-View Attributed Heterogeneous Information Network. In WWW.","DOI":"10.1145\/3366423.3380159"}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","location":"Virtual Event China","acronym":"SIGIR '20","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401253","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:44Z","timestamp":1750200104000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":17,"alternative-id":["10.1145\/3397271.3401253","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401253","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}