{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:22:57Z","timestamp":1771064577357,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467142","type":"proceedings-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T18:33:08Z","timestamp":1628879588000},"page":"3280-3288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":86,"title":["Intention-aware Heterogeneous Graph Attention Networks for Fraud Transactions Detection"],"prefix":"10.1145","author":[{"given":"Can","family":"Liu","sequence":"first","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Xiang","family":"Ao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jinghua","family":"Feng","sequence":"additional","affiliation":[{"name":"Ailbaba Group, Hangzhou, China"}]},{"given":"Qing","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hao","family":"Yang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Muhammad Rifayat Samee, and Robert E Mercer","author":"Ahmed Mahtab","year":"2019","unstructured":"Mahtab Ahmed , Muhammad Rifayat Samee, and Robert E Mercer . 2019 . Improving Tree-LSTM with tree attention. In ICSC. Mahtab Ahmed, Muhammad Rifayat Samee, and Robert E Mercer. 2019. Improving Tree-LSTM with tree attention. In ICSC."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Joost Bastings Ivan Titov Wilker Aziz Diego Marcheggiani and Khalil Sima'an. 2017. Graph Convolutional Encoders for Syntax-aware Neural Machine Translation. In EMNLP. 1957--1967.  Joost Bastings Ivan Titov Wilker Aziz Diego Marcheggiani and Khalil Sima'an. 2017. Graph Convolutional Encoders for Syntax-aware Neural Machine Translation. In EMNLP. 1957--1967.","DOI":"10.18653\/v1\/D17-1209"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Alex Beutel Wanhong Xu Venkatesan Guruswami Christopher Palow and Christos Faloutsos. 2013. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW. 119--130.  Alex Beutel Wanhong Xu Venkatesan Guruswami Christopher Palow and Christos Faloutsos. 2013. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW. 119--130.","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_3_2_2_5_1","volume-title":"Mariana SC Almeida, Jo ao Tiago Ascens ao, and Pedro Bizarro.","author":"Branco Bernardo","year":"2020","unstructured":"Bernardo Branco , Pedro Abreu , Ana Sofia Gomes , Mariana SC Almeida, Jo ao Tiago Ascens ao, and Pedro Bizarro. 2020 . Interleaved Sequence RNNs for Fraud Detection. In KDD. 3101--3109. Bernardo Branco, Pedro Abreu, Ana Sofia Gomes, Mariana SC Almeida, Jo ao Tiago Ascens ao, and Pedro Bizarro. 2020. Interleaved Sequence RNNs for Fraud Detection. In KDD. 3101--3109."},{"key":"e_1_3_2_2_6_1","first-page":"2116","article-title":"Semi-supervised User Profiling with Heterogeneous Graph Attention Networks","volume":"19","author":"Chen Weijian","year":"2019","unstructured":"Weijian Chen , Yulong Gu , Zhaochun Ren , Xiangnan He , Hongtao Xie , Tong Guo , Dawei Yin , and Yongdong Zhang . 2019 . Semi-supervised User Profiling with Heterogeneous Graph Attention Networks .. In IJCAI , Vol. 19. 2116 -- 2122 . Weijian Chen, Yulong Gu, Zhaochun Ren, Xiangnan He, Hongtao Xie, Tong Guo, Dawei Yin, and Yongdong Zhang. 2019. Semi-supervised User Profiling with Heterogeneous Graph Attention Networks.. In IJCAI, Vol. 19. 2116--2122.","journal-title":"IJCAI"},{"key":"e_1_3_2_2_7_1","unstructured":"Junyoung Chung Caglar Gulcehre Kyunghyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS.  Junyoung Chung Caglar Gulcehre Kyunghyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS."},{"key":"e_1_3_2_2_8_1","unstructured":"Qingyu Guo Zhao Li Bo An Pengrui Hui Jiaming Huang Long Zhang and Mengchen Zhao. 2019. Securing the deep fraud detector in large-scale e-commerce platform via adversarial machine learning approach. In WWW.  Qingyu Guo Zhao Li Bo An Pengrui Hui Jiaming Huang Long Zhang and Mengchen Zhao. 2019. Securing the deep fraud detector in large-scale e-commerce platform via adversarial machine learning approach. In WWW."},{"key":"e_1_3_2_2_9_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_11_1","volume-title":"Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos.","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi , Hyun Ah Song , Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016 . Fraudar : Bounding graph fraud in the face of camouflage. In KDD. 895--904. Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. Fraudar: Bounding graph fraud in the face of camouflage. In KDD. 895--904."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional neural networks for sentence classification. In EMNLP.  Yoon Kim. 2014. Convolutional neural networks for sentence classification. In EMNLP.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_2_13_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A method for stochastic optimization. In ICLR. Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In ICLR."},{"key":"e_1_3_2_2_14_1","unstructured":"Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.  Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM. 2703--2711.  Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM. 2703--2711.","DOI":"10.1145\/3357384.3357820"},{"key":"e_1_3_2_2_16_1","unstructured":"Wangli Lin Li Sun Qiwei Zhong Can Liu Jinghua Feng Xiang Ao and Hao Yang. 2021. Online Credit Payment Fraud Detection via Structure-Aware Hierarchical Recurrent Neural Network. In IJCAI.  