{"id":"https://openalex.org/W2911648198","doi":"https://doi.org/10.1109/icdmw.2018.00015","title":"Selective Graph Attention Networks for Account Takeover Detection","display_name":"Selective Graph Attention Networks for Account Takeover Detection","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2911648198","doi":"https://doi.org/10.1109/icdmw.2018.00015","mag":"2911648198"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdmw.2018.00015","pdf_url":null,"source":{"id":"https://openalex.org/S4363608174","display_name":"2022 IEEE International Conference on Data Mining Workshops (ICDMW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072767943","display_name":"Jialing Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialing Tao","raw_affiliation_strings":["Platform Risk Management, Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Platform Risk Management, Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460917","display_name":"Hui Wang","orcid":"https://orcid.org/0000-0003-2633-6015"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wang","raw_affiliation_strings":["Platform Risk Manage., Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Platform Risk Manage., Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101439585","display_name":"Tao Xiong","orcid":"https://orcid.org/0000-0003-1583-8669"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xiong","raw_affiliation_strings":["Platform Risk Management, Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Platform Risk Management, Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.123,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.680303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/graph-embedding","display_name":"Graph Embedding","score":0.49908566}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78622603},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6078496},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5271558},{"id":"https://openalex.org/C75564084","wikidata":"https://www.wikidata.org/wiki/Q5597085","display_name":"Graph embedding","level":3,"score":0.49908566},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.4787411},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4652845},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.41363907},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4132644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37950236},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3785724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33964345},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.28689373},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdmw.2018.00015","pdf_url":null,"source":{"id":"https://openalex.org/S4363608174","display_name":"2022 IEEE International Conference on Data Mining Workshops (ICDMW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.82,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1662382123","https://openalex.org/W2084256507","https://openalex.org/W2131886737","https://openalex.org/W2470673105","https://openalex.org/W2519887557","https://openalex.org/W2610907333","https://openalex.org/W2690721124","https://openalex.org/W2778746621","https://openalex.org/W2780274596","https://openalex.org/W2963271116","https://openalex.org/W2963403868","https://openalex.org/W2963858333","https://openalex.org/W2964015378","https://openalex.org/W2964113829","https://openalex.org/W2964311892","https://openalex.org/W3099136959","https://openalex.org/W4297733535","https://openalex.org/W4385245566"],"related_works":["https://openalex.org/W3206528106","https://openalex.org/W3038102983","https://openalex.org/W3036264823","https://openalex.org/W2950907416","https://openalex.org/W2932872266","https://openalex.org/W2912814903","https://openalex.org/W2123605750","https://openalex.org/W2088740331","https://openalex.org/W2082479932","https://openalex.org/W1559483280"],"abstract_inverted_index":{"Account":[0],"takeover":[1],"(ATO)":[2],"is":[3,116,156],"a":[4,9,15,45,92,124],"type":[5],"of":[6,14,31,38,59,80,146],"fraud":[7,86],"where":[8],"fraudster":[10],"gains":[11],"unauthorized":[12],"access":[13],"legitimate":[16],"user's":[17],"account":[18],"through":[19],"phishing,":[20],"malware,":[21],"bought":[22],"credentials":[23],"from":[24,54,127],"dark":[25],"web":[26],"etc.":[27],"The":[28,110,141],"sophisticated":[29],"evasion":[30],"detection":[32,47,87],"by":[33,41,84],"fraudsters":[34],"and":[35,69],"the":[36,134,144,147],"requirement":[37],"friction-free":[39],"experience":[40],"customers":[42],"call":[43],"for":[44],"new":[46],"technique.":[48],"Rather":[49],"than":[50],"using":[51,81],"statistical":[52],"features":[53],"behavior":[55],"sequence":[56,98],"in":[57],"most":[58],"existing":[60],"solutions,":[61],"we":[62,89],"represent":[63],"account/context":[64],"with":[65,74],"graph":[66,94,113,120,149],"node":[67],"embedding":[68],"extract":[70],"inherent":[71],"sequential":[72],"patterns":[73],"Recurrent":[75],"Neural":[76],"Networks":[77],"(RNNs).":[78],"Instead":[79],"plain":[82],"RNN":[83],"state-of-art":[85],"models,":[88],"further":[90,160],"propose":[91],"selective":[93,112],"attention":[95,114,150],"mechanism":[96,115],"within":[97],"(GAS),":[99],"attending":[100],"to":[101,105,118,132,137,159],"relevant":[102],"steps":[103],"only":[104],"assist":[106],"learning":[107],"longer":[108],"dependencies.":[109],"proposed":[111,135,148,163],"applicable":[117],"general":[119],"structures.":[121],"Experiments":[122],"on":[123],"real":[125,153],"dataset":[126],"Alibaba":[128],"Group":[129],"are":[130],"conducted":[131],"compare":[133],"model":[136],"several":[138],"state-of-the-art":[139],"approaches.":[140],"results":[142],"demonstrate":[143],"effectiveness":[145],"mechanism.":[151],"A":[152],"case":[154],"study":[155],"also":[157],"presented":[158],"explain":[161],"how":[162],"GAS":[164],"works.":[165]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2911648198","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-02-23T09:09:52.837839","created_date":"2019-02-21"}