{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:19Z","timestamp":1772119939770,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Alibaba Innovative Research Program"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61976204, U1811461, U1836206"],"award-info":[{"award-number":["No.61976204, U1811461, U1836206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of Youth Innovation Promotion Association CAS"},{"DOI":"10.13039\/501100005090","name":"Beijing Nova Program","doi-asserted-by":"publisher","award":["Z201100006820062"],"award-info":[{"award-number":["Z201100006820062"]}],"id":[{"id":"10.13039\/501100005090","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539126","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"3357-3365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["User Behavior Pre-training for Online Fraud Detection"],"prefix":"10.1145","author":[{"given":"Can","family":"Liu","sequence":"first","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Yuncong","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Jinghua","family":"Feng","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Hao","family":"Yang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Xiang","family":"Ao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Alex Beutel Wanhong Xu Venkatesan Guruswami Christopher Palow and Christos Faloutsos. 2013. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW. 119--130.","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_2_2_1","volume-title":"Statistical fraud detection: A review. Statistical science","author":"Bolton Richard J","year":"2002","unstructured":"Richard J Bolton and David J Hand. 2002. Statistical fraud detection: A review. Statistical science, Vol. 17, 3 (2002), 235--255."},{"key":"e_1_3_2_2_3_1","volume-title":"Mariana SC Almeida, Jo ao Tiago Ascens ao, and Pedro Bizarro.","author":"Branco Bernardo","year":"2020","unstructured":"Bernardo Branco, Pedro Abreu, Ana Sofia Gomes, Mariana SC Almeida, Jo ao Tiago Ascens ao, and Pedro Bizarro. 2020. Interleaved sequence RNNs for fraud detection. In KDD. 3101--3109."},{"key":"e_1_3_2_2_4_1","volume-title":"Titant: Online real-time transaction fraud detection in ant financial. arXiv preprint arXiv:1906.07407","author":"Cao Shaosheng","year":"2019","unstructured":"Shaosheng Cao, XinXing Yang, Cen Chen, Jun Zhou, Xiaolong Li, and Yuan Qi. 2019. Titant: Online real-time transaction fraud detection in ant financial. arXiv preprint arXiv:1906.07407 (2019)."},{"key":"e_1_3_2_2_5_1","first-page":"101","article-title":"Deep convolution neural network model for credit-card fraud detection and alert","volume":"3","author":"Iong-Zong Chen Joy","year":"2021","unstructured":"Joy Iong-Zong Chen and Kong-Long Lai. 2021. Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence, Vol. 3, 02 (2021), 101--112.","journal-title":"Journal of Artificial Intelligence"},{"key":"e_1_3_2_2_6_1","volume-title":"ICML","volume":"119","author":"Chen Mark","year":"2020","unstructured":"Mark Chen, Alec Radford, Rewon Child, Jeffrey Wu, Heewoo Jun, David Luan, and Ilya Sutskever. 2020. Generative Pretraining From Pixels. ICML, Vol. 119 (2020), 1691--1703."},{"key":"e_1_3_2_2_7_1","volume-title":"Graph neural network for fraud detection via spatial-temporal attention","author":"Cheng Dawei","year":"2020","unstructured":"Dawei Cheng, Xiaoyang Wang, Ying Zhang, and Liqing Zhang. 2020. Graph neural network for fraud detection via spatial-temporal attention. IEEE Transactions on Knowledge and Data Engineering (2020)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Ronan Collobert and Jason Weston. 2008. A unified architecture for natural language processing: Deep neural networks with multitask learning. In ICML. 160--167.","DOI":"10.1145\/1390156.1390177"},{"key":"e_1_3_2_2_9_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. In NAACL-HLT.","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. Bert: Pre-training of deep bidirectional transformers for language understanding. In NAACL-HLT."},{"key":"e_1_3_2_2_10_1","volume-title":"Advances in NIPS","volume":"32","author":"Dong Li","year":"2019","unstructured":"Li Dong, Nan Yang, Wenhui Wang, Furu Wei, Xiaodong Liu, Yu Wang, Jianfeng Gao, Ming Zhou, and Hsiao-Wuen Hon. 2019. Unified language model pre-training for natural language understanding and generation. Advances in NIPS, Vol. 32 (2019)."},{"key":"e_1_3_2_2_11_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman Jerome H","year":"2001","unstructured":"Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601932"},{"key":"e_1_3_2_2_13_1","volume-title":"Masked Autoencoders Are Scalable Vision Learners. arXiv e-prints (Nov","author":"He Kaiming","year":"2021","unstructured":"Kaiming He, Xinlei Chen, Saining Xie, Yanghao Li, Piotr Doll\u00e1r, and Ross Girshick. 2021. Masked Autoencoders Are Scalable Vision Learners. arXiv e-prints (Nov. 2021), arXiv:2111.06377."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301946"},{"key":"e_1_3_2_2_15_1","unstructured":"Xue Jiang Zhuoran Zheng Chen Lyu Liang Li and Lei Lyu. 2021. TreeBERT: A tree-based pre-trained model for programming language. In UAI. PMLR 54--63."},{"key":"e_1_3_2_2_16_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In ICLR."