{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:30Z","timestamp":1750309410815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFC3304800"],"award-info":[{"award-number":["2023YFC3304800"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679863","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"1473-1482","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Collaborative Fraud Detection on Large Scale Graph Using Secure Multi-Party Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9165-7418","authenticated-orcid":false,"given":"Xin","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6962-643X","authenticated-orcid":false,"given":"Xiaoyu","family":"Fan","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9437-8826","authenticated-orcid":false,"given":"Rong","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2370-5372","authenticated-orcid":false,"given":"Kun","family":"Chen","sequence":"additional","affiliation":[{"name":"Ant Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0357-6166","authenticated-orcid":false,"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Independent Researcher, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4539-4053","authenticated-orcid":false,"given":"Guosai","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsingjiao Information Technology Co. Ltd., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9271-0223","authenticated-orcid":false,"given":"Wei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on E-Business. 269--276","author":"Alexopoulos Panos","year":"2008","unstructured":"Panos Alexopoulos, Kostas Kafentzis, Xanthi Benetou, Tassos Tagaris, and Panos Georgolios. 2008. Towards a Generic Fraud Ontology in e-Government. In International Conference on E-Business. 269--276."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2771251"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of The Web Conference","author":"Ban Yikun","year":"2019","unstructured":"Yikun Ban, Xin Liu, Yitao Duan, Xue Liu, and Wei Xu. 2019. No Place to Hide: Catching Fraudulent Entities in Tensors. In Proceedings of The Web Conference 2019."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Alex Beutel Wanhong Xu Venkatesan Guruswami Christopher Palow and Christos Faloutsos. 2013. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior In Social Networks. In WWW. 119--130.","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599504"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"e_1_3_2_1_9_1","volume-title":"Breaking the Circuit Size Barrier for Secure Computation Under DDH. In CRYPTO","author":"Boyle Elette","year":"2016","unstructured":"Elette Boyle, Niv Gilboa, and Yuval Ishai. 2016. Breaking the Circuit Size Barrier for Secure Computation Under DDH. In CRYPTO 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd IEEE Symposium on Foundations of Computer Science. IEEE, 136--145","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd IEEE Symposium on Foundations of Computer Science. IEEE, 136--145."},{"key":"e_1_3_2_1_11_1","volume-title":"Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM SIGSAC Conference on Computer and Communications Security. ACM, 477--488","author":"Cao Qiang","year":"2014","unstructured":"Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM SIGSAC Conference on Computer and Communications Security. ACM, 477--488."},{"key":"e_1_3_2_1_12_1","volume-title":"Edge Differential Privacy for Algebraic Connectivity of Graphs. In 2021 60th IEEE Conference on Decision and Control (CDC). 2764--2769","author":"Chen Bo","year":"2021","unstructured":"Bo Chen, Calvin Hawkins, Kasra Yazdani, and Matthew Hale. 2021. Edge Differential Privacy for Algebraic Connectivity of Graphs. In 2021 60th IEEE Conference on Decision and Control (CDC). 2764--2769."},{"key":"e_1_3_2_1_13_1","volume-title":"When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control. In 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining.","author":"Chen Chaochao","year":"2021","unstructured":"Chaochao Chen, Jun Zhou, L. xilinx Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Xiaoxi Ji, Alex X. Liu, Hao Wang, and Cheng Hong. 2021. When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control. In 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"e_1_3_2_1_15_1","volume-title":"Adaptive Universal Generalized PageRank Graph Neural Network. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=n6jl7fLxrP","author":"Chien Eli","year":"2021","unstructured":"Eli Chien, Jianhao Peng, Pan Li, and Olgica Milenkovic. 2021. Adaptive Universal Generalized PageRank Graph Neural Network. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=n6jl7fLxrP"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403135"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560565"},{"key":"e_1_3_2_1_19_1","volume-title":"Fully Homomorphic Encryption Using Ideal Lattices. In STOC '09","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry. 2009. Fully Homomorphic Encryption Using Ideal Lattices. In STOC '09."