[HTML][HTML] Fraud detection: A systematic literature review of graph-based anomaly detection approaches

T Pourhabibi, KL Ong, BH Kam, YL Boo - Decision Support Systems, 2020 - Elsevier
Graph-based anomaly detection (GBAD) approaches are among the most popular
techniques used to analyze connectivity patterns in communication networks and identify …

User modeling in the era of large language models: Current research and future directions

Z Tan, M Jiang - arxiv preprint arxiv:2312.11518, 2023 - arxiv.org
User modeling (UM) aims to discover patterns or learn representations from user data about
the characteristics of a specific user, such as profile, preference, and personality. The user …

Rev2: Fraudulent user prediction in rating platforms

S Kumar, B Hooi, D Makhija, M Kumar… - Proceedings of the …, 2018 - dl.acm.org
Rating platforms enable large-scale collection of user opinion about items (eg, products or
other users). However, untrustworthy users give fraudulent ratings for excessive monetary …

Collective opinion spam detection: Bridging review networks and metadata

S Rayana, L Akoglu - Proceedings of the 21th acm sigkdd international …, 2015 - dl.acm.org
Online reviews capture the testimonials of" real" people and help shape the decisions of
other consumers. Due to the financial gains associated with positive reviews, however …

Fraudar: Bounding graph fraud in the face of camouflage

B Hooi, HA Song, A Beutel, N Shah, K Shin… - Proceedings of the …, 2016 - dl.acm.org
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …

Rumor gauge: Predicting the veracity of rumors on Twitter

S Vosoughi, MN Mohsenvand, D Roy - ACM transactions on knowledge …, 2017 - dl.acm.org
The spread of malicious or accidental misinformation in social media, especially in time-
sensitive situations, such as real-world emergencies, can have harmful effects on individuals …

One-class adversarial nets for fraud detection

P Zheng, S Yuan, X Wu, J Li, A Lu - Proceedings of the AAAI conference on …, 2019 - aaai.org
Many online applications, such as online social networks or knowledge bases, are often
attacked by malicious users who commit different types of actions such as vandalism on …

Discovering opinion spammer groups by network footprints

J Ye, L Akoglu - Machine Learning and Knowledge Discovery in …, 2015 - Springer
Online reviews are an important source for consumers to evaluate products/services on the
Internet (eg Amazon, Yelp, etc.). However, more and more fraudulent reviewers write fake …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

A synergistic approach for graph anomaly detection with pattern mining and feature learning

T Zhao, T Jiang, N Shah, M Jiang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Detecting anomalies on graph data has two types of methods. One is pattern mining that
discovers strange structures globally such as quasi-cliques, bipartite cores, or dense blocks …