Wangli Lin Li Sun Qiwei Zhong Can Liu Jinghua Feng Xiang Ao and Hao Yang. 2021. Online Credit Payment Fraud Detection via Structure-Aware Hierarchical Recurrent Neural Network. In IJCAI."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Can Liu Qiwei Zhong Xiang Ao Li Sun Wangli Lin Jinghua Feng Qing He and Jiayu Tang. 2020. Fraud Transactions Detection via Behavior Tree with Local Intention Calibration. In KDD. 3035--3043.  Can Liu Qiwei Zhong Xiang Ao Li Sun Wangli Lin Jinghua Feng Qing He and Jiayu Tang. 2020. Fraud Transactions Detection via Behavior Tree with Local Intention Calibration. In KDD. 3035--3043.","DOI":"10.1145\/3394486.3403354"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Renxin Mao Zhao Li and Jinhua Fu. 2015. Fraud transaction recognition: A money flow network approach. In CIKM.  Renxin Mao Zhao Li and Jinhua Fu. 2015. Fraud transaction recognition: A money flow network approach. In CIKM.","DOI":"10.1145\/2806416.2806647"},{"key":"e_1_3_2_2_19_1","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga etal 2019. PyTorch: An imperative style high-performance deep learning library. In NeurIPS.  Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga et al. 2019. PyTorch: An imperative style high-performance deep learning library. In NeurIPS."},{"key":"e_1_3_2_2_20_1","unstructured":"Susie Xi Rao Shuai Zhang Zhichao Han Zitao Zhang Wei Min Zhiyao Chen Yinan Shan Yang Zhao and Ce Zhang. 2021. xFraud: Explainable Fraud Transaction Detection on Heterogeneous Graphs. In WWW.  Susie Xi Rao Shuai Zhang Zhichao Han Zitao Zhang Wei Min Zhiyao Chen Yinan Shan Yang Zhao and Ce Zhang. 2021. xFraud: Explainable Fraud Transaction Detection on Heterogeneous Graphs. In WWW."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_2_22_1","unstructured":"Kai Sheng Tai Richard Socher and Christopher D Manning. 2015. Improved semantic representations from tree-structured long short-term memory networks. In ACL.  Kai Sheng Tai Richard Socher and Christopher D Manning. 2015. Improved semantic representations from tree-structured long short-term memory networks. In ACL."},{"key":"e_1_3_2_2_23_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS."},{"key":"e_1_3_2_2_24_1","unstructured":"Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR.  Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Hongwei Wang Fuzheng Zhang Mengdi Zhang Jure Leskovec Miao Zhao Wenjie Li and Zhongyuan Wang. 2019. Knowledge-aware graph neural networks with label smoothness regularization for recommender systems. In KDD. 968--977.  Hongwei Wang Fuzheng Zhang Mengdi Zhang Jure Leskovec Miao Zhao Wenjie Li and Zhongyuan Wang. 2019. Knowledge-aware graph neural networks with label smoothness regularization for recommender systems. In KDD. 968--977.","DOI":"10.1145\/3292500.3330836"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Haiqin Weng Zhao Li Shouling Ji Chen Chu Haifeng Lu Tianyu Du and Qinming He. 2018. Online e-commerce fraud: a large-scale detection and analysis. In ICDE.  Haiqin Weng Zhao Li Shouling Ji Chen Chu Haifeng Lu Tianyu Du and Qinming He. 2018. Online e-commerce fraud: a large-scale detection and analysis. In ICDE.","DOI":"10.1109\/ICDE.2018.00162"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301346"},{"key":"e_1_3_2_2_28_1","unstructured":"Dongbo Xi Fuzhen Zhuang Bowen Song Yongchun Zhu Shuai Chen Dan Hong Tao Chen Xi Gu and Qing He. 2020. Neural Hierarchical Factorization Machines for User's Event Sequence Analysis. In SIGIR. 1893--1896.  Dongbo Xi Fuzhen Zhuang Bowen Song Yongchun Zhu Shuai Chen Dan Hong Tao Chen Xi Gu and Qing He. 2020. Neural Hierarchical Factorization Machines for User's Event Sequence Analysis. In SIGIR. 1893--1896."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017370"},{"key":"e_1_3_2_2_30_1","unstructured":"Dianmin Yue Xiaodan Wu Yunfeng Wang Yue Li and Chao-Hsien Chu. 2007. A review of data mining-based financial fraud detection research. In IWCMC.  Dianmin Yue Xiaodan Wu Yunfeng Wang Yue Li and Chao-Hsien Chu. 2007. A review of data mining-based financial fraud detection research. In IWCMC."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Panpan Zheng Shuhan Yuan and Xintao Wu. 2019 a. Safe: A neural survival analysis model for fraud early detection. In AAAI.  Panpan Zheng Shuhan Yuan and Xintao Wu. 2019 a. Safe: A neural survival analysis model for fraud early detection. In AAAI.","DOI":"10.1609\/aaai.v33i01.33011278"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Panpan Zheng Shuhan Yuan Xintao Wu Jun Li and Aidong Lu. 2019 b. One-class adversarial nets for fraud detection. In AAAI.  Panpan Zheng Shuhan Yuan Xintao Wu Jun Li and Aidong Lu. 2019 b. One-class adversarial nets for fraud detection. In AAAI.","DOI":"10.1609\/aaai.v33i01.33011286"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:27Z","timestamp":1750191507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":32,"alternative-id":["10.1145\/3447548.3467142","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467142","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}