BTG: A Bridge to Graph machine learning in telecommunications fraud detection

X Hu, H Chen, S Liu, H Jiang, G Chu, R Li - Future Generation Computer …, 2022 - Elsevier
Telecommunications fraud runs rampant recently around the world. Therefore, how to
effectively detect fraudsters has become an increasingly challenging problem. However …

Early prediction of acute kidney injury in critical care setting using clinical notes

Y Li, L Yao, C Mao, A Srivastava… - … on bioinformatics and …, 2018 - ieeexplore.ieee.org
Acute kidney injury (AKI) in critically ill patients is associated with significant morbidity and
mortality. Development of novel methods to identify patients with AKI earlier will allow for …

Detecting telecommunication fraud by understanding the contents of a call

Q Zhao, K Chen, T Li, Y Yang, XF Wang - Cybersecurity, 2018 - Springer
Telecommunication fraud has continuously been causing severe financial loss to
telecommunication customers in China for several years. Traditional approaches to detect …

Who's calling? characterizing robocalls through audio and metadata analysis

S Prasad, E Bouma-Sims, AK Mylappan… - 29th USENIX Security …, 2020 - usenix.org
Unsolicited calls are one of the most prominent security issues facing individuals today.
Despite wide-spread anecdotal discussion of the problem, many important questions remain …

Tfd-gcl: telecommunications fraud detection based on graph contrastive learning with adaptive augmentation

J Cao, X Cui, C Zheng - 2024 International Joint Conference on …, 2024 - ieeexplore.ieee.org
Telecommunications fraud incidents have occurred frequently around the world. Rapid and
accurate detection of fraudsters in telecommunication networks has become a hot topic for …

“You are in trouble!”: A discursive psychological analysis of threatening language in Chinese cellphone fraud interactions

J Chen - International Journal for the Semiotics of Law-Revue …, 2021 - Springer
Currently cellphone fraudsters often use language to threaten and bully victims. From
discursive psychological perspective, the present study applies conversation analysis to …

A novel method for detecting telecom fraud user

R Li, Y Zhang, Y Tuo, P Chang - 2018 3rd International …, 2018 - ieeexplore.ieee.org
Telecom fraud has been a worldwide problem with substantial annual revenue losses for
many subscribers and service provider companies. To achieve effective and inexpensive …

[HTML][HTML] Machine Learning-Based Approach for Identification of SIM Box Bypass Fraud in a Telecom Network Based on CDR Analysis: Case of a Fixed and Mobile …

EMD Djomadji, KI Basile, TT Christian… - Journal of Computer and …, 2023 - scirp.org
In the telecommunications sector, companies suffer serious damages due to fraud,
especially in Africa. One of the main types of fraud is SIM box bypass fraud, which includes …

A precise telecom customer tariff promotion method based on multi-route radial basis kernel fuzzy C-means clustering

C Wei, T Valiullin, L Hao - … Conference on Algorithms and Architectures for …, 2020 - Springer
Precise tariff promotion for existing customers is important for telecom operators to increase
their revenue. The basis of successful marketing campaign mainly relies on the analysis of …

Application of Generalized Possibilistic Fuzzy C-Means Clustering for User Profiling in Mobile Networks

K Ashwini, S Panigrahi - … and Communication: Proceedings of 3rd ICICC …, 2020 - Springer
User profiling is the process of constructing a normal profile by accumulating the past calling
behavior of a user. The technique of clustering focusses on outcome of a structure or an …