{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:18:30Z","timestamp":1771024710919,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARC","award":["DP210101393"],"award-info":[{"award-number":["DP210101393"]}]},{"name":"ZJNSF","award":["LY21F020012"],"award-info":[{"award-number":["LY21F020012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599836","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:13:58Z","timestamp":1691172838000},"page":"5463-5475","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Group-based Fraud Detection Network on e-Commerce Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2032-7727","authenticated-orcid":false,"given":"Jianke","family":"Yu","sequence":"first","affiliation":[{"name":"Zhejiang Gongshang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3158-9586","authenticated-orcid":false,"given":"Hanchen","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang Gongshang University &amp; University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3554-3219","authenticated-orcid":false,"given":"Xiaoyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5056-0351","authenticated-orcid":false,"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6068-5062","authenticated-orcid":false,"given":"Lu","family":"Qin","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6572-2600","authenticated-orcid":false,"given":"Wenjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9854-4935","authenticated-orcid":false,"given":"Jian","family":"Liao","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2674-1638","authenticated-orcid":false,"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang Gongshang University &amp; University of Technology Sydney, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. http:\/\/bhooi.github.io\/code\/camo.zip.  2016. http:\/\/bhooi.github.io\/code\/camo.zip."},{"key":"e_1_3_2_2_2_1","unstructured":"2018. https:\/\/github.com\/hadisfr\/biclique.  2018. https:\/\/github.com\/hadisfr\/biclique."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. https:\/\/github.com\/boge-liu\/alpha-beta-core.  2020. https:\/\/github.com\/boge-liu\/alpha-beta-core."},{"key":"e_1_3_2_2_4_1","unstructured":"2021. https:\/\/tianchi.aliyun.com\/dataset\/dataDetail?dataId=123862.  2021. https:\/\/tianchi.aliyun.com\/dataset\/dataDetail?dataId=123862."},{"key":"e_1_3_2_2_5_1","unstructured":"2021. https:\/\/tianchi.aliyun.com\/competition\/entrance\/531925\/introduction.  2021. https:\/\/tianchi.aliyun.com\/competition\/entrance\/531925\/introduction."},{"key":"e_1_3_2_2_6_1","unstructured":"2021. https:\/\/tianchi.aliyun.com\/forum\/postDetail'spm=5176.12586969.1002.15. 333a7671eOe7Cf&postId=316896.  2021. https:\/\/tianchi.aliyun.com\/forum\/postDetail'spm=5176.12586969.1002.15. 333a7671eOe7Cf&postId=316896."},{"key":"e_1_3_2_2_7_1","unstructured":"2022. https:\/\/github.com\/yujianke100\/GFDN.  2022. https:\/\/github.com\/yujianke100\/GFDN."},{"key":"e_1_3_2_2_8_1","unstructured":"2022. https:\/\/github.com\/swig\/swig.  2022. https:\/\/github.com\/swig\/swig."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.71"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013 . Opinion Fraud Detection in Online Reviews by Network Effects . In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013 , Cambridge, Massachusetts, USA , July 8-11, 2013, Emre Kiciman, Nicole B. Ellison, Bernie Hogan, Paul Resnick, and Ian Soboroff (Eds.). The AAAI Press. http:\/\/www.aaai. org\/ocs\/index.php\/ICWSM\/ICWSM13\/paper\/view\/5981 Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8-11, 2013, Emre Kiciman, Nicole B. Ellison, Bernie Hogan, Paul Resnick, and Ian Soboroff (Eds.). The AAAI Press. http:\/\/www.aaai. org\/ocs\/index.php\/ICWSM\/ICWSM13\/paper\/view\/5981"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2003.09.004"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1971.10488811"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.04.011"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380214"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_2_17_1","volume-title":"Graph-Based Machine Learning Improves Just-in-Time Defect Prediction. arXiv preprint arXiv:2110.05371","author":"Bryan Jonathan","year":"2021","unstructured":"Jonathan Bryan and Pablo Moriano . 