{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:47:59Z","timestamp":1755794879432,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2200410, 2232693, 2148359"],"award-info":[{"award-number":["2200410, 2232693, 2148359"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["A9550-21-1-0090"],"award-info":[{"award-number":["A9550-21-1-0090"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000142212181"],"award-info":[{"award-number":["N000142212181"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709170","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:44:43Z","timestamp":1743792283000},"page":"378-389","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Benchmarking Fraud Detectors on Private Graph Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1818-6387","authenticated-orcid":false,"given":"Alexander","family":"Goldberg","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7671-2624","authenticated-orcid":false,"given":"Giulia","family":"Fanti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5158-9677","authenticated-orcid":false,"given":"Nihar","family":"Shah","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8125-8227","authenticated-orcid":false,"given":"Steven","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_2_2_1","unstructured":"Andr\u00e9s F Barrientos Aaron R Williams Joshua Snoke and CM Bowen. 2021. Differentially Private Methods for Validation Servers. Technical Report. Urban Institute research report."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422449"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0066"},{"key":"e_1_3_2_2_5_1","volume-title":"Generalized Private Selection and Testing with High Confidence. ArXiv","author":"Cohen Edith","year":"2063","unstructured":"Edith Cohen, Xin Lyu, Jelani Nelson, Tam'as Sarl'os, and Uri Stemmer. 2022. Generalized Private Selection and Testing with High Confidence. ArXiv, Vol. abs\/2211.12063 (2022). https:\/\/api.semanticscholar.org\/CorpusID:253761282"},{"key":"e_1_3_2_2_6_1","volume-title":"As Nationwide Fraud Losses Top $10 Billion","author":"Federal Trade Commission","year":"2023","unstructured":"Federal Trade Commission. 2024. As Nationwide Fraud Losses Top $10 Billion in 2023, FTC Steps Up Efforts to Protect the Public. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/02\/nationwide-fraud-losses-top-10-billion-2023-ftc-steps-efforts-protect-public. (Accessed on 02\/29\/2024)."},{"volume-title":"Datavisor: AI Powered Fraud Platform for Enterprise. https:\/\/www.datavisor.com\/ (Accessed on 02\/29\/2024).","year":"2024","key":"e_1_3_2_2_7_1","unstructured":"Datavisor. 2024. Datavisor: AI Powered Fraud Platform for Enterprise. https:\/\/www.datavisor.com\/ (Accessed on 02\/29\/2024)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"volume-title":"Differential Privacy","author":"Dwork Cynthia","key":"e_1_3_2_2_10_1","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--12."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_13_1","unstructured":"Prince Grover Julia Xu Justin Tittelfitz Anqi Cheng Zheng Li Jakub Zablocki Jianbo Liu and Hao Zhou. 2023. Fraud Dataset Benchmark and Applications. arxiv: 2208.14417 [cs.LG]"},{"key":"e_1_3_2_2_14_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00002"},{"key":"e_1_3_2_2_16_1","unstructured":"Steven Jecmen Nihar B. Shah Fei Fang and Leman Akoglu. 2024. On the Detection of Reviewer-Author Collusion Rings From Paper Bidding. arxiv: 2402.07860 [cs.SI]"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","unstructured":"Steven Jecmen Minji Yoon Vincent Conitzer Nihar B. Shah and Fei Fang. 2022. A Dataset on Malicious Paper Bidding in Peer Review. https:\/\/doi.org\/10.48550\/ARXIV.2207.02303","DOI":"10.48550\/ARXIV.2207.02303"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633620"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915215"},{"volume-title":"Kaggle: Your Machine Learning and Data Science Community. https:\/\/www.kaggle.com\/ (Accessed on 02\/29\/2024).","year":"2024","key":"e_1_3_2_2_20_1","unstructured":"Kaggle. 2024. Kaggle: Your Machine Learning and Data Science Community. https:\/\/www.kaggle.com\/ (Accessed on 02\/29\/2024)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611523"},{"volume-title":"Theory of Cryptography","author":"Kasiviswanathan Shiva Prasad","key":"e_1_3_2_2_22_1","unstructured":"Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2013. Analyzing Graphs with Node Differential Privacy. In Theory of Cryptography, Amit Sahai (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 457--476."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510612113"},{"key":"e_1_3_2_2_24_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0089"},{"volume-title":"Kount: Fraud Detection and Chargeback Management Solutions. https:\/\/kount.com\/ (Accessed on 02\/29\/2024).","year":"2024","key":"e_1_3_2_2_26_1","unstructured":"Kount. 