},{"key":"e_1_3_2_1_20_1","first-page":"106","article-title":"Algorithms in HElib","volume":"2014","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. IACR Cryptology ePrint Archive, Vol. 2014 (2014), 106.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_15"},{"key":"e_1_3_2_1_22_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In Advances in Neural Information Processing Systems. 1024--1034."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_3_2_1_24_1","volume-title":"Gazelle: A Low Latency Framework for Secure Neural Network Inference. In IACR Cryptology ePrint Archive.","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. Gazelle: A Low Latency Framework for Secure Neural Network Inference. In IACR Cryptology ePrint Archive."},{"volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Thomas","key":"e_1_3_2_1_25_1","unstructured":"Thomas N. Kipf and Max Welling. 2007. Semi-Supervised Classification with Graph Convolutional Networks. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0011"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455337"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330920"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_1_31_1","first-page":"1163","article-title":"Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data","volume":"2016","author":"Lu Wenjie","year":"2016","unstructured":"Wenjie Lu, Shohei Kawasaki, and Jun Sakuma. 2016. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 1163.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_33_1","unstructured":"Jianmo Ni Jiacheng Li and Julian McAuley. 2019. Justifying Recommendations using Distantly-Labeled Reviews and Fine-Grained Aspects. In EMNLP."},{"key":"e_1_3_2_1_34_1","unstructured":"U.S. Department of Justice Federal Bureau of Investigation. 2015. 2015 Internet Crime Report. https:\/\/pdf.ic3.gov\/2015_IC3Report.pdf."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4939--2864--4_549"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154414"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Kijung Shin Bryan Hooi Jisu Kim and Christos Faloutsos. 2017. D-Cube: Dense-Block Detection in Terabyte-Scale Tensors. In WSDM. 681--689.","DOI":"10.1145\/3018661.3018676"},{"key":"e_1_3_2_1_38_1","volume-title":"Secure Multi-Party Protocols for Item-Based Collaborative Filtering. In RecSys '17","author":"Shmueli Erez","year":"2017","unstructured":"Erez Shmueli and Tamir Tassa. 2017. Secure Multi-Party Protocols for Item-Based Collaborative Filtering. In RecSys '17."},{"key":"e_1_3_2_1_39_1","volume-title":"Workshop on the Economics of Information Security.","author":"Thomas Kurt","year":"2015","unstructured":"Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna. 2015. Framing Dependencies Introduced by Underground Commoditization. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Tian Tian Jun Zhu Fen Xia Xin Zhuang and Tong Zhang. 2015. Crowd fraud detection in internet advertising. In WWW. 1100--1110.","DOI":"10.1145\/2736277.2741136"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS57875.2023.00029"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26702"},{"key":"e_1_3_2_1_44_1","first-page":"18839","article-title":"Federated Graph Classification over Non-IID Graphs","volume":"34","author":"Xie Han","year":"2021","unstructured":"Han Xie, Jing Ma, Li Xiong, and Carl Yang. 2021. Federated Graph Classification over Non-IID Graphs. Advances in Neural Information Processing Systems, Vol. 34 (2021), 18839--18852.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.11.002"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380213"},{"key":"e_1_3_2_1_48_1","first-page":"6671","article-title":"Subgraph Federated Learning with Missing Neighbor Generation","volume":"34","author":"Zhang Ke","year":"2021","unstructured":"Ke Zhang, Carl Yang, Xiaoxiao Li, Lichao Sun, and Siu Ming Yiu. 2021. Subgraph Federated Learning with Missing Neighbor Generation. Advances in Neural Information Processing Systems, Vol. 34 (2021), 6671--6682.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"Zhou Jun","year":"2022","unstructured":"Jun Zhou, Chaochao Chen, Longfei Zheng, Huiwen Wu, Jia Wu, Xiaolin Zheng, Bingzhe Wu, Ziqi Liu, and Li Wang. 2022. Vertically Federated Graph Neural Network for Privacy-Preserving Node Classification. In Proceedings of the International Joint Conference on Artificial Intelligence 2022."}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:08Z","timestamp":1750294688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":49,"alternative-id":["10.1145\/3627673.3679863","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679863","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}