{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T13:56:59Z","timestamp":1777039019525,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62272487 and 62433016"],"award-info":[{"award-number":["No. 62272487 and 62433016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755245","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:26:38Z","timestamp":1761377198000},"page":"1530-1538","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Can LLMs Find Fraudsters? Multi-level LLM Enhanced Graph Fraud Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2106-2556","authenticated-orcid":false,"given":"Tairan","family":"Huang","sequence":"first","affiliation":[{"name":"Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9721-6261","authenticated-orcid":false,"given":"Yili","family":"Wang","sequence":"additional","affiliation":[{"name":"Hongkong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3840-5359","authenticated-orcid":false,"given":"Qiutong","family":"Li","sequence":"additional","affiliation":[{"name":"Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0848-3122","authenticated-orcid":false,"given":"Changlong","family":"He","sequence":"additional","affiliation":[{"name":"Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9363-9908","authenticated-orcid":false,"given":"Jianliang","family":"Gao","sequence":"additional","affiliation":[{"name":"Central South University, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680795"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on Learning Representations. 137-142","author":"Chen Nan","year":"2024","unstructured":"Nan Chen, Zemin Liu, Bryan Hooi, Bingsheng He, Rizal Fathony, Jun Hu, and Jia Chen. 2024. Consistency training with learnable data augmentation for graph anomaly detection with limited supervision. In Proceedings of the International Conference on Learning Representations. 137-142."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3746027.3754941"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Chen Qiang","year":"2025","unstructured":"Qiang Chen, Zhongze Wu, Xiu Su, Xi Lin, Zhe Qu, Shan You, Shuo Yang, and Chang Xu. 2025b. Stable Fair Graph Representation Learning with Lipschitz Constraint. In Proceedings of the International Conference on Machine Learning."},{"key":"e_1_3_2_1_5_1","unstructured":"Eli Chien Wei-Cheng Chang Cho-Jui Hsieh Hsiang-Fu Yu Jiong Zhang Olgica Milenkovic and Inderjit S Dhillon. 2022. Node feature extraction by self-supervised multi-scale neighborhood prediction. (2022) 121-139."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_1_7_1","first-page":"1528","article-title":"Addressing heterophily in graph anomaly detection: A perspective of graph spectrum","author":"Gao Yuan","year":"2023","unstructured":"Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, Huamin Feng, and Yongdong Zhang. 2023a. Addressing heterophily in graph anomaly detection: A perspective of graph spectrum. In Proceedings of the World Wide Web. 1528-1538.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570377"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI61500.2025.10974125"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671845"},{"key":"e_1_3_2_1_11_1","first-page":"18570","article-title":"Learning disentangled priors for hyperspectral anomaly detection: A coupling model-driven and data-driven paradigm","volume":"139","author":"Li Chenyu","year":"2024","unstructured":"Chenyu Li, Bing Zhang, Danfeng Hong, Xiuping Jia, Antonio Plaza, and Jocelyn Chanussot. 2024b. Learning disentangled priors for hyperspectral anomaly detection: A coupling model-driven and data-driven paradigm. IEEE Transactions on Neural Networks and Learning Systems, Vol. 139 (2024), 18570-18582.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_1_12_1","first-page":"1487","article-title":"One step detection paradigm for hyperspectral anomaly detection via spectral deviation relationship learning","volume":"48","author":"Li Jingtao","year":"2024","unstructured":"Jingtao Li, Xinyu Wang, Shaoyu Wang, Hengwei Zhao, and Yanfei Zhong. 2024a. One step detection paradigm for hyperspectral anomaly detection via spectral deviation relationship learning. IEEE Transactions on Geoscience and Remote Sensing, Vol. 48 (2024), 1487-1498.","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557586"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680615"},{"key":"e_1_3_2_1_15_1","first-page":"3168","article-title":"Pick and choose: a GNN-based imbalanced learning approach for fraud detection","author":"Liu Yang","year":"2021","unstructured":"Yang Liu, Xiang Ao, Zidi Qin, Jianfeng Chi, Jinghua Feng, Hao Yang, and Qing He. 2021a. Pick and choose: a GNN-based imbalanced learning approach for fraud detection. In Proceedings of the World Wide Web. 3168-3177.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_16_1","first-page":"8975","article-title":"Towards self-interpretable graph-level anomaly detection","volume":"36","author":"Liu Yixin","year":"2023","unstructured":"Yixin Liu, Kaize Ding, Qinghua Lu, Fuyi Li, Leo Yu Zhang, and Shirui Pan. 2023a. Towards self-interpretable graph-level anomaly detection. Advances in Neural Information Processing Systems, Vol. 36 (2023), 8975-8987.