2021. Graph-Based Machine Learning Improves Just-in-Time Defect Prediction. arXiv preprint arXiv:2110.05371 ( 2021 ). Jonathan Bryan and Pablo Moriano. 2021. Graph-Based Machine Learning Improves Just-in-Time Defect Prediction. arXiv preprint arXiv:2110.05371 (2021)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441783"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108594"},{"key":"e_1_3_2_2_20_1","volume-title":"Mean shift, mode seeking, and clustering","author":"Cheng Yizong","year":"1995","unstructured":"Yizong Cheng . 1995. Mean shift, mode seeking, and clustering . IEEE transactions on pattern analysis and machine intelligence 17, 8 ( 1995 ), 790--799. Yizong Cheng. 1995. Mean shift, mode seeking, and clustering. IEEE transactions on pattern analysis and machine intelligence 17, 8 (1995), 790--799."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358009"},{"key":"e_1_3_2_2_22_1","volume-title":"Fast graph representation learning with PyTorch Geometric. arXiv preprint arXiv:1903.02428","author":"Fey Matthias","year":"2019","unstructured":"Matthias Fey and Jan Eric Lenssen . 2019. Fast graph representation learning with PyTorch Geometric. arXiv preprint arXiv:1903.02428 ( 2019 ). Matthias Fey and Jan Eric Lenssen. 2019. Fast graph representation learning with PyTorch Geometric. arXiv preprint arXiv:1903.02428 (2019)."},{"key":"e_1_3_2_2_23_1","volume-title":"Community detection in graphs. Physics reports 486, 3--5","author":"Fortunato Santo","year":"2010","unstructured":"Santo Fortunato . 2010. Community detection in graphs. Physics reports 486, 3--5 ( 2010 ), 75--174. Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3--5 (2010), 75--174."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 21st World Wide Web Conference 2012, WWW 2012","author":"Ghosh Saptarshi","year":"2012","unstructured":"Saptarshi Ghosh , Bimal Viswanath , Farshad Kooti , Naveen Kumar Sharma , Gautam Korlam , Fabr\u00edcio Benevenuto , Niloy Ganguly , and P. Krishna Gummadi . 2012. Understanding and combating link farming in the twitter social network . In Proceedings of the 21st World Wide Web Conference 2012, WWW 2012 , Lyon, France , April 16-20, 2012 , Alain Mille, Fabien Gandon, Jacques Misselis, Michael Rabinovich, and Steffen Staab (Eds.). ACM, 61--70. https:\/\/doi.org\/10.1145\/2187836. 2187846 10.1145\/2187836 Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabr\u00edcio Benevenuto, Niloy Ganguly, and P. Krishna Gummadi. 2012. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st World Wide Web Conference 2012, WWW 2012, Lyon, France, April 16-20, 2012, Alain Mille, Fabien Gandon, Jacques Misselis, Michael Rabinovich, and Steffen Staab (Eds.). ACM, 61--70. https:\/\/doi.org\/10.1145\/2187836. 2187846"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036102"},{"key":"e_1_3_2_2_27_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton , Zhitao Ying , and Jure Leskovec . 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30 ( 2017 ). Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2968523"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.56"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14976"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482392"},{"key":"e_1_3_2_2_35_1","volume-title":"International Conference on Network Analysis. Springer, 19--35","author":"Ignatov Dmitry I","year":"2018","unstructured":"Dmitry I Ignatov , Polina Ivanova , and Albina Zamaletdinova . 2018 . Mixed integer programming for searching maximum quasi-bicliques . In International Conference on Network Analysis. Springer, 19--35 . Dmitry I Ignatov, Polina Ivanova, and Albina Zamaletdinova. 2018. Mixed integer programming for searching maximum quasi-bicliques. In International Conference on Network Analysis. Springer, 19--35."