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Jie Lei Linjie Li Luowei Zhou Zhe Gan Tamara L. Berg Mohit Bansal and Jingjing Liu. 2021. Less Is More: ClipBERT for Video-and-Language Learning via Sparse Sampling. In CVPR. 7331--7341.","DOI":"10.1109\/CVPR46437.2021.00725"},{"key":"e_1_3_2_2_18_1","volume-title":"Bart: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461","author":"Lewis Mike","year":"2019","unstructured":"Mike Lewis, Yinhan Liu, Naman Goyal, Marjan Ghazvininejad, Abdelrahman Mohamed, Omer Levy, Ves Stoyanov, and Luke Zettlemoyer. 2019. Bart: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461 (2019)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Yuan Li Yiheng Sun and Noshir Contractor. 2017. Graph mining assisted semi-supervised learning for fraudulent cash-out detection. In ASONAM. 546--553.","DOI":"10.1145\/3110025.3110099"},{"key":"e_1_3_2_2_20_1","unstructured":"Wangli Lin Li Sun Qiwei Zhong Can Liu Jinghua Feng Xiang Ao and Hao Yang. 2021. Online Credit Payment Fraud Detection via Structure-Aware Hierarchical Recurrent Neural Network. In IJCAI."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Can Liu Li Sun Xiang Ao Jinghua Feng Qing He and Hao Yang. 2021. Intention-aware heterogeneous graph attention networks for fraud transactions detection. In KDD. 3280--3288.","DOI":"10.1145\/3447548.3467142"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Can Liu Qiwei Zhong Xiang Ao Li Sun Wangli Lin Jinghua Feng Qing He and Jiayu Tang. 2020. Fraud Transactions Detection via Behavior Tree with Local Intention Calibration. In KDD. 3035--3043.","DOI":"10.1145\/3394486.3403354"},{"key":"e_1_3_2_2_23_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Ziqi Liu Chaochao Chen Xinxing Yang Jun Zhou Xiaolong Li and Le Song. 2018. Heterogeneous graph neural networks for malicious account detection. In CIKM. 2077--2085.","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_2_25_1","volume-title":"NIPS","volume":"32","author":"Lu Jiasen","year":"2019","unstructured":"Jiasen Lu, Dhruv Batra, Devi Parikh, and Stefan Lee. 2019. ViLBERT: Pretraining Task-Agnostic Visiolinguistic Representations for Vision-and-Language Tasks. In NIPS, Vol. 32."},{"key":"e_1_3_2_2_26_1","volume-title":"Mark Neumann and Luke Zettlemoyer","author":"Matt Gardner Christopher Clark Mohit Iyyer","year":"2018","unstructured":"Mohit Iyyer Matt Gardner Christopher Clark Kenton Lee Matthew E.Peters, Mark Neumann and Luke Zettlemoyer. 2018. Deep contextualized word representations. In NAACL-HLT."},{"key":"e_1_3_2_2_27_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. In NIPS."},{"key":"e_1_3_2_2_28_1","unstructured":"Feiyang Pan Shuokai Li Xiang Ao Pingzhong Tang and Qing He. 2019. Warm up cold-start advertisements: Improving ctr predictions via learning to learn id embeddings. In SIGIR. 695--704."},{"key":"e_1_3_2_2_29_1","volume-title":"et almbox","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et almbox. 2019. PyTorch: An imperative style, high-performance deep learning library. In NIPS."},{"key":"e_1_3_2_2_30_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans and Ilya Sutskever. 2018. Improving language understanding by generative pre-training. (2018)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/252797"},{"key":"e_1_3_2_2_33_1","volume-title":"Carl Vondrick, Kevin Murphy, and Cordelia Schmid.","author":"Sun Chen","year":"2019","unstructured":"Chen Sun, Austin Myers, Carl Vondrick, Kevin Murphy, and Cordelia Schmid. 2019. VideoBERT: A Joint Model for Video and Language Representation Learning. In ICCV. 7463--7472."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6428"},{"key":"e_1_3_2_2_35_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1277822"},{"key":"e_1_3_2_2_37_1","first-page":"2122","article-title":"LAW: learning automatic windows for online payment fraud detection","volume":"18","author":"Wang Cheng","year":"2020","unstructured":"Cheng Wang, Changqi Wang, Hangyu Zhu, and Jipeng Cui. 2020. LAW: learning automatic windows for online payment fraud detection. IEEE Transactions on Dependable and Secure Computing, Vol. 18, 5 (2020), 2122--2135.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_38_1","volume-title":"A semi-supervised graph attentive network for financial fraud detection","author":"Wang Daixin","unstructured":"Daixin Wang, Jianbin Lin, Peng Cui, Quanhui Jia, Zhen Wang, Yanming Fang, Quan Yu, Jun Zhou, Shuang Yang, and Yuan Qi. 2019. A semi-supervised graph attentive network for financial fraud detection. In ICDM. IEEE, 598--607."},{"key":"e_1_3_2_2_39_1","volume-title":"William Yang Wang, and Veselin Stoyanov","author":"Xiong Wenhan","year":"2020","unstructured":"Wenhan Xiong, Jingfei Du, William Yang Wang, and Veselin Stoyanov. 2020. Pretrained encyclopedia: Weakly supervised knowledge-pretrained language model. In ICLR."},{"key":"e_1_3_2_2_40_1","volume-title":"ERNIE: Enhanced language representation with informative entities. In ACL.","author":"Zhang Zhengyan","year":"2019","unstructured":"Zhengyan Zhang, Xu Han, Zhiyuan Liu, Xin Jiang, Maosong Sun, and Qun Liu. 2019. ERNIE: Enhanced language representation with informative entities. In ACL."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011278"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Qiwei Zhong Yang Liu Xiang Ao Binbin Hu Jinghua Feng Jiayu Tang and Qing He. 2020. Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network. In WWW. 785--795.","DOI":"10.1145\/3366423.3380159"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:58Z","timestamp":1750186978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":43,"alternative-id":["10.1145\/3534678.3539126","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539126","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}