{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:54Z","timestamp":1750309374561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3690407.3690589","type":"proceedings-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T18:55:28Z","timestamp":1729796128000},"page":"1094-1100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["NMFA: Node-Level Multi-Frequency Adaptive Graph Neural Network for Graph Fraud Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2245-0771","authenticated-orcid":false,"given":"Pin","family":"Xu","sequence":"first","affiliation":[{"name":"School of Information Engineering, Nanjing University of Finance and Economics, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4726-7493","authenticated-orcid":false,"given":"Youquan","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2960-8234","authenticated-orcid":false,"given":"Mingjie","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Management, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1329-5620","authenticated-orcid":false,"given":"Zixu","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Management Science and Engineering, Nanjing University of Information Science &amp; Technology, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12199637"},{"key":"e_1_3_3_1_2_2","volume-title":"October. Systematic Review of Issues and Solutions for Security in E-commerce. In 2020 International Conference on Electrical Engineering and Informatics (ICELTICs) (pp. 1-5). IEEE.","author":"Jamra R. K.","year":"2020","unstructured":"Jamra, R. K., Anggorojati, B., Sensuse, D. I., & Suryono, R. R. 2020, October. Systematic Review of Issues and Solutions for Security in E-commerce. In 2020 International Conference on Electrical Engineering and Informatics (ICELTICs) (pp. 1-5). IEEE."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_3_1_4_2","volume-title":"Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval (pp. 1569-1572)","author":"Liu Z.","year":"2020","unstructured":"Liu, Z., Dou, Y., Yu, P. S., Deng, Y., & Peng, H. 2020, July. Alleviating the inconsistency problem of applying graph neural network to fraud detection. In Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval (pp. 1569-1572)."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_3_1_6_2","first-page":"3950","volume-title":"Proceedings of the AAAI conference on artificial intelligence (Vol. 35","author":"Bo D.","year":"2021","unstructured":"Bo, D., Wang, X., Shi, C., & Shen, H. 2021, May. Beyond low-frequency information in graph convolutional networks. In Proceedings of the AAAI conference on artificial intelligence (Vol. 35, No. 5, pp. 3950-3957)."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Chai Z. You S. Yang Y. Pu S. Xu J. Cai H. & Jiang W. 2022 July. Can abnormality be detected by graph neural networks?. In IJCAI (pp. 1945-1951).","DOI":"10.24963\/ijcai.2022\/270"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583335"},{"key":"e_1_3_3_1_9_2","volume-title":"International Conference on Machine Learning (pp. 21076-21089)","author":"Tang J.","year":"2022","unstructured":"Tang, J., Li, J., Gao, Z., & Li, J. 2022, June. Rethinking graph neural networks for anomaly detection. In International Conference on Machine Learning (pp. 21076-21089). PMLR."},{"key":"e_1_3_3_1_10_2","volume-title":"Proceedings of the ACM Web Conference 2023 (pp. 1528-1538)","author":"Gao Y.","year":"2023","unstructured":"Gao, Y., Wang, X., He, X., Liu, Z., Feng, H., & Zhang, Y. 2023, April. Addressing heterophily in graph anomaly detection: A perspective of graph spectrum. In Proceedings of the ACM Web Conference 2023 (pp. 1528-1538)."},{"key":"e_1_3_3_1_11_2","volume-title":"Proceedings of the web conference 2021 (pp. 3168-3177)","author":"Liu Y.","year":"2021","unstructured":"Liu, Y., Ao, X., Qin, Z., Chi, J., Feng, J., Yang, H., & He, Q. 2021, April. Pick and choose: a GNN-based imbalanced learning approach for fraud detection. In Proceedings of the web conference 2021 (pp. 3168-3177)."},{"key":"e_1_3_3_1_12_2","volume-title":"Proceedings of the ACM Web Conference 2022 (pp. 1486-1494)","author":"Shi F.","year":"2022","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., & Wu, J. 2022, April. H2-fdetector: A gnn-based fraud detector with homophilic and heterophilic connections. In Proceedings of the ACM Web Conference 2022 (pp. 1486-1494)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3016143"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_3_1_16_2","volume-title":"November. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations.","author":"Kipf T. N.","year":"2016","unstructured":"Kipf, T. N., & Welling, M. 2016, November. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations."},{"key":"e_1_3_3_1_17_2","unstructured":"Velickovic P. Cucurull G. Casanova A. Romero A. Lio P. & Bengio Y. 2017. Graph attention networks. stat 1050(20) 10-48550."},{"key":"e_1_3_3_1_18_2","unstructured":"Hamilton W. Ying Z. & Leskovec J. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30."},{"key":"e_1_3_3_1_19_2","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32.","author":"Paszke A.","year":"2019","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., ... & Chintala, S. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32."},{"key":"e_1_3_3_1_20_2","volume-title":"ICLR workshop on representation learning on graphs and manifolds.","author":"Wang M. Y.","year":"2019","unstructured":"Wang, M. Y. 2019, January. Deep graph library: Towards efficient and scalable deep learning on graphs. In ICLR workshop on representation learning on graphs and manifolds."}],"event":{"name":"CAIBDA 2024: 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","acronym":"CAIBDA 2024","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690407.3690589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:21Z","timestamp":1750291581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":20,"alternative-id":["10.1145\/3690407.3690589","10.1145\/3690407"],"URL":"https:\/\/doi.org\/10.1145\/3690407.3690589","relation":{},"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}