FraudVis: Understanding Unsupervised Fraud Detection Algorithms
暂无分享,去创建一个
Xin Liu | Wei Xu | Ling Huang | Lei Shi | Zhifei Liu | Qixin Zhu | Zhigang Su | Jihae Lee | Jiao Sun
[1] Rossano Schifanella,et al. A Large-Scale Study of User Image Search Behavior on the Web , 2015, CHI.
[2] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[3] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[4] Qing Chen,et al. DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction , 2016, 2016 IEEE Conference on Visual Analytics Science and Technology (VAST).
[5] Silvia Miksch,et al. EVA: Visual Analytics to Identify Fraudulent Events , 2018, IEEE Transactions on Visualization and Computer Graphics.
[6] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[7] Christos Faloutsos,et al. Inferring Strange Behavior from Connectivity Pattern in Social Networks , 2014, PAKDD.
[8] Gang Wang,et al. Unsupervised Clickstream Clustering for User Behavior Analysis , 2016, CHI.
[9] Tong Zhang,et al. Crowd Fraud Detection in Internet Advertising , 2015, WWW.
[10] Rose Yu,et al. GLAD: group anomaly detection in social media analysis , 2014, ACM Trans. Knowl. Discov. Data.
[11] Christos Faloutsos,et al. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.
[12] Dawei Zhao,et al. Linking social network accounts by modeling user spatiotemporal habits , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[13] Barnabás Póczos,et al. Group Anomaly Detection using Flexible Genre Models , 2011, NIPS.
[14] Ji Hwan Park,et al. C2A: Crowd consensus analytics for virtual colonoscopy , 2016, 2016 IEEE Conference on Visual Analytics Science and Technology (VAST).
[15] Zi Huang,et al. A temporal context-aware model for user behavior modeling in social media systems , 2014, SIGMOD Conference.
[16] Kannan Srinivasan,et al. Modeling Online Browsing and Path Analysis Using Clickstream Data , 2004 .
[17] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[18] Barnabás Póczos,et al. Hierarchical Probabilistic Models for Group Anomaly Detection , 2011, AISTATS.
[19] Yang Wang,et al. Patterns and Sequences: Interactive Exploration of Clickstreams to Understand Common Visitor Paths , 2017, IEEE Transactions on Visualization and Computer Graphics.
[20] David R. Thomas,et al. A General Inductive Approach for Analyzing Qualitative Evaluation Data , 2006 .
[21] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[22] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[23] Christos Faloutsos,et al. Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.
[24] Christos Faloutsos,et al. EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2010, PAKDD.
[25] Christopher Krügel,et al. Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.
[26] Virgílio A. F. Almeida,et al. Characterizing user behavior in online social networks , 2009, IMC '09.
[27] Sylvain Sénécal,et al. Consumers' decision-making process and their online shopping behavior: a clickstream analysis , 2005 .
[28] Daniel Davies,et al. Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool , 2016, AVI.
[29] Surya B. Yadav,et al. A computational model for financial reporting fraud detection , 2011, Decis. Support Syst..
[30] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[31] Lin Lu,et al. Mining Significant Usage Patterns from Clickstream Data , 2005, WEBKDD.
[32] Qiang Cao,et al. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.
[33] Tong Zhao,et al. It's about time! Modeling customer behaviors as the secretary problem in daily deal websites , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).