{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:22:48Z","timestamp":1766154168828,"version":"3.48.0"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972431 and 62572141"],"award-info":[{"award-number":["61972431 and 62572141"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>The swift growth of e-commerce has led to an increase in fraudulent activities, which results in significant financial losses for both suppliers and consumers. Current research on detecting fraudulent activities within e-commerce platforms primarily focuses on analyzing individual user behavioral patterns over time or examining the spatial relationships among users. However, considering temporal or spatial contexts alone is not sufficient for fraud detection since they may not exist in real scenarios. Additionally, the issue caused by the imbalance of the data to be classified has not been solved in the field of fraud identification. To address these challenges, a novel scheme is proposed for fraudulent user detection in this work. The main contribution lies in the spatiotemporal fusion of user behavior and the layer-by-layer selective aggregation of graph models. Specifically, we utilize a long short-term memory model and a multi-layer perceptron model to extract the discriminant features from time-dependent and time-independent user behavior, respectively. This approach enhances the model\u2019s ability to detect fraudulent users with different behavioral characteristics, including time-correlated and\/or time-independent fraud behavior. Furthermore, a shared classifier is added to general graph neural network, it reclassifies the output of each layer of the graph model and reconstructs the spatial neighbor relationship. This little trick makes minority class samples select similar samples with a greater probability to build their spatial neighbor relationships, which can alleviate the issue of data imbalance. In the numerical experiments, three real datasets are used to validate the proposed scheme. Experiment results, including performance evaluation, comparison with existing benchmark approaches and ablation analysis, are presented and discussed.<\/jats:p>","DOI":"10.1145\/3772076","type":"journal-article","created":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T11:20:11Z","timestamp":1761304811000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2939-0698","authenticated-orcid":false,"given":"Rujia","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University","place":["Guangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8899-4032","authenticated-orcid":false,"given":"Yi","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering (and the Guangdong Province Key Laboratory of Information Security Technology and the MoE Key Laboratory of Information Technology), Sun Yat-Sen University","place":["Guangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3225-449X","authenticated-orcid":false,"given":"Minglang","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University","place":["Guangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, University of New South Wales Canberra at ADFA","place":["Canberra, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1836-2205","authenticated-orcid":false,"given":"Xingcheng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-Sen University","place":["Guangzhou, China"]}]}],"member":"320","published-online":{"date-parts":[[2025,12,19]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"e_1_3_2_3_2","first-page":"1","article-title":"A survey on learning from imbalanced data streams: Taxonomy, challenges, empirical study, and reproducible experimental framework","author":"Aguiar Gabriel","year":"2023","unstructured":"Gabriel Aguiar, Bartosz Krawczyk, and Alberto Cano. 2023. A survey on learning from imbalanced data streams: Taxonomy, challenges, empirical study, and reproducible experimental framework. Machine Learning 113 (2023), 1\u201379.","journal-title":"Machine Learning"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MUSIC.2012.27","volume-title":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","author":"Alowais Mohammed Ibrahim","year":"2012","unstructured":"Mohammed Ibrahim Alowais and Lay-Ki Soon. 2012. Credit card fraud detection: Personalized or aggregated model. In 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing. IEEE, 114\u2013119."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10375-2"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"issue":"9","key":"e_1_3_2_9_2","first-page":"1","article-title":"Graph neural networks for financial fraud detection: A review","volume":"19","author":"Cheng Dawei","year":"2025","unstructured":"Dawei Cheng, Yao Zou, Sheng Xiang, and Changjun Jiang. 2025. Graph neural networks for financial fraud detection: A review. Frontiers of Computer Science 19, 9 (2025), 1\u201315.","journal-title":"Frontiers of Computer Science"},{"issue":"8","key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","article-title":"Credit card fraud detection: A realistic modeling and a novel learning strategy","volume":"29","author":"Pozzolo Andrea Dal","year":"2017","unstructured":"Andrea Dal Pozzolo, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. 2017. Credit card fraud detection: A realistic modeling and a novel learning strategy. IEEE Transactions on Neural Networks and Learning Systems 29, 8 (2017), 3784\u20133797.