Discovery of fraud rules for telecommunications—challenges and solutions
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Communications of the ACM
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Journal of Parallel and Distributed Computing - Special issue on wireless networks
Data Mining and Knowledge Discovery
Industry: adaptive fraud detection
Handbook of data mining and knowledge discovery
Detecting fraud in the real world
Handbook of massive data sets
The Journal of Machine Learning Research
IEEE Transactions on Neural Networks
Latent dirichlet allocation in web spam filtering
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
IEA/AIE '09 Proceedings of the 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Next-Generation Applied Intelligence
Bayesian Multi-topic Microarray Analysis with Hyperparameter Reestimation
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Latent Dirichlet Allocation for Automatic Document Categorization
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
A data mining framework for detecting subscription fraud in telecommunication
Engineering Applications of Artificial Intelligence
Topic-based social network analysis for virtual communities of interests in the Dark Web
ACM SIGKDD Workshop on Intelligence and Security Informatics
Topic-based social network analysis for virtual communities of interests in the dark web
ACM SIGKDD Explorations Newsletter
Text segmentation: A topic modeling perspective
Information Processing and Management: an International Journal
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
A comparison on score spaces for expression microarray data classification
PRIB'11 Proceedings of the 6th IAPR international conference on Pattern recognition in bioinformatics
A probabilistic approach to fraud detection in telecommunications
Knowledge-Based Systems
User modeling for telecommunication applications: experiences and practical implications
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
Streaming workload generator for testing billing mediation platform in telecom industry
Proceedings of the Winter Simulation Conference
Automatic classification of documents in cold-start scenarios
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Leveraging social network analysis with topic models and the Semantic Web extended
Web Intelligence and Agent Systems - Web Intelligence and Communities
Hi-index | 0.10 |
Fraud detection in the telecommunications industry requires the identification of a small fraction of fraudulent calls from the high volume of call traffic. This presents a significant research challenge in the design of efficient and effective algorithms to combat telecommunications fraud. This paper employs Latent Dirichlet Allocation (LDA) to build user profile signatures and assumes that any significant unexplainable deviations from the normal activity of an individual user is strongly correlated with fraudulent activity. The user activity is represented as a probability distribution over call features which surmises the user's calling behaviour. This probability distribution is derived from LDA which can accurately describe user profiles by combining different classes of distributions. To score calls we compare the likelihood of the user generating a call versus a fraudster generating the same call. Our experiments demonstrate that using such a probability distribution and employing even a rough profile of a fraudster's activity ameliorates the detection of fraudulent calls. Our method is computationally efficient and can scale up to a realistic real time detection.