},{"key":"e_1_3_2_2_36_1","volume-title":"Dissecting click farming on the Taobao platform in China via PU learning and weighted logistic regression. Electronic Commerce Research","author":"Jiang Cuixia","year":"2020","unstructured":"Cuixia Jiang , Jun Zhu , and Qifa Xu. 2020. Dissecting click farming on the Taobao platform in China via PU learning and weighted logistic regression. Electronic Commerce Research ( 2020 ), 1--20. Cuixia Jiang, Jun Zhu, and Qifa Xu. 2020. Dissecting click farming on the Taobao platform in China via PU learning and weighted logistic regression. Electronic Commerce Research (2020), 1--20."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2021.101107"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14953"},{"key":"e_1_3_2_2_40_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds .). http:\/\/arxiv.org\/abs\/1412.6980 Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_2_41_1","volume-title":"Variational graph auto-encoders. arXiv preprint arXiv:1611.07308","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)."},{"key":"e_1_3_2_2_42_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling . 2017 . Semi-Supervised Classification with Graph Convolutional Networks. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings. OpenReview .net. https:\/\/openreview.net\/forum?id=SJU4ayYgl Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=SJU4ayYgl"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159688"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00697-w"},{"key":"e_1_3_2_2_45_1","volume-title":"On information and sufficiency. The annals of mathematical statistics 22, 1","author":"Kullback Solomon","year":"1951","unstructured":"Solomon Kullback and Richard A Leibler . 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 ( 1951 ), 79--86. Solomon Kullback and Richard A Leibler. 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 (1951), 79--86."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883085"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013970520933"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331325"},{"key":"e_1_3_2_2_50_1","volume-title":"Graph convolutional networks with higher-order pooling for semisupervised node classification. Concurr. Comput. Pract. Exp. 34, 16","author":"Lei Fangyuan","year":"2022","unstructured":"Fangyuan Lei , Xun Liu , Jianjian Jiang , Liping Liao , Jun Cai , and Huimin Zhao . 2022. Graph convolutional networks with higher-order pooling for semisupervised node classification. Concurr. Comput. Pract. Exp. 34, 16 ( 2022 ). https: \/\/doi.org\/10.1002\/cpe.5695 10.1002\/cpe.5695 Fangyuan Lei, Xun Liu, Jianjian Jiang, Liping Liao, Jun Cai, and Huimin Zhao. 2022. Graph convolutional networks with higher-order pooling for semisupervised node classification. Concurr. Comput. Pract. Exp. 34, 16 (2022). https: \/\/doi.org\/10.1002\/cpe.5695"},{"key":"e_1_3_2_2_51_1","volume-title":"Large-scale Fake Click Detection for E-commerce Recommendation Systems. In 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, 2595--2606","author":"Li Jingdong","year":"2021","unstructured":"Jingdong Li , Zhao Li , Jiaming Huang , Ji Zhang , Xiaoling Wang , Xingjian Lu , and Jingren Zhou . 2021 . Large-scale Fake Click Detection for E-commerce Recommendation Systems. In 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, 2595--2606 . Jingdong Li, Zhao Li, Jiaming Huang, Ji Zhang, Xiaoling Wang, Xingjian Lu, and Jingren Zhou. 2021. Large-scale Fake Click Detection for E-commerce Recommendation Systems. In 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, 2595--2606."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8357744"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.53"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186150"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313522"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397463"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69733-6_26"},{"key":"e_1_3_2_2_59_1","volume-title":"andWensheng Zhang","author":"Liu Yajing","year":"2022","unstructured":"Yajing Liu , Zhengya Sun , andWensheng Zhang . 