Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tseng, Vincent S. | en_US |
dc.contributor.author | Ying, Josh Jia-Ching | en_US |
dc.contributor.author | Huang, Che-Wei | en_US |
dc.contributor.author | Kao, Yimin | en_US |
dc.contributor.author | Chen, Kuan-Ta | en_US |
dc.date.accessioned | 2019-10-05T00:09:48Z | - |
dc.date.available | 2019-10-05T00:09:48Z | - |
dc.date.issued | 2015-01-01 | en_US |
dc.identifier.isbn | 978-1-4503-3664-2 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1145/2783258.2788623 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/152979 | - |
dc.description.abstract | In recent years, fraud is increasing rapidly with the development of modern technology and global communication. Although many literatures have addressed the fraud detection problem, these existing works focus only on formulating the fraud detection problem as a binary classification problem. Due to limitation of information provided by telecommunication records, such classifier-based approaches for fraudulent phone call detection normally do not work well. In this paper, we develop a graph-mining-based fraudulent phone call detection framework for a mobile application to automatically annotate fraudulent phone numbers with a "fraud" tag, which is a crucial prerequisite for distinguishing fraudulent phone calls from normal phone calls. Our detection approach performs a weighted HITS algorithm to learn the trust value of a remote phone number. Based on telecommunication records, we build two kinds of directed bipartite graph: i) CPU and ii) UPG to represent telecommunication behavior of users. To weight the edges of CPU and UPG, we extract features for each pair of user and remote phone number in two different yet complementary aspects: I) duration relatedness (DR) between user and phone number; and 2) frequency relatedness (FR) between user and phone number. Upon weighted CPG and UPG, we determine a trust value for each remote phone number. Finally, we conduct a comprehensive experimental study based on a dataset collected through an anti-fraud mobile application, Whoscall. The results demonstrate the effectiveness of our weighted HITS-based approach and show the strength of taking both DR and FR into account in feature extraction. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Telecommunication Fraud | en_US |
dc.subject | Trust Value Mining | en_US |
dc.subject | Fraudulent Phone Call Detection | en_US |
dc.subject | Weighted HITS Algorithm | en_US |
dc.title | FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1145/2783258.2788623 | en_US |
dc.identifier.journal | KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING | en_US |
dc.citation.spage | 2157 | en_US |
dc.citation.epage | 2166 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000485312900227 | en_US |
dc.citation.woscount | 8 | en_US |
Appears in Collections: | Conferences Paper |