{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:15:59Z","timestamp":1755839759258},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"11","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2024,7]]},"abstract":"<jats:p>\n            Graph analytics have been effective in the data science pipeline of fraud detections. In the ever-evolving landscape of e-commerce platforms like Grab or transaction networks such as cryptos, we have witnessed the phenomenon of 'burst subgraphs,' characterized by rapid increases in subgraph density within short timeframes---as a common pattern for fraud detections on dynamic graphs. However, existing graph processing frameworks struggle to efficiently manage these due to their inability to handle sudden surges in data. In this paper, we propose RUSH (\n            <jats:bold>R<\/jats:bold>\n            eal-time b\n            <jats:bold>U<\/jats:bold>\n            rst\n            <jats:bold>S<\/jats:bold>\n            ubgrap\n            <jats:bold>H<\/jats:bold>\n            detection framework), a pioneering framework tailored for real-time fraud detection within dynamic graphs. By focusing on both the density and the rate of change of subgraphs, RUSH identifies crucial indicators of fraud. Utilizing a sophisticated incremental update mechanism, RUSH processes burst subgraphs on large-scale graphs with high efficiency. Furthermore, RUSH is designed with user-friendly APIs that simplify the customization and integration of specific fraud detection metrics. In the deployment within Grab's operations, detecting burst subgraphs can be achieved with approximately ten lines of code. Through extensive evaluations on real-world datasets, we show RUSH's effectiveness in fraud detection and its robust scalability across various data sizes. In case studies, we illustrate how RUSH can detect fraud communities within various Grab business scenarios, such as customer-merchant collusion and promotion abuse, and identify wash trading in crypto networks.\n          <\/jats:p>","DOI":"10.14778\/3681954.3682028","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T16:23:36Z","timestamp":1725035016000},"page":"3657-3665","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["RUSH: Real-Time Burst Subgraph Detection in Dynamic Graphs"],"prefix":"10.14778","volume":"17","author":[{"given":"Yuhang","family":"Chen","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Jiaxin","family":"Jiang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Shixuan","family":"Sun","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Bingsheng","family":"He","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"GrabTaxi Holdings, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,8,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. Distil Networks: The 2019 Bad Bot Report. https:\/\/www.bluecubesecurity.com\/wp-content\/uploads\/bad-bot-report-2019LR.pdf."},{"key":"e_1_2_1_2_1","unstructured":"2023. Live Graph Lab. https:\/\/livegraphlab.github.io\/. Accessed: 2023-12-10."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140442"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_2_1_5_1","volume-title":"The \"half-life\" of some scientific and technical literatures. American documentation 11, 1","author":"Burton Robert E","year":"1960","unstructured":"Robert E Burton and Richard W Kebler. 1960. The \"half-life\" of some scientific and technical literatures. American documentation 11, 1 (1960), 18--22."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44436-X_10"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJEBANK.2020.114762"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539100"},{"key":"e_1_2_1_9_1","volume-title":"RUSH: Real-time Burst Subgraph Discovery in Dynamic Graphs (Complete Version). https:\/\/github.com\/Xtra-Computing\/RUSH\/blob\/main\/RUSH_paper.pdf","author":"Chen Yuhang","year":"2024","unstructured":"Yuhang Chen, Jiaxin Jiang, Shixuan Sun, Bingsheng He, and Min Chen. 2024. RUSH: Real-time Burst Subgraph Discovery in Dynamic Graphs (Complete Version). https:\/\/github.com\/Xtra-Computing\/RUSH\/blob\/main\/RUSH_paper.pdf"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3358701.3358704"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1198\/1061860032742"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_2_1_15_1","volume-title":"Abnormal User Detection via Multiview Graph Clustering in the Mobile e-Commerce Network. Wireless Communications and Mobile Computing 2022","author":"Du HangYuan","year":"2022","unstructured":"HangYuan Du, Duo Li, and WenJian Wang. 2022. Abnormal User Detection via Multiview Graph Clustering in the Mobile e-Commerce Network. Wireless Communications and Mobile Computing 2022 (2022)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741638"},{"key":"e_1_2_1_17_1","volume-title":"Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657","author":"Fleder Michael","year":"2015","unstructured":"Michael Fleder, Michael S Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657 (2015)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2789987"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.22034"},{"key":"e_1_2_1_20_1","unstructured":"Jericho Hallare and Valerie Gerriets. 2020. Half life. (2020)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592799"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(97)00050-2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3394155"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3570690.3570696"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_11"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557136"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00157"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/3565838.3565845"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00197"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0058"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098087"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2023.104341"},{"key":"e_1_2_1_34_1","volume-title":"Deep Fraud Detection on Non-attributed Graph. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 5470--5473","author":"Wang Chen","year":"2021","unstructured":"Chen Wang, Yingtong Dou, Min Chen, Jia Chen, Zhiwei Liu, and S Yu Philip. 2021. Deep Fraud Detection on Non-attributed Graph. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 5470--5473."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794370"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281280"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452774"},{"key":"e_1_2_1_39_1","volume-title":"X)-Core Query","author":"Zhong Ming","year":"2024","unstructured":"Ming Zhong, Junyong Yang, Yuanyuan Zhu, Tieyun Qian, Mengchi Liu, and Jeffrey Xu Yu. 2024. A Unified and Scalable Algorithm Framework for User-Defined Temporal (k, X)-Core Query. IEEE Transactions on Knowledge and Data Engineering (2024)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062467"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3681954.3682028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:24:33Z","timestamp":1725474273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3681954.3682028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":40,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10.14778\/3681954.3682028"],"URL":"https:\/\/doi.org\/10.14778\/3681954.3682028","relation":{},"ISSN":["2150-8097"],"issn-type":[{"type":"print","value":"2150-8097"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-08-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}