F RAU D ETECTOR : A G RAPH -M INING - BASED F RAMEWORK FOR F RAUDULENT P HONE C ALL D ETECTION Speaker: Jim-An Tsai Advisor: Professor Jia-ling Koh Author:

Slides:



Advertisements
Similar presentations
Date: 2013/1/17 Author: Yang Liu, Ruihua Song, Yu Chen, Jian-Yun Nie and Ji-Rong Wen Source: SIGIR12 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang Adaptive.
Advertisements

Learning to Suggest: A Machine Learning Framework for Ranking Query Suggestions Date: 2013/02/18 Author: Umut Ozertem, Olivier Chapelle, Pinar Donmez,
Diversity Maximization Under Matroid Constraints Date : 2013/11/06 Source : KDD’13 Authors : Zeinab Abbassi, Vahab S. Mirrokni, Mayur Thakur Advisor :
Date : 2013/05/27 Author : Anish Das Sarma, Lujun Fang, Nitin Gupta, Alon Halevy, Hongrae Lee, Fei Wu, Reynold Xin, Gong Yu Source : SIGMOD’12 Speaker.
Entity-Centric Topic-Oriented Opinion Summarization in Twitter Date : 2013/09/03 Author : Xinfan Meng, Furu Wei, Xiaohua, Liu, Ming Zhou, Sujian Li and.
Linking Named Entity in Tweets with Knowledge Base via User Interest Modeling Date : 2014/01/22 Author : Wei Shen, Jianyong Wang, Ping Luo, Min Wang Source.
Date : 2014/04/01 Author : Zhung-Xun Liao, Yi-Chin Pan, Wen-Chih Peng, Po-Ruey Lei Source : CIKM’13 Advisor : Jia-ling Koh Speaker : Shao-Chun Peng.
Query Dependent Pseudo-Relevance Feedback based on Wikipedia SIGIR ‘09 Advisor: Dr. Koh Jia-Ling Speaker: Lin, Yi-Jhen Date: 2010/01/24 1.
Mining Query Subtopics from Search Log Data Date : 2012/12/06 Resource : SIGIR’12 Advisor : Dr. Jia-Ling Koh Speaker : I-Chih Chiu.
I DENTIFYING T OURISTS FROM P UBLIC T RANSPORT C OMMUTERS Speaker: Jim-An Tsai Advisor: Jia-ling Koh Author: Mingqiang Xue #, Huayu Wu #, Wei Chen #, Wee.
(ACM KDD 09’) Prem Melville, Wojciech Gryc, Richard D. Lawrence
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
Tag Clouds Revisited Date : 2011/12/12 Source : CIKM’11 Speaker : I- Chih Chiu Advisor : Dr. Koh. Jia-ling 1.
 Focused Clustering and Outlier Detection in Large Attributed Graphs Author : Bryan Perozzi, Leman Akoglu, Patricia lglesias Sánchez, Emmanuel Müller.
Suggesting Friends using the Implicit Social Graph Maayan Roth et al. (Google, Inc., Israel R&D Center) KDD’10 Hyewon Lim 1 Oct 2014.
A framework For Community Identification in Dynamic Social Networks Chayant, Tanya Berger-Wolf, David Kempe [KDD’07] Advisor : Dr. Koh Jia-Ling Advisor.
Mining Interesting Locations and Travel Sequences from GPS Trajectories IDB & IDS Lab. Seminar Summer 2009 강 민 석강 민 석 July 23 rd,
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Eric Hsueh-Chan Lu 2 and Vincent S. Tseng 1 1 Institute of Computer Science and Information.
A Personalized Recommender System Based on Users’ Information In Folksonomies Date: 2013/12/18 Author: Mohamed Nader Jelassi, Sadok Ben Yahia, Engelbert.
Automated Social Hierarchy Detection through Network Analysis (SNAKDD07) Ryan Rowe, Germ´an Creamer, Shlomo Hershkop, Salvatore J Stolfo 1 Advisor:
CIKM’09 Date:2010/8/24 Advisor: Dr. Koh, Jia-Ling Speaker: Lin, Yi-Jhen 1.
Retrieval Models for Question and Answer Archives Xiaobing Xue, Jiwoon Jeon, W. Bruce Croft Computer Science Department University of Massachusetts, Google,
ON THE SELECTION OF TAGS FOR TAG CLOUDS (WSDM11) Advisor: Dr. Koh. Jia-Ling Speaker: Chiang, Guang-ting Date:2011/06/20 1.
2001/11/27IDS Lab Seminar1 Adaptive Fraud Detection Advisor: Dr. Hsu Graduate: Yung-Chu Lin Source: Fawcett, Tom and Foster Provost, Journal of Data Mining.
Mining Social Networks for Personalized Prioritization Shinjae Yoo, Yiming Yang, Frank Lin, II-Chul Moon [KDD ’09] 1 Advisor: Dr. Koh Jia-Ling Reporter:
Binxing Jiao et. al (SIGIR ’10) Presenter : Lin, Yi-Jhen Advisor: Dr. Koh. Jia-ling Date: 2011/4/25 VISUAL SUMMARIZATION OF WEB PAGES.
Using Inactivity to Detect Unusual behavior Presenter : Siang Wang Advisor : Dr. Yen - Ting Chen Date : Motion and video Computing, WMVC.
BioSnowball: Automated Population of Wikis (KDD ‘10) Advisor: Dr. Koh, Jia-Ling Speaker: Lin, Yi-Jhen Date: 2010/11/30 1.
Enhancing Cluster Labeling Using Wikipedia David Carmel, Haggai Roitman, Naama Zwerdling IBM Research Lab (SIGIR’09) Date: 11/09/2009 Speaker: Cho, Chin.
