{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:31:55Z","timestamp":1760236315590,"version":"build-2065373602"},"reference-count":38,"publisher":"MDPI AG","issue":"22","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rise of online\/mobile transactions, the cost of cash-out has decreased and the cost of detection has increased. In the world of online\/mobile payment in IoT, merchants and credit cards can be applied and approved online and used in the form of a QR code but not a physical card or Point of Sale equipment, making it easy for these systems to be controlled by a group of fraudsters. In mainland China, where the credit card transaction fee is, on average, lower than a retail loan rate, the credit card cash-out option is attractive for people for an investment or business operation, which, after investigation, can be considered unlawful if over a certain amount is used. Because cash-out will incur fees for the merchants, while bringing money to the credit cards\u2019 owners, it is difficult to confirm, as nobody will declare or admit it. Furthermore, it is more difficult to detect cash-out groups than individuals, because cash-out groups are more hidden, which leads to bigger transaction amounts. We propose a new method for the detection of cash-out groups. First, the seed cards are mined and the seed cards\u2019 diffusion is then performed through the local graph clustering algorithm (Approximate PageRank, APR). Second, a merchant association network in IoT is constructed based on the suspicious cards, using the graph embedding algorithm (Node2Vec). Third, we use the clustering algorithm (DBSCAN) to cluster the nodes in the Euclidean space, which divides the merchants into groups. Finally, we design a method to classify the severity of the groups to facilitate the following risk investigation. The proposed method covers 145 merchants from 195 known risky merchants in groups that acquire cash-out from four banks, which shows that this method can identify most (74.4%) cash-out groups. In addition, the proposed method identifies a further 178 cash-out merchants in the group within the same four acquirers, resulting in a total of 30,586 merchants. The results and framework are already adopted and absorbed into the design for a cash-out group detection system in IoT by the Chinese payment processor.<\/jats:p>","DOI":"10.3390\/s21227507","type":"journal-article","created":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T20:51:53Z","timestamp":1636923113000},"page":"7507","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Abnormal Detection of Cash-Out Groups in IoT Based Payment"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0869-6570","authenticated-orcid":false,"given":"Hao","family":"Zhou","sequence":"first","affiliation":[{"name":"Institute of Cyber Science and Technology, Shanghai Jiao Tong University, Shanghai 200240, China"},{"name":"Department of Risk Control, China UnionPay, No. 998 Jinxiu Road, CUP Tower, Shanghai 200135, China"},{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai 200240, China"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Risk Control, China UnionPay, No. 998 Jinxiu Road, CUP Tower, Shanghai 200135, China"}]},{"given":"Lei","family":"Pang","sequence":"additional","affiliation":[{"name":"Department of Risk Control, China UnionPay, No. 998 Jinxiu Road, CUP Tower, Shanghai 200135, China"}]},{"given":"Jian-Hua","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Cyber Science and Technology, Shanghai Jiao Tong University, Shanghai 200240, China"},{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai 200240, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.comcom.2014.03.001","article-title":"Minimizing the number of mobile chargers for large-scale wireless rechargeable sensor networks","volume":"46","author":"Dai","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_2","first-page":"17","article-title":"Radiation Constrained Scheduling of Wireless Charging Tasks","volume":"Volume 17","author":"Dai","year":"2018","journal-title":"Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1109\/TPDS.2014.2310484","article-title":"Quality of Energy Provisioning for Wireless Power Transfer","volume":"26","author":"Dai","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MNET.001.1900179","article-title":"Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT","volume":"34","author":"Wu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"289","DOI":"10.14778\/3025111.3025112","article-title":"Finding persistent items in data streams","volume":"10","author":"Dai","year":"2016","journal-title":"Proc. VLDB Endow."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MWC.001.2000329","article-title":"Security and Privacy for Mobile Edge Caching: Challenges and Solutions","volume":"28","author":"Ni","year":"2021","journal-title":"IEEE Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","article-title":"Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System","volume":"8","author":"Bera","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Networks"},{"key":"ref_9","unstructured":"Lin, X., Wu, J., Bashir, A.K., Li, J., Yang, W., and Piran, J. (2020). Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design. IEEE Internet Things J., 1."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6606","DOI":"10.1109\/JIOT.2019.2908861","article-title":"Credit-Based Payments for Fast Computing Resource Trading in Edge-Assisted Internet of Things","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/JSYST.2017.2668389","article-title":"A Secure Transaction Scheme with Certificateless Cryptographic Primitives for IoT-Based Mobile Payments","volume":"12","author":"Yeh","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_12","first-page":"209","article-title":"A fraud risk analysis method based on rough set neural network","volume":"21","author":"Sheng","year":"2003","journal-title":"J. Appl. Sci."},{"key":"ref_13","first-page":"376","article-title":"Credit card fraud detection based on support vector machine","volume":"8","author":"Xu","year":"2001","journal-title":"Comput. Simul."},{"key":"ref_14","first-page":"185","article-title":"Application of data mining technology in credit card analysis","volume":"29","author":"Zheng","year":"2003","journal-title":"Comput. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.patrec.2017.08.024","article-title":"End-to-end neural network architecture for fraud scoring in card payments","volume":"105","author":"Paredes","year":"2018","journal-title":"Pattern Recognit. Lett."},{"key":"ref_16","first-page":"1","article-title":"Distributed Deep Forest and its Application to Automatic Detection of Cash-Out Fraud","volume":"10","author":"Zhang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1631\/FITEE.1800580","article-title":"Fraud detection within bankcard enrollment on mobile device based payment using machine learning","volume":"19","author":"Zhou","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"113155","DOI":"10.1016\/j.dss.2019.113155","article-title":"Feature construction for fraudulent credit card cash-out detection","volume":"127","author":"Wu","year":"2019","journal-title":"Decis. Support Syst."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ren, Y., Zhu, H., Zhang, J., Dai, P., and Bo, L. (2021, January 19\u201322). EnsemFDet: An Ensemble Approach to Fraud Detection based on Bipartite Graph. Proceedings of the 2021 IEEE 37th International Conference on Data Engineering (ICDE), Athens, Greece.","DOI":"10.1109\/ICDE51399.2021.00197"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Li, Y., Sun, Y., and Contractor, N. (August, January 31). Graph mining assisted semi-supervised learning for fraudulent cash-out detection. Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia.","DOI":"10.1145\/3110025.3110099"},{"key":"ref_21","unstructured":"Hu, B., Zhang, Z., Shi, C., Zhou, J., Li, X., and Qi, Y. (February, January 27). Cash-Out User Detection Based on Attributed Heterogeneous Information Network with a Hierarchical Attention Mechanism. Proceedings of the AAAI Conference on Artificial Intelligence, Honolulu, HI, USA."},{"key":"ref_22","unstructured":"Brause, R., Langsdorf, T., and Hepp, M. (1999, January 9\u201311). Neural data mining for credit card fraud detection. Proceedings of the 11th International Conference on Tools with Artificial Intelligence, Chicago, IL, USA."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/5254.809570","article-title":"Distributed data mining in credit card fraud detection","volume":"14","author":"Chan","year":"1999","journal-title":"Intell. Syst. Appl."},{"key":"ref_24","first-page":"7","article-title":"Research on phishing fraud detection technology","volume":"3","author":"Zhang","year":"2017","journal-title":"J. Netw. Inf. Se-Curity"},{"key":"ref_25","first-page":"51","article-title":"Consumer finance anti-fraud model and method based on machine learning model","volume":"10","author":"Wu","year":"2018","journal-title":"Mod. Man-Agement Sci."},{"key":"ref_26","first-page":"24","article-title":"Application of neural network model in bank internet finance anti-fraud","volume":"276","author":"Li","year":"2018","journal-title":"Financ. Technol. Era"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","article-title":"An application of supervised and unsupervised learning approaches to telecommunica-tions fraud detection","volume":"21","author":"Hilas","year":"2008","journal-title":"Knowl. Based Syst."},{"key":"ref_28","unstructured":"Bolton, R.J., and Hand, D.J. (2002). Unsupervised Profiling Methods for Fraud Detection, Department of Mathematics, Impe-rial College."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Tasoulis, D.K., Adams, N.M., and Hand, D. (2006, January 18\u201322). Unsupervised Clustering in Streaming Data. Proceedings of the Sixth IEEE International Conference on Data Mining-Workshops (ICDMW\u201906), Hong Kong, China.","DOI":"10.1109\/ICDMW.2006.165"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Quah, J.T.S., and Sriganesh, M. (2007, January 9). Real Time Credit Card Fraud Detection using Computational Intelligence. Proceedings of the 2007 International Joint Conference on Neural Networks, Orlando, FL, USA.","DOI":"10.1109\/IJCNN.2007.4371071"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11634-008-0021-8","article-title":"Plastic card fraud detection using peer group analysis","volume":"2","author":"Weston","year":"2008","journal-title":"Adv. Data Anal. Classif."},{"key":"ref_32","first-page":"253","article-title":"Fraud detection on payment transaction network via graph computing and visualiza-tion","volume":"26","author":"Sun","year":"2020","journal-title":"High Technol. Lett."},{"key":"ref_33","first-page":"713","article-title":"Financial Transaction Data Based Intelligent Fraud Graph Network Detection","volume":"38","author":"Sun","year":"2020","journal-title":"J. Appl. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Andersen, R., Chung, F., and Lang, K. (2006, January 21\u201324). Local Graph Partitioning using PageRank Vectors. Proceedings of the 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201906), Berkeley, CA, USA.","DOI":"10.1109\/FOCS.2006.44"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TKDE.2003.1208999","article-title":"Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search","volume":"15","author":"Haveliwala","year":"2003","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Grover, A., and Leskovec, J. (2016, January 13\u201317). Node2vec: Scalable Feature Learning for Networks. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939754"},{"key":"ref_37","unstructured":"Ester, M., Kriegel, H.P., Sander, J., and Xu, X. (1996, January 2\u20134). A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining KDD-96, Portland, OR, USA."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/34.1000236","article-title":"Mean shift: A robust approach toward feature space analysis","volume":"24","author":"Comaniciu","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/22\/7507\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:28:58Z","timestamp":1760167738000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/22\/7507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":38,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["s21227507"],"URL":"https:\/\/doi.org\/10.3390\/s21227507","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,11,12]]}}}