2022 . Improving Fraud Detection via Hierarchical Attention-based Graph Neural Network. CoRR abs\/2202.06096 (2022). arXiv:2202.06096 https:\/\/arxiv.org\/abs\/2202.06096 Yajing Liu, Zhengya Sun, andWensheng Zhang. 2022. Improving Fraud Detection via Hierarchical Attention-based Graph Neural Network. CoRR abs\/2202.06096 (2022). arXiv:2202.06096 https:\/\/arxiv.org\/abs\/2202.06096"},{"key":"e_1_3_2_2_60_1","volume-title":"Interpretable signed link prediction with signed infomax hyperbolic graph","author":"Luo Yadan","year":"2021","unstructured":"Yadan Luo , Zi Huang , Hongxu Chen , Yang Yang , Hongzhi Yin , and Mahsa Baktashmotlagh . 2021. Interpretable signed link prediction with signed infomax hyperbolic graph . IEEE Transactions on Knowledge and Data Engineering ( 2021 ). Yadan Luo, Zi Huang, Hongxu Chen, Yang Yang, Hongzhi Yin, and Mahsa Baktashmotlagh. 2021. Interpretable signed link prediction with signed infomax hyperbolic graph. IEEE Transactions on Knowledge and Data Engineering (2021)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.14778\/3397230.3397234"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24070906"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741655"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"e_1_3_2_2_65_1","volume-title":"Finding and evaluating community structure in networks. Physical review E 69, 2","author":"Newman Mark EJ","year":"2004","unstructured":"Mark EJ Newman and Michelle Girvan . 2004. Finding and evaluating community structure in networks. Physical review E 69, 2 ( 2004 ), 026113. Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community structure in networks. Physical review E 69, 2 (2004), 026113."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_42"},{"key":"e_1_3_2_2_68_1","volume-title":"Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3","author":"Raghavan Usha Nandini","year":"2007","unstructured":"Usha Nandini Raghavan , R\u00e9ka Albert , and Soundar Kumara . 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 ( 2007 ), 036106. Usha Nandini Raghavan, R\u00e9ka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 (2007), 036106."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00197"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00150"},{"key":"e_1_3_2_2_71_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research 9 , 11 (2008). Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_2_72_1","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. (2018). https: \/\/openreview.net\/forum?id=rJXMpikCZ  Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. (2018). https: \/\/openreview.net\/forum?id=rJXMpikCZ"},{"key":"e_1_3_2_2_73_1","volume-title":"Review Graph Based Online Store Review Spammer Detection. In 11th IEEE International Conference on Data Mining, ICDM 2011","author":"Wang Guan","year":"2011","unstructured":"Guan Wang , Sihong Xie , Bing Liu , and Philip S. Yu . 2011 . Review Graph Based Online Store Review Spammer Detection. In 11th IEEE International Conference on Data Mining, ICDM 2011 , Vancouver, BC, Canada , December 11-14, 2011 , Diane J. Cook, Jian Pei, Wei Wang, Osmar R. Za\u00efane, and Xindong Wu (Eds.). IEEE Computer Society, 1242--1247. https:\/\/doi.org\/10.1109\/ICDM.2011.124 10.1109\/ICDM.2011.124 Guan Wang, Sihong Xie, Bing Liu, and Philip S. Yu. 2011. Review Graph Based Online Store Review Spammer Detection. In 11th IEEE International Conference on Data Mining, ICDM 2011, Vancouver, BC, Canada, December 11-14, 2011, Diane J. Cook, Jian Pei, Wei Wang, Osmar R. Za\u00efane, and Xindong Wu (Eds.). IEEE Computer Society, 1242--1247. https:\/\/doi.org\/10.1109\/ICDM.2011.124"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2337542.2337546"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316586"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00063"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-011-9392-4"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864757"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"e_1_3_2_2_80_1","volume-title":"The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12","author":"Xie Sihong","year":"2012","unstructured":"Sihong Xie , Guan Wang , Shuyang Lin , and Philip S. Yu . 