A U NIFIED F RAMEWORK FOR L INK R ECOMMENDATION WITH U SER A TTRIBUTES AND G RAPH S TRUCTURE Zhijun Yin, Manish Gupta, Tim Weninger, Jiawei Han Presenter:
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Finding Experts Using Social Network Analysis 2007 IEEE/WIC/ACM International Conference on Web Intelligence Yupeng Fu, Rongjing Xiang, Yong Wang, Min.
LOGO Identifying Opinion Leaders in the Blogosphere Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng CIKM 2007 Advisor : Dr. Koh Jia-Ling Speaker : Tu.
Date: 2014/05/27 Author: Xiangnan Kong, Bokai Cao, Philip S. Yu Source: KDD’13 Advisor: Jia-ling Koh Speaker: Sheng-Chih Chu Multi-Label Classification.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying, Eric Hsueh-Chan Lu, Wen-Ning Kuo and Vincent S. Tseng Institute of Computer Science.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
A Classification-based Approach to Question Answering in Discussion Boards Liangjie Hong, Brian D. Davison Lehigh University (SIGIR ’ 09) Speaker: Cho,
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
Date: 2013/6/10 Author: Shiwen Cheng, Arash Termehchy, Vagelis Hristidis Source: CIKM’12 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang Predicting the Effectiveness.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
M ETA - PATH BASED M ULTI - N ETWORK C OLLECTIVE L INK P REDICTION Speaker: Jim-An Tsai Advisor: Jia-ling Koh Author: Jiawei Zhang, Philip S. Yu, Zhi-Hua.
1 Adaptive Subjective Triggers for Opinionated Document Retrieval (WSDM 09’) Kazuhiro Seki, Kuniaki Uehara Date: 11/02/09 Speaker: Hsu, Yu-Wen Advisor:
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Direct mining of discriminative patterns for classifying.
CONTEXTUAL SEARCH AND NAME DISAMBIGUATION IN USING GRAPHS EINAT MINKOV, WILLIAM W. COHEN, ANDREW Y. NG SIGIR’06 Date: 2008/7/17 Advisor: Dr. Koh,
A DDING S TRUCTURE TO T OP -K: F ORM I TEMS TO E XPANSIONS Date : Source : CIKM’ 11 Speaker : I-Chih Chiu Advisor : Dr. Jia-Ling Koh 1.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Extracting Query Facets From Search Results Date : 2013/08/20 Source : SIGIR’13 Authors : Weize Kong and James Allan Advisor : Dr.Jia-ling, Koh Speaker.
{ Adaptive Relevance Feedback in Information Retrieval Yuanhua Lv and ChengXiang Zhai (CIKM ‘09) Date: 2010/10/12 Advisor: Dr. Koh, Jia-Ling Speaker: Lin,
T OWARDS D ECISION S UPPORT AND G OAL A CHIEVEMENT : I DENTIFYING A CTION -O UTCOME R ELATIONSHIPS F ROM S OCIAL M EDIA Speaker: Jim-An Tsai Advisor: Jia-ling.
Incorporating Site-level Knowledge for Incremental Crawling of Web Forums: A List-wise Strategy KDD 2009 Jiang-Ming Yang, Rui Cai, Chunsong Wang, Hua Huang,
DATA MINING It is a process of extracting interesting(non trivial, implicit, previously, unknown and useful ) information from any data repository. The.
L IFE - STAGE P REDICTION FOR P RODUCT R ECOMMENDATION IN E- COMMERCE Speaker: Jim-An Tsai Advisor: Jia-ling Koh Author: Peng Jiang, Yadong Zhu, Yi Zhang,
G ENDER AND I NTEREST T ARGETING FOR S PONSORED P OST A DVERTISING AT T UMBLR Speaker: Jim-An Tsai Advisor: Professor Jia-ling Koh Author: Mihajlo Grbovicy,
ClusCite:Effective Citation Recommendation by Information Network-Based Clustering Date: 2014/10/16 Author: Xiang Ren, Jialu Liu,Xiao Yu, Urvashi Khandelwal,
ORec : An Opinion-Based Point-of-Interest Recommendation Framework
Mining User Similarity from Semantic Trajectories
Customized of Social Media Contents using Focused Topic Hierarchy
Where Did You Go: Personalized Annotation of Mobility Records
Open question answering over curated and extracted knowledge bases
Speaker: Jim-an tsai advisor: professor jia-lin koh
Speaker: Jim-an tsai advisor: professor jia-lin koh
A Large Scale Prediction Engine for App Install Clicks and Conversions
Measuring the Latency of Depression Detection in Social Media
Speaker: Jim-An Tsai Advisor: Professor Jia-ling Koh
Speaker: Jim-an tsai advisor: professor jia-lin koh
Sourse: Www 2017 Advisor: Jia-Ling Koh Speaker: Hsiu-Yi,Chu
Date : 2013/1/10 Author : Lanbo Zhang, Yi Zhang, Yunfei Chen
Enriching Taxonomies With Functional Domain Knowledge
Date: 2012/11/15 Author: Jin Young Kim, Kevyn Collins-Thompson,
DENSE ITEMSETS JOUNI K. SEPPANEN, HEIKKI MANNILA SIGKDD2004
Presentation transcript:

