Two-Level Attention Model of Representation Learning for Fraud Detection

被引:24
作者
Cao, Ruihao [1 ,2 ]
Liu, Guanjun [1 ,2 ]
Xie, Yu [1 ,2 ]
Jiang, Changjun [1 ,2 ]
机构
[1] Tongji Univ, Key Lab Minist Educ Embedded Syst & Serv Comp, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Collaborat Innovat Ctr, Shanghai Elect Transact & Informat Serv, Shanghai 201804, Peoples R China
关键词
Attention mechanisms; deep learning; fraud detection; representation learning;
D O I
10.1109/TCSS.2021.3074175
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fraud detection has attracted significant attention in financial institutions, especially utilizing some artificial intelligent methods to automatically detect fraudulent transactions. With the study and application of intelligent fraud detection technology, scholars found that the representation learning method can reveal more information about fraud patterns, which is also crucial for detection task. Therefore, in this work, we present a novel method for detecting fraud transactions by combining two modules learning hidden information at different levels of data in a unified framework. To address and explore the deep representation of features of transaction behaviors, we propose a two-level attention model to capture them by integrating two data embeddings at the data sample level and the feature level. In particular, the sample-level attention model captures the detailed information more centrally that is difficult to determine; the feature-level attention model extends the information of feature dependences. We further combine them to train a final fraud detection model. Extensive experiments are conducted using a data set provided by a financial company in China and several public financial data sets. The results confirm the effectiveness of our proposed method in detecting fraudulent transactions compared with other state-of-the-art methods.
引用
收藏
页码:1291 / 1301
页数:11
相关论文
共 45 条
[1]  
[Anonymous], 2019, 2019 INTERNET CRIME
[2]   Long short-term memory [J].
Hochreiter, S ;
Schmidhuber, J .
NEURAL COMPUTATION, 1997, 9 (08) :1735-1780
[3]  
[Anonymous], 2014, 3 INT C LEARN REPR
[4]   Feature engineering strategies for credit card fraud detection [J].
Bahnsen, Alejandro Correa ;
Aouada, Djamila ;
Stojanovic, Aleksandar ;
Ottersten, Bjoern .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 51 :134-142
[5]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[6]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[7]  
Carminati M, 2014, IFIP ADV INF COMM TE, V428, P380
[8]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[9]  
Cheng DW, 2020, AAAI CONF ARTIF INTE, V34, P362
[10]  
Cho K., 2014, P C EMP METH NAT LAN, P1724, DOI DOI 10.3115/V1/D14-1179