2012. Review spam detection via temporal pattern discovery . In The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12 , Beijing, China , August 12-16, 2012 , Qiang Yang, Deepak Agarwal, and Jian Pei (Eds.). ACM, 823--831. https:\/\/doi.org\/10.1145\/2339530.2339662 10.1145\/2339530.2339662 Sihong Xie, Guan Wang, Shuyang Lin, and Philip S. Yu. 2012. Review spam detection via temporal pattern discovery. In The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, Beijing, China, August 12-16, 2012, Qiang Yang, Deepak Agarwal, and Jian Pei (Eds.). ACM, 823--831. https:\/\/doi.org\/10.1145\/2339530.2339662"},{"key":"e_1_3_2_2_81_1","volume-title":"Towards Collusive Fraud Detection in Online Reviews. In 2015 IEEE International Conference on Data Mining, ICDM 2015","author":"Xu Chang","year":"2015","unstructured":"Chang Xu and Jie Zhang . 2015 . Towards Collusive Fraud Detection in Online Reviews. In 2015 IEEE International Conference on Data Mining, ICDM 2015 , Atlantic City, NJ, USA , November 14-17, 2015, Charu C. Aggarwal, Zhi-Hua Zhou, Alexander Tuzhilin, Hui Xiong, and Xindong Wu (Eds.). IEEE Computer Society, 1051--1056. https:\/\/doi.org\/10.1109\/ICDM.2015.62 10.1109\/ICDM.2015.62 Chang Xu and Jie Zhang. 2015. Towards Collusive Fraud Detection in Online Reviews. In 2015 IEEE International Conference on Data Mining, ICDM 2015, Atlantic City, NJ, USA, November 14-17, 2015, Charu C. Aggarwal, Zhi-Hua Zhou, Alexander Tuzhilin, Hui Xiong, and Xindong Wu (Eds.). IEEE Computer Society, 1051--1056. https:\/\/doi.org\/10.1109\/ICDM.2015.62"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098859"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447702"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517847"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP51882.2021.9408977"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06863-1"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_2_88_1","volume-title":"Bipartite graph capsule network. World Wide Web","author":"Zhang Xianhang","year":"2022","unstructured":"Xianhang Zhang , Hanchen Wang , Jianke Yu , Chen Chen , Xiaoyang Wang , and Wenjie Zhang . 2022. Bipartite graph capsule network. World Wide Web ( 2022 ), 1--20. Xianhang Zhang, Hanchen Wang, Jianke Yu, Chen Chen, Xiaoyang Wang, and Wenjie Zhang. 2022. Bipartite graph capsule network. World Wide Web (2022), 1--20."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01015-4"},{"key":"e_1_3_2_2_90_1","volume-title":"On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types. BMC bioinformatics 15, 1","author":"Zhang Yun","year":"2014","unstructured":"Yun Zhang , Charles A Phillips , Gary L Rogers , Erich J Baker , Elissa J Chesler , and Michael A Langston . 2014. On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types. BMC bioinformatics 15, 1 ( 2014 ), 1--18. Yun Zhang, Charles A Phillips, Gary L Rogers, Erich J Baker, Elissa J Chesler, and Michael A Langston. 2014. On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types. BMC bioinformatics 15, 1 (2014), 1--18."},{"key":"e_1_3_2_2_91_1","volume-title":"Wenping Zhang, Kaihang Zhang, Xu Chen, and Deyu Tang.","author":"Zhao Jie","year":"2016","unstructured":"Jie Zhao , Raymond YK Lau , Wenping Zhang, Kaihang Zhang, Xu Chen, and Deyu Tang. 2016 . Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-Commerce. Decision support systems 86 (2016), 109--121. Jie Zhao, Raymond YK Lau, Wenping Zhang, Kaihang Zhang, Xu Chen, and Deyu Tang. 2016. Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-Commerce. Decision support systems 86 (2016), 109--121."}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:23Z","timestamp":1750182563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":91,"alternative-id":["10.1145\/3580305.3599836","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599836","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}