F RAU D ETECTOR : A G RAPH -M INING - BASED F RAMEWORK FOR F RAUDULENT P HONE C ALL D ETECTION Speaker: Jim-An Tsai Advisor: Professor Jia-ling Koh Author: Vincent S. Tseng, Jia-Ching Ying, Che-Wei Huang, Yimin Kao, Kuan-Ta Chen Vincent S. TsengJia-Ching YingChe-Wei HuangYimin KaoKuan-Ta Chen Date:2016/6/6 Source: KDD ’15 1

O UTLINE Introduction Method Experiment Conclusion 2

W HO IS CALLING ? Fraud?Normal? OR 3

B EHAVIOR OF USERS WHO RECEIVE A CALL 4

A NTI - FRAUD MOBILE APP 5

F RAU D ETECTOR 6

O UTLINE Introduction Method Experiment Conclusion 7

T RUST V ALUE M INING To support weighted HITS algorithm, we proposed two kinds of directed graph. 1. UPG(User-remote_phone_number graph) 2. CPG(Contact_book-remote phone number graph) To represent behavior of users’ telecommunications. 8

UPG 9

UPG = (V, E) 10

CP 11

CPG 12

W EIGHTS A SSIGNMENT User usually has call to/from normal remote phone number either frequently or for a while. So explore the telecommunication behaviors in two different but complementary aspects: 1. Duration Relatedness (DR) between user and remote phone number 2. Frequency Relatedness (FR) between user and remote phone number. 13

C ONDITIONAL T ELECOMMUNICATION R ECORD S ET ( CT ) Example: 14

D URATION R ELATEDNESS (DR) Our goal is to extract duration relatedness features for pairs of users and remote phone numbers. Propose to extract two duration features to depict relation between users and remote phone numbers. 1. Total Call Duration (TCD) 2. Average Call Duration (ACD) 15

TCD Aggregating user’s call duration of a remote phone number can be used to infer the probability that a user trusts that remote phone number. Example: The total call duration from p5 to u4 is (17:30:08 − 17:12:33) + (20:40:08 − 20:02:28) = (00:17:35) + (00:37:40) = 3315 (sec.) 16

ACD Averaging user’s call duration of a remote phone number can adjust this bias evaluation. Example: The average call duration from p5 to u4 is 3315/2 = (sec.) 17

F REQUENCY R ELATEDNESS Our goal is to extract frequency relatedness feature for pairs of users and remote phone numbers. Example: The normalized call frequency from p5 to u4 is 2/3. 18

T RUST V ALUE L EARNING Perform a Weighted HITS algorithm to learn trust value for each remote phone number and experience value for each user 19

HITS-BASED FRAUDULENT REMOTE PHONE NUMBER DETECTION After learning trust value and experience value, we must estimate the trust value of unknown remote phone number based on the learned trust value and experience value. 20

HITS-BASED FRAUDULENT REMOTE PHONE NUMBER DETECTION Example: 21

O UTLINE Introduction Method Experiment Conclusion 22

D ATASET 23

P ERFORMANCE M ETRICS 24

C OMPARE WITH B ASELINE APPROACHES 25

O UTLINE Introduction Method Experiment Conclusion 26

C ONCLUSION This paper have proposed a novel framework named HITS-based fraudulent phone call detection (FrauDetector) for detecting fraudulent phone calls by mining users’ telecommunication records. Tackled the problem of mining trust value from telecommunication activity, which is a crucial prerequisite for fraud detection. 27