[HTML][HTML] Fraud detection: A systematic literature review of graph-based anomaly detection approaches

T Pourhabibi, KL Ong, BH Kam, YL Boo - Decision Support Systems, 2020 - Elsevier
Graph-based anomaly detection (GBAD) approaches are among the most popular
techniques used to analyze connectivity patterns in communication networks and identify …

Deep anomaly detection with deviation networks

G Pang, C Shen, A Van Den Hengel - Proceedings of the 25th ACM …, 2019 - dl.acm.org
Although deep learning has been applied to successfully address many data mining
problems, relatively limited work has been done on deep learning for anomaly detection …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

Artificial intelligence co-piloted auditing

H Gu, M Schreyer, K Moffitt, M Vasarhelyi - International Journal of …, 2024 - Elsevier
This paper proposes the concept of artificial intelligence co-piloted auditing, emphasizing
the collaborative potential of auditors and foundation models in the auditing domain. The …

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

G Pang, L Cao, L Chen, H Liu - Proceedings of the 24th ACM SIGKDD …, 2018 - dl.acm.org
Learning expressive low-dimensional representations of ultrahigh-dimensional data, eg,
data with thousands/millions of features, has been a major way to enable learning methods …

Opinion fraud detection in online reviews by network effects

L Akoglu, R Chandy, C Faloutsos - … AAAI conference on web and social …, 2013 - ojs.aaai.org
User-generated online reviews can play a significant role in the success of retail products,
hotels, restaurants, etc. However, review systems are often targeted by opinion spammers …

Explainable deep few-shot anomaly detection with deviation networks

G Pang, C Ding, C Shen, A Hengel - arXiv preprint arXiv:2108.00462, 2021 - arxiv.org
Existing anomaly detection paradigms overwhelmingly focus on training detection models
using exclusively normal data or unlabeled data (mostly normal samples). One notorious …

DeltaCon: A Principled Massive-Graph Similarity Function

D Koutra, JT Vogelstein, C Faloutsos - Proceedings of the 2013 SIAM …, 2013 - SIAM
How much did a network change since yesterday? How different is the wiring between Bob's
brain (a left-handed male) and Alice's brain (a right-handed female)? Graph similarity with …

Gotcha! network-based fraud detection for social security fraud

V Van Vlasselaer, T Eliassi-Rad… - Management …, 2017 - pubsonline.informs.org
We study the impact of network information for social security fraud detection. In a social
security system, companies have to pay taxes to the government. This study aims to identify …

Deep weakly-supervised anomaly detection

G Pang, C Shen, H Jin, A van den Hengel - Proceedings of the 29th ACM …, 2023 - dl.acm.org
Recent semi-supervised anomaly detection methods that are trained using small labeled
anomaly examples and large unlabeled data (mostly normal data) have shown largely …