NFA: A neural factorization autoencoder based online telephony fraud detection

Abdul Wahid1, Mounira Msahli1, Albert Bifet1,2, Gerard Memmi1
1Department of Computer Sciences and Networks (INFRES), LTCI, Telecom Paris, Institut Polytechnique de Paris, Palaiseau, 91120, France
2Artificial Intelligence Institute, The University of Waikato, Private Bag 3105, 3240, Hamilton, New Zealand

Tài liệu tham khảo

Wieland, 2004, Network & application monitoring-can revenue assurance stop this happening? revenue leakage continues to hamper the telecom industry and operators, understandably, don't want to talk about it in, Telecommun. Int., 38, 10 CFCA Rodgers, 2020, Application of algorithmic cognitive decision trust modeling for cyber security within organisations, IEEE Trans. Eng. Manag., 69, 3792, 10.1109/TEM.2020.3019218 Jiang, 2022, Telecom fraud detection via hawkes-enhanced sequence model, IEEE Trans. Knowl. Data Eng. (TKDE) Early Access, 1 Chadyšas, 2022, Outlier analysis for telecom fraud detection, 219 Brause, 1999, Neural data mining for credit card fraud detection, 103 Rosset, 1999, Discovery of fraud rules for telecommunications—challenges and solutions, 409 Zhao, 2018, Detecting telecommunication fraud by understanding the contents of a call, Cybersecurity, 1, 1 Ravi, 2022, Wangiri fraud: pattern analysis and machine learning-based detection, IEEE Internet Things J. Early Access, 1 Chandola, 2010, Anomaly detection for discrete sequences: a survey, IEEE Trans. Knowl. Data Eng., 24, 823, 10.1109/TKDE.2010.235 He, 2016, Fusing similarity models with Markov chains for sparse sequential recommendation, 191 Rayana, 2016, Less is more: building selective anomaly ensembles, ACM Trans. Knowl. Discov. Data, 10, 1, 10.1145/2890508 Jurgovsky, 2018, Sequence classification for credit-card fraud detection, Expert Syst. Appl., 100, 234, 10.1016/j.eswa.2018.01.037 Wang, 2017, Session-based fraud detection in online e-commerce transactions using recurrent neural networks, 241 Branco, 2020, Interleaved sequence rnns for fraud detection, 3101 Zhu, 2020, Modeling users' behavior sequences with hierarchical explainable network for cross-domain fraud detection, 928 Zhang, 2022, Cpfinder: Finding an unknown caller's profession from anonymized mobile phone data, Digit. Commun. Netw., 8, 324, 10.1016/j.dcan.2021.08.003 Togbe, 2021, Anomalies detection using isolation in concept-drifting data streams, Computers, 10, 13, 10.3390/computers10010013 Li, 2022, Ecod: unsupervised outlier detection using empirical cumulative distribution functions, IEEE Trans. Knowl. Data Eng. Early Access, 1 Li, 2020, Copod: copula-based outlier detection, 1118 Zhao, 2021, Suod: accelerating large-scale unsupervised heterogeneous outlier detection, Proc. Mach. Learn. Syst., 3, 463 Ruff, 2018, Deep one-class classification, 4393 Pevnỳ, 2016, Loda: lightweight on-line detector of anomalies, Mach. Learn., 102, 275, 10.1007/s10994-015-5521-0 Liu, 2008, Isolation forest, 413 Bhatia, 2022, Memstream: memory-based streaming anomaly detection, 610 He, 2017, Neural factorization machines for sparse predictive analytics, 355 Steffen, 2010, Factorization machines, 995 Doan, 2019, Adversarial factorization autoencoder for look-alike modeling, 2803 Goodfellow, 2016 Burge, 1997, Detecting cellular fraud using adaptive prototypes, 9 Denning, 1987, An intrusion-detection model, IEEE Trans. Software Eng., SE-13, 222, 10.1109/TSE.1987.232894 Fawcett, 1997, Adaptive fraud detection, Data Min. Knowl. Discov., 1, 291, 10.1023/A:1009700419189 Lunt, 1993, A survey of intrusion detection techniques, Comput. Secur., 12, 405, 10.1016/0167-4048(93)90029-5 Tang, 2018, Personalized top-n sequential recommendation via convolutional sequence embedding, 565 Lian, 2018, xdeepfm: combining explicit and implicit feature interactions for recommender systems, 1754 Wang, 2017, Deep & cross network for ad click predictions, 1