The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Authoritative sources in a hyperlinked environment
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Communications of the ACM
Extracting Large-Scale Knowledge Bases from the Web
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Understanding belief propagation and its generalizations
Exploring artificial intelligence in the new millennium
gSpan: Graph-Based Substructure Pattern Mining
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
Power laws and the AS-level internet topology
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
On mining cross-graph quasi-cliques
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Mining closed relational graphs with connectivity constraints
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Using relational knowledge discovery to prevent securities fraud
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Coherent closed quasi-clique discovery from large dense graph databases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Detecting fraudulent personalities in networks of online auctioneers
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Anomaly detection algorithms in logs of process aware systems
Proceedings of the 2008 ACM symposium on Applied computing
Weighted graphs and disconnected components: patterns and a generator
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
SNARE: a link analytic system for graph labeling and risk detection
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
A fuzzy biclustering algorithm for social annotations
Journal of Information Science
Outlier Detection with Explanation Facility
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Fraud Detection by Human Agents: A Pilot Study
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Outlier Detection with a Hybrid Artificial Intelligence Method
MICAI '09 Proceedings of the 8th Mexican International Conference on Artificial Intelligence
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Fraud detection in process aware systems
Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
Catching bad guys with graph mining
XRDS: Crossroads, The ACM Magazine for Students - The Fate of Money
eBay: an E-commerce marketplace as a complex network
Proceedings of the fourth ACM international conference on Web search and data mining
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Electronic Commerce Research and Applications
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
A novel two-stage phased modeling framework for early fraud detection in online auctions
Expert Systems with Applications: An International Journal
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Proceedings of the Nineteenth International Workshop on Quality of Service
Unifying guilt-by-association approaches: theorems and fast algorithms
ECML PKDD'11 Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part II
Comment classification for internet auction platforms
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
ProtoTrust: an environment for improved trust management in internet auctions
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
Combining ranking concept and social network analysis to detect collusive groups in online auctions
Expert Systems with Applications: An International Journal
Online modeling of proactive moderation system for auction fraud detection
Proceedings of the 21st international conference on World Wide Web
Survey: Combating online in-auction fraud: Clues, techniques and challenges
Computer Science Review
Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis
Proceedings of the 10th international conference on Mobile systems, applications, and services
Propagation of trust and distrust for the detection of trolls in a social network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Identify Online Store Review Spammers via Social Review Graph
ACM Transactions on Intelligent Systems and Technology (TIST)
An effective early fraud detection method for online auctions
Electronic Commerce Research and Applications
The effect of suspicious profiles on people recommenders
UMAP'12 Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization
Forecasting in the NBA and other team sports: Network effects in action
ACM Transactions on Knowledge Discovery from Data (TKDD)
Top-N recommendation through belief propagation
Proceedings of the 21st ACM international conference on Information and knowledge management
Mining dense structures to uncover anomalous behaviour in financial network data
MSM'11 Proceedings of the 2011 international conference on Modeling and Mining Ubiquitous Social Media
Anomaly, event, and fraud detection in large network datasets
Proceedings of the sixth ACM international conference on Web search and data mining
Generating realistic online auction data
AI'12 Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence
Evaluation of the Reputation Network Using Realistic Distance between Facebook Data
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Expert Systems with Applications: An International Journal
Spotting opinion spammers using behavioral footprints
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Multi-source deep learning for information trustworthiness estimation
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Graph-based malware distributors detection
Proceedings of the 22nd international conference on World Wide Web companion
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks
Proceedings of the 22nd international conference on World Wide Web
Anatomy of a web-scale resale market: a data mining approach
Proceedings of the 22nd international conference on World Wide Web
Inside insider trading: patterns & discoveries from a large scale exploratory analysis
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Fuzzy rule optimization for online auction frauds detection based on genetic algorithm
Electronic Commerce Research
Detecting online auction shilling frauds using supervised learning
Expert Systems with Applications: An International Journal
Hi-index | 0.01 |
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implementation of NetProbe, a system that we propose for solving this problem. NetProbe models auction users and transactions as a Markov Random Field tuned to detect the suspicious patterns that fraudsters create, and employs a Belief Propagation mechanism to detect likely fraudsters. Our experiments show that NetProbe is both efficient and effective for fraud detection. We report experiments on synthetic graphs with as many as 7,000 nodes and 30,000 edges, where NetProbe was able to spot fraudulent nodes with over 90% precision and recall, within a matter of seconds. We also report experiments on a real dataset crawled from eBay, with nearly 700,000 transactions between more than 66,000users, where NetProbe was highly effective at unearthing hidden networks of fraudsters, within a realistic response time of about 6 minutes. For scenarios where the underlying data is dynamic in nature, we propose IncrementalNetProbe, which is an approximate, but fast, variant of NetProbe. Our experiments prove that Incremental NetProbe executes nearly doubly fast as compared to NetProbe, while retaining over 99% of its accuracy.