{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:51:30Z","timestamp":1776181890759,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671534","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"5329-5338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8673-5540","authenticated-orcid":false,"given":"Kaidi","family":"Li","sequence":"first","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6274-0915","authenticated-orcid":false,"given":"Tianmeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4088-1266","authenticated-orcid":false,"given":"Min","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6488-1339","authenticated-orcid":false,"given":"Jiahao","family":"Meng","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7806-4133","authenticated-orcid":false,"given":"Shendi","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1894-8499","authenticated-orcid":false,"given":"Yihui","family":"Wu","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9744-6520","authenticated-orcid":false,"given":"Boshuai","family":"Tan","sequence":"additional","affiliation":[{"name":"ICBC Limited, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9283-361X","authenticated-orcid":false,"given":"Hu","family":"Song","sequence":"additional","affiliation":[{"name":"ICBC Limited, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8988-4740","authenticated-orcid":false,"given":"Lujia","family":"Pan","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9772-1503","authenticated-orcid":false,"given":"Fan","family":"Yu","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9127-1496","authenticated-orcid":false,"given":"Zhenli","family":"Sheng","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8735-2516","authenticated-orcid":false,"given":"Yunhai","family":"Tong","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192583"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"e_1_3_2_1_3_1","volume-title":"Markov-driven graph convolutional networksfor social spammer detection","author":"Deng Leyan","year":"2022","unstructured":"Leyan Deng, Chenwang Wu, Defu Lian, Yongji Wu, and Enhong Chen. 2022. Markov-driven graph convolutional networksfor social spammer detection. IEEE Transactions on Knowledge and Data Engineering (2022)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_1_5_1","volume-title":"Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds.","author":"Fey Matthias","unstructured":"Matthias Fey and Jan E. Lenssen. 2019. Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380297"},{"key":"e_1_3_2_1_7_1","volume-title":"International conference on machine learning. PMLR, 1263--1272","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer, Samuel S Schoenholz, Patrick F Riley, Oriol Vinyals, and George E Dahl. 2017. Neural message passing for quantum chemistry. In International conference on machine learning. PMLR, 1263--1272."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025--1035","author":"Hamilton William L","year":"2017","unstructured":"William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025--1035."},{"key":"e_1_3_2_1_9_1","volume-title":"Financial fraud: a review of anomaly detection techniques and recent advances. Expert systems With applications","author":"Hilal Waleed","year":"2022","unstructured":"Waleed Hilal, S Andrew Gadsden, and John Yawney. 2022. Financial fraud: a review of anomaly detection techniques and recent advances. Expert systems With applications, Vol. 193 (2022), 116429."},{"key":"e_1_3_2_1_10_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380027"},{"key":"e_1_3_2_1_12_1","volume-title":"Huawei Technologies Co","year":"2022","unstructured":"Ltd. Huawei Technologies Co. 2022. Huawei MindSpore AI Development Framework. In Artificial Intelligence Technology. Springer, 137--162."},{"key":"e_1_3_2_1_13_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Learning Representations (ICLR)","author":"Kipf Thomas N","year":"2017","unstructured":"Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. International Conference on Learning Representations (ICLR) (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614959"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014424"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401253"},{"key":"e_1_3_2_1_21_1","volume-title":"Parameterized explainer for graph neural network. Advances in neural information processing systems","author":"Luo Dongsheng","year":"2020","unstructured":"Dongsheng Luo, Wei Cheng, Dongkuan Xu, Wenchao Yu, Bo Zong, Haifeng Chen, and Xiang Zhang. 2020. Parameterized explainer for graph neural network. Advances in neural information processing systems, Vol. 33 (2020), 19620--19631."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of ACM SIGKDD conference","volume":"9","author":"Ma Jun","year":"2018","unstructured":"Jun Ma, Danqing Zhang, Yun Wang, Yan Zhang, and Alexey Pozdnoukhov. 2018. GraphRAD: a graph-based risky account detection system. In Proceedings of ACM SIGKDD conference, London, UK, Vol. 9."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_2_1_25_1","volume-title":"xFraud: explainable fraud transaction detection. arXiv preprint arXiv:2011.12193","author":"Rao Susie Xi","year":"2020","unstructured":"Susie Xi Rao, Shuai Zhang, Zhichao Han, Zitao Zhang, Wei Min, Zhiyao Chen, Yinan Shan, Yang Zhao, and Ce Zhang. 2020. xFraud: explainable fraud transaction detection. arXiv preprint arXiv:2011.12193 (2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"e_1_3_2_1_28_1","volume-title":"MM-FRec: Multi-Modal Enhanced Fashion Item Recommendation","author":"Song Xuemeng","year":"2023","unstructured":"Xuemeng Song, Chun Wang, Changchang Sun, Shanshan Feng, Min Zhou, and Liqiang Nie. 2023. MM-FRec: Multi-Modal Enhanced Fashion Item Recommendation. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.6007\/IJARAFMS\/v11-i1\/8987"},{"key":"e_1_3_2_1_30_1","volume-title":"Attention is all you need. Advances in neural information processing systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Learning Representations (ICLR)","author":"Velivckovi\u0107 Petar","year":"2017","unstructured":"Petar Velivckovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. International Conference on Learning Representations (ICLR) (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316586"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang Houye Ji Chuan Shi Bai Wang Yanfang Ye Peng Cui and Philip S Yu. 2019. Heterogeneous graph attention network. In The world wide web conference. 2022--2032.","DOI":"10.1145\/3308558.3313562"},{"key":"e_1_3_2_1_35_1","volume-title":"Claudio Bellei, Tom Robinson, and Charles E Leiserson.","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I Weidele, Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467422"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512118"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20864"},{"key":"e_1_3_2_1_39_1","volume-title":"Mitigating Semantic Confusion from Hostile Neighborhood for Graph Active Learning. arXiv preprint arXiv:2308.08823","author":"Yang Tianmeng","year":"2023","unstructured":"Tianmeng Yang, Min Zhou, Yujing Wang, Zhengjie Lin, Lujia Pan, Bin Cui, and Yunhai Tong. 2023. Mitigating Semantic Confusion from Hostile Neighborhood for Graph Active Learning. arXiv preprint arXiv:2308.08823 (2023)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26283"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_42_1","volume-title":"Gnnexplainer: Generating explanations for graph neural networks. Advances in neural information processing systems","author":"Ying Zhitao","year":"2019","unstructured":"Zhitao Ying, Dylan Bourgeois, Jiaxuan You, Marinka Zitnik, and Jure Leskovec. 2019. Gnnexplainer: Generating explanations for graph neural networks. Advances in neural information processing systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403085"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_1_45_1","volume-title":"Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks. arXiv preprint arXiv:1709.06916","author":"Zheng Haizhong","year":"2017","unstructured":"Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross. 2017. Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks. arXiv preprint arXiv:1709.06916 (2017)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380159"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Barcelona Spain","acronym":"KDD '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:19Z","timestamp":1750291459000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":46,"alternative-id":["10.1145\/3637528.3671534","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671534","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}