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.08.036"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1007\/978-3-030-14234-6_21","volume-title":"Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers 14","author":"Deng Ruoyu","year":"2019","unstructured":"Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, and Dandan Xu. 2019. SpamTracer: Manual fake review detection for O2O commercial platforms by using geolocation features. In Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers 14. Springer, 384\u2013403."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_14_2","volume-title":"Improved Machine Learning Methods for Classification of Imbalanced Data","author":"Ebiaredoh-Mienye Sarah Alexandria","year":"2021","unstructured":"Sarah Alexandria Ebiaredoh-Mienye. 2021. Improved Machine Learning Methods for Classification of Imbalanced Data. University of Johannesburg (South Africa)."},{"issue":"5","key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"4392","DOI":"10.11591\/ijece.v11i5.pp4392-4402","article-title":"Artificial neural network technique for improving prediction of credit card default: A stacked sparse autoencoder approach","volume":"11","author":"Ebiaredoh-Mienye Sarah A","year":"2021","unstructured":"Sarah A Ebiaredoh-Mienye, Ebenezer Esenogho, and Theo G Swart. 2021. Artificial neural network technique for improving prediction of credit card default: A stacked sparse autoencoder approach. International Journal of Electrical and Computer Engineering 11, 5 (2021), 4392.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3148298"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700575"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1969.10490657"},{"key":"e_1_3_2_19_2","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in Neural Information Processing Systems 30 (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/5dd9db5e033da9c6fb5ba83c7a7ebea9-Paper.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"11","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.3844\/jcssp.2020.1546.1557","article-title":"A survey of methods for managing the classification and solution of data imbalance problem","volume":"16","author":"Hasib Khan Md.","year":"2020","unstructured":"Khan Md. Hasib, Md. Sadiq Iqbal, Faisal Muhammad Shah, Jubayer Al Mahmud, Mahmudul Hasan Popel, Md. Imran Hossain Showrov, Shakil Ahmed, and Obaidur Rahman. 2020. A survey of methods for managing the classification and solution of data imbalance problem. Journal of Computer Science 16, 11 (Nov.2020), 1546\u20131557.","journal-title":"Journal of Computer Science"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2019.134467"},{"key":"e_1_3_2_22_2","unstructured":"Juniper Research. Jun. 2023. Online Payment Fraud: Market Forecasts Emerging Threats & Segment Analysis 2023-2028. Retrieved from https:\/\/www.juniperresearch.com\/research\/security-identity\/payment-security\/online-payment-fraud\/ Last accessed on Jan. 2024."},{"issue":"4","key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3343440","article-title":"A systematic review on imbalanced data challenges in machine learning: Applications and solutions","volume":"52","author":"Kaur Harsurinder","year":"2019","unstructured":"Harsurinder Kaur, Husanbir Singh Pannu, and Avleen Kaur Malhi. 2019. A systematic review on imbalanced data challenges in machine learning: Applications and solutions. ACM Computing Surveys (CSUR) 52, 4 (2019), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_24_2","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv:1609.02907. Retrieved from https:\/\/arxiv.org\/abs\/1609.02907"},{"key":"e_1_3_2_25_2","first-page":"60","article-title":"Data mining prototype for detecting ecommerce fraud","author":"Lek Monkol","year":"2001","unstructured":"Monkol Lek, Benjamin Anadarajah, Narciso Cerpa, and Rodger Jamieson. 2001. Data mining prototype for detecting ecommerce fraud. ECIS 2001 Proceedings (2001), 60.","journal-title":"ECIS 2001 Proceedings"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357820"},{"key":"e_1_3_2_27_2","first-page":"1","volume-title":"2012 IEEE 31st Symposium on Reliable Distributed Systems","author":"Li Xiaowei","year":"2012","unstructured":"Xiaowei Li, Yuan Xue, and Bradley Malin. 2012. Detecting anomalous user behaviors in workflow-driven web applications. In 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, 1\u201310."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014424"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401253"},{"key":"e_1_3_2_33_2","volume-title":"Proceedings of ACM SIGKDD Conference, London, UK","volume":"9","author":"Ma Jun","year":"2018","unstructured":"Jun Ma, Danqing Zhang, Yun Wang, Yan Zhang, and Alexey Pozdnoukhov. 2018. GraphRAD: A graph-based risky account detection system. In Proceedings of ACM SIGKDD Conference, London, UK, Vol. 9."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075573"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.5555\/1951684"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107918"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1287\/inte.2019.1017"},{"issue":"3","key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/j.cub.2020.10.053","article-title":"Global patterns and drivers of bee distribution","volume":"31","author":"Orr Michael C","year":"2021","unstructured":"Michael C Orr, Alice C Hughes, Douglas Chesters, John Pickering, Chao-Dong Zhu, and John S Ascher. 