NFA: A neural factorization autoencoder based online telephony fraud detection
Tài liệu tham khảo
Wieland, 2004, Network & application monitoring-can revenue assurance stop this happening? revenue leakage continues to hamper the telecom industry and operators, understandably, don't want to talk about it in, Telecommun. Int., 38, 10
CFCA
Rodgers, 2020, Application of algorithmic cognitive decision trust modeling for cyber security within organisations, IEEE Trans. Eng. Manag., 69, 3792, 10.1109/TEM.2020.3019218
Jiang, 2022, Telecom fraud detection via hawkes-enhanced sequence model, IEEE Trans. Knowl. Data Eng. (TKDE) Early Access, 1
Chadyšas, 2022, Outlier analysis for telecom fraud detection, 219
Brause, 1999, Neural data mining for credit card fraud detection, 103
Rosset, 1999, Discovery of fraud rules for telecommunications—challenges and solutions, 409
Zhao, 2018, Detecting telecommunication fraud by understanding the contents of a call, Cybersecurity, 1, 1
Ravi, 2022, Wangiri fraud: pattern analysis and machine learning-based detection, IEEE Internet Things J. Early Access, 1
Chandola, 2010, Anomaly detection for discrete sequences: a survey, IEEE Trans. Knowl. Data Eng., 24, 823, 10.1109/TKDE.2010.235
He, 2016, Fusing similarity models with Markov chains for sparse sequential recommendation, 191
Rayana, 2016, Less is more: building selective anomaly ensembles, ACM Trans. Knowl. Discov. Data, 10, 1, 10.1145/2890508
Jurgovsky, 2018, Sequence classification for credit-card fraud detection, Expert Syst. Appl., 100, 234, 10.1016/j.eswa.2018.01.037
Wang, 2017, Session-based fraud detection in online e-commerce transactions using recurrent neural networks, 241
Branco, 2020, Interleaved sequence rnns for fraud detection, 3101
Zhu, 2020, Modeling users' behavior sequences with hierarchical explainable network for cross-domain fraud detection, 928
Zhang, 2022, Cpfinder: Finding an unknown caller's profession from anonymized mobile phone data, Digit. Commun. Netw., 8, 324, 10.1016/j.dcan.2021.08.003
Togbe, 2021, Anomalies detection using isolation in concept-drifting data streams, Computers, 10, 13, 10.3390/computers10010013
Li, 2022, Ecod: unsupervised outlier detection using empirical cumulative distribution functions, IEEE Trans. Knowl. Data Eng. Early Access, 1
Li, 2020, Copod: copula-based outlier detection, 1118
Zhao, 2021, Suod: accelerating large-scale unsupervised heterogeneous outlier detection, Proc. Mach. Learn. Syst., 3, 463
Ruff, 2018, Deep one-class classification, 4393
Pevnỳ, 2016, Loda: lightweight on-line detector of anomalies, Mach. Learn., 102, 275, 10.1007/s10994-015-5521-0
Liu, 2008, Isolation forest, 413
Bhatia, 2022, Memstream: memory-based streaming anomaly detection, 610
He, 2017, Neural factorization machines for sparse predictive analytics, 355
Steffen, 2010, Factorization machines, 995
Doan, 2019, Adversarial factorization autoencoder for look-alike modeling, 2803
Goodfellow, 2016
Burge, 1997, Detecting cellular fraud using adaptive prototypes, 9
Denning, 1987, An intrusion-detection model, IEEE Trans. Software Eng., SE-13, 222, 10.1109/TSE.1987.232894
Fawcett, 1997, Adaptive fraud detection, Data Min. Knowl. Discov., 1, 291, 10.1023/A:1009700419189
Lunt, 1993, A survey of intrusion detection techniques, Comput. Secur., 12, 405, 10.1016/0167-4048(93)90029-5
Tang, 2018, Personalized top-n sequential recommendation via convolutional sequence embedding, 565
Lian, 2018, xdeepfm: combining explicit and implicit feature interactions for recommender systems, 1754
Wang, 2017, Deep & cross network for ad click predictions, 1