2024. Kount: Fraud Detection and Chargeback Management Solutions. https:\/\/kount.com\/ (Accessed on 02\/29\/2024)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772749"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379443"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429776"},{"key":"e_1_3_2_2_30_1","volume-title":"Private Selection from Private Candidates. arxiv","author":"Liu Jingcheng","year":"1811","unstructured":"Jingcheng Liu and Kunal Talwar. 2018. Private Selection from Private Candidates. arxiv: 1811.07971 [cs.DS]"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809385"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_35_1","volume-title":"Scalable Private Learning with PATE. arxiv","author":"Papernot Nicolas","year":"1802","unstructured":"Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable Private Learning with PATE. arxiv: 1802.08908 [stat.ML]"},{"key":"e_1_3_2_2_36_1","volume-title":"Hyperparameter Tuning with Renyi Differential Privacy. ArXiv","author":"Papernot Nicolas","year":"2021","unstructured":"Nicolas Papernot and Thomas Steinke. 2021. Hyperparameter Tuning with Renyi Differential Privacy. ArXiv, Vol. abs\/2110.03620 (2021). https:\/\/api.semanticscholar.org\/CorpusID:238419564"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"8681","author":"Qiao Gang","year":"2021","unstructured":"Gang Qiao, Weijie Su, and Li Zhang. 2021. Oneshot Differentially Private Top-k Selection. In Proceedings of the 38th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 139), Marina Meila and Tong Zhang (Eds.). PMLR, 8672--8681. https:\/\/proceedings.mlr.press\/v139\/qiao21b.html"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.10.006"},{"volume-title":"Riskified: Fraud Prevention & Chargeback Fraud Protection. https:\/\/www.riskified.com\/ (Accessed on 02\/29\/2024).","year":"2024","key":"e_1_3_2_2_39_1","unstructured":"Riskified. 2024. Riskified: Fraud Prevention & Chargeback Fraud Protection. https:\/\/www.riskified.com\/ (Accessed on 02\/29\/2024)."},{"key":"e_1_3_2_2_40_1","volume-title":"From Louvain to","author":"Traag Vincent A","year":"2019","unstructured":"Vincent A Traag, Ludo Waltman, and Nees Jan Van Eck. 2019. From Louvain to Leiden: guaranteeing well-connected communities. Scientific reports, Vol. 9, 1 (2019), 5233."},{"key":"e_1_3_2_2_41_1","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio Yoshua Bengio et al. 2017. Graph attention networks. stat Vol. 1050 20 (2017) 10--48550."},{"key":"e_1_3_2_2_42_1","volume-title":"Potential Organized Fraud in ACM\/IEEE Computer Architecture Conferences. https:\/\/medium.com\/@tnvijayk\/potential-organized-fraud-in-acm-ieee-computer-architecture- conferences-ccd61169370d.","author":"Vijaykumar T. N.","year":"2020","unstructured":"T. N. Vijaykumar. 2020. Potential Organized Fraud in ACM\/IEEE Computer Architecture Conferences. https:\/\/medium.com\/@tnvijayk\/potential-organized-fraud-in-acm-ieee-computer-architecture- conferences-ccd61169370d."},{"key":"e_1_3_2_2_43_1","volume-title":"Leiserson","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. arxiv: 1908.02591 [cs.SI]"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning, ICML 2021, 18--24","volume":"11250","author":"Wu Ruihan","year":"2021","unstructured":"Ruihan Wu, Chuan Guo, Felix Wu, Rahul Kidambi, Laurens van der Maaten, and Kilian Q. Weinberger. 2021. Making Paper Reviewing Robust to Bid Manipulation Attacks. In Proceedings of the 38th International Conference on Machine Learning, ICML 2021, 18--24 July 2021, Virtual Event (Proceedings of Machine Learning Research, Vol. 139), Marina Meila and Tong Zhang (Eds.). PMLR, Virtual Event, 11240--11250. http:\/\/proceedings.mlr.press\/v139\/wu21b.html"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3618408.3620088"},{"key":"e_1_3_2_2_46_1","first-page":"279","article-title":"Differentially Private Verification of Regression Predictions from Synthetic","volume":"11","author":"Yu Haoyang","year":"2018","unstructured":"Haoyang Yu and Jerome P Reiter. 2018. Differentially Private Verification of Regression Predictions from Synthetic Data. Trans. Data Priv., Vol. 11, 3 (2018), 279--297.","journal-title":"Data. Trans. Data Priv."},{"key":"e_1_3_2_2_47_1","volume-title":"Advances in Neural Information Processing Systems","volume":"36","author":"Zahirnia Kiarash","year":"2024","unstructured":"Kiarash Zahirnia, Yaochen Hu, Mark Coates, and Oliver Schulte. 2024. Neural Graph Generation from Graph Statistics. Advances in Neural Information Processing Systems, Vol. 36 (2024)."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:46:48Z","timestamp":1755359208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":47,"alternative-id":["10.1145\/3690624.3709170","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709170","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}