2021. Global patterns and drivers of bee distribution. Current Biology 31, 3 (2021), 451\u2013458.","journal-title":"Current Biology"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-021-00772-6"},{"key":"e_1_3_2_41_2","unstructured":"Clifton Phua Vincent Lee Kate Smith and Ross Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. arXiv:1009.6119. Retrieved from https:\/\/arxiv.org\/abs\/1009.6119"},{"key":"e_1_3_2_42_2","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00045","volume-title":"2019 18th IEEE International Conference On Trust, Security and Privacy In Computing and Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Porwal Utkarsh","year":"2019","unstructured":"Utkarsh Porwal and Smruthi Mukund. 2019. Credit card fraud detection in e-commerce. In 2019 18th IEEE International Conference On Trust, Security and Privacy In Computing and Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 280\u2013287."},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09700-0"},{"issue":"9","key":"e_1_3_2_44_2","article-title":"Fraud detection using machine learning in e-commerce","volume":"10","author":"Saputra Adi","year":"2019","unstructured":"Adi Saputra et\u00a0al. 2019. Fraud detection using machine learning in e-commerce. International Journal of Advanced Computer Science and Applications 10, 9 (2019), 332\u2013339.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_45_2","first-page":"1","article-title":"The digital transformation of a traditional market into an entrepreneurial ecosystem","author":"Song Ying","year":"2022","unstructured":"Ying Song, Octavio Escobar, Unai Arzubiaga, and Alfredo De Massis. 2022. The digital transformation of a traditional market into an entrepreneurial ecosystem. Review of Managerial Science 16 (2022), 1\u201324.","journal-title":"Review of Managerial Science"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107965"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10321-2"},{"key":"e_1_3_2_48_2","first-page":"241","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Wang Gang","year":"2013","unstructured":"Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y Zhao. 2013. You are how you click: Clickstream analysis for sybil detection. In 22nd USENIX Security Symposium (USENIX Security 13). 241\u2013256."},{"key":"e_1_3_2_49_2","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-319-71273-4_20","volume-title":"Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18\u201322, 2017, Proceedings, Part III 10","author":"Wang Shuhao","year":"2017","unstructured":"Shuhao Wang, Cancheng Liu, Xiang Gao, Hongtao Qu, and Wei Xu. 2017. Session-based fraud detection in online e-commerce transactions using recurrent neural networks. In Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18\u201322, 2017, Proceedings, Part III 10. Springer, 241\u2013252."},{"key":"e_1_3_2_50_2","first-page":"20","volume-title":"Proceedings of the 13th Bled Electronic Commerce Conference","author":"Wong Keith","year":"2000","unstructured":"Keith Wong, Brenda Ng, Narciso Cerpa, and Rodger Jamieson. 2000. An online audit review system for electronic commerce. In Proceedings of the 13th Bled Electronic Commerce Conference. 20\u201323."},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.cca.2020.06.026","article-title":"Relationship between ABO blood group distribution and clinical characteristics in patients with COVID-19","volume":"509","author":"Wu Yuqin","year":"2020","unstructured":"Yuqin Wu, Zhicai Feng, Peng Li, and Qizhi Yu. 2020. Relationship between ABO blood group distribution and clinical characteristics in patients with COVID-19. Clinica Chimica Acta 509 (2020), 220\u2013223.","journal-title":"Clinica Chimica Acta"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-2256-5"},{"issue":"6","key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"186506","DOI":"10.1007\/s11704-023-2616-9","article-title":"IP2vec: An IP node representation model for IP geolocation","volume":"18","author":"Zhang Fan","year":"2024","unstructured":"Fan Zhang, Meijuan Yin, Fenlin Liu, Xiangyang Luo, and Shuodi Zu. 2024. IP2vec: An IP node representation model for IP geolocation. Frontiers of Computer Science 18, 6, Article 186506 (2024), 186506 pages.","journal-title":"Frontiers of Computer Science"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"issue":"5","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"195905","DOI":"10.1007\/s11704-024-3862-1","article-title":"Predicting miRNA-drug interactions via dual-channel network based on TCN and BiLSTM","volume":"19","author":"Zhang Xiaoxuan","year":"2025","unstructured":"Xiaoxuan Zhang and Xiujuan Lei. 2025. Predicting miRNA-drug interactions via dual-channel network based on TCN and BiLSTM. Frontiers of Computer Science 19, 5 (2025), 195905.","journal-title":"Frontiers of Computer Science"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-024-40192-5"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.008"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:17:53Z","timestamp":1766153873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3772076"],"URL":"https:\/\/doi.org\/10.1145\/3772076","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2025,12,19]]},"assertion":[{"value":"2025-02-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}