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.06.030"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401253"},{"key":"e_1_3_2_1_19_1","first-page":"417","article-title":"Graphprompt: Unifying pre-training and downstream tasks for graph neural networks","author":"Liu Zemin","year":"2023","unstructured":"Zemin Liu, Xingtong Yu, Yuan Fang, and Xinming Zhang. 2023b. Graphprompt: Unifying pre-training and downstream tasks for graph neural networks. In Proceedings of the World Wide Web. 417-428.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_20_1","first-page":"897","article-title":"From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews","author":"McAuley Julian John","year":"2013","unstructured":"Julian John McAuley and Jure Leskovec. 2013. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In Proceedings of the World Wide Web. 897-908.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679830"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3224193"},{"key":"e_1_3_2_1_24_1","first-page":"1486","article-title":"H2-fdetector: A gnn-based fraud detector with homophilic and heterophilic connections","author":"Shi Fengzhao","year":"2022","unstructured":"Fengzhao Shi, Yanan Cao, Yanmin Shang, Yuchen Zhou, Chuan Zhou, and Jia Wu. 2022. H2-fdetector: A gnn-based fraud detector with homophilic and heterophilic connections. In Proceedings of the World Wide Web. 1486-1494.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539249"},{"key":"e_1_3_2_1_26_1","first-page":"13308","article-title":"Walklm: A uniform language model fine-tuning framework for attributed graph embedding","volume":"36","author":"Tan Yanchao","year":"2023","unstructured":"Yanchao Tan, Zihao Zhou, Hang Lv, Weiming Liu, and Carl Yang. 2023. Walklm: A uniform language model fine-tuning framework for attributed graph embedding. Advances in Neural Information Processing Systems, Vol. 36 (2023), 13308-13325.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the International Conference on Machine Learning. 21076-21089","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In Proceedings of the International Conference on Machine Learning. 21076-21089."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/256"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475434"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680886"},{"key":"e_1_3_2_1_31_1","first-page":"406","article-title":"Label information enhanced fraud detection against low homophily in graphs","author":"Wang Yuchen","year":"2023","unstructured":"Yuchen Wang, Jinghui Zhang, Zhengjie Huang, Weibin Li, Shikun Feng, Ziheng Ma, Yu Sun, Dianhai Yu, Fang Dong, Jiahui Jin, et al., 2023. Label information enhanced fraud detection against low homophily in graphs. In Proceedings of the World Wide Web. 406-416.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3616855.3635853"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00203"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615067"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00065"},{"key":"e_1_3_2_1_36_1","first-page":"1231","article-title":"A robust anomaly detection model for pumps based on the spectral residual with self-attention variational autoencoder","volume":"79","author":"Xie Tianming","year":"2024","unstructured":"Tianming Xie, Qifa Xu, Cuixia Jiang, Zhiwei Gao, and Xiangxiang Wang. 2024. A robust anomaly detection model for pumps based on the spectral residual with self-attention variational autoencoder. IEEE Transactions on Industrial Informatics, Vol. 79 (2024), 1231-1247.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680655"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28785"},{"key":"e_1_3_2_1_39_1","first-page":"2684","article-title":"Friend or foe? mining suspicious behavior via graph capsule infomax detector against fraudsters","author":"Zheng Xiangping","year":"2024","unstructured":"Xiangping Zheng, Bo Wu, Xun Liang, and Wei Li. 2024. Friend or foe? mining suspicious behavior via graph capsule infomax detector against fraudsters. In Proceedings of the World Wide Web. 2684-2693.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_40_1","first-page":"2848","article-title":"Textgnn: Improving text encoder via graph neural network in sponsored search","author":"Zhu Jason","year":"2021","unstructured":"Jason Zhu, Yanling Cui, Yuming Liu, Hao Sun, Xue Li, Markus Pelger, Tianqi Yang, Liangjie Zhang, Ruofei Zhang, and Huasha Zhao. 2021. Textgnn: Improving text encoder via graph neural network in sponsored search. In Proceedings of the World Wide Web. 2848-2857.","journal-title":"Proceedings of the World Wide Web."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657978"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the International Conference on Learning Representations. 157-162","author":"Zhuo Wei","year":"2024","unstructured":"Wei Zhuo, Zemin Liu, Bryan Hooi, Bingsheng He, Guang Tan, Rizal Fathony, and Jia Chen. 2024. Partitioning message passing for graph fraud detection. In Proceedings of the International Conference on Learning Representations. 157-162."}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","location":"Dublin Ireland","acronym":"MM '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:47:06Z","timestamp":1765309626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":42,"alternative-id":["10.1145\/3746027.3755245","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755245","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}