2020 IEEE International Conference on Big Data (Big Data) 2020
DOI: 10.1109/bigdata50022.2020.9378346
|View full text |Cite
|
Sign up to set email alerts
|

AutoAudit: Mining Accounting and Time-Evolving Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…There is a lot of work on Anomaly detection (Akoglu, Tong, and Koutra 2015;Liu, Ting, and Zhou 2008;Lee et al 2021); on dense sub-graph detection, which are usually suspicious (Hooi et al 2016;Shin, Eliassi-Rad, and Faloutsos 2016); on unsupervised clustering, that group nearby points and indicates groups and trends in the dataset (Hamerly and Elkan 2003;Ester et al 1996;Ankerst et al 1999;; on (semi-)supervised methods, when only some of the nodes have labels (Ester et al 1996;Ankerst et al 1999;Hamerly and Elkan 2003); on time-evolving graphs (Kazemi et al 2020;Lee et al 2020); on graph visualization (Stolper et al 2014;Chau et al 2011;Zheng et al 2022); and on call graphs (de Melo et al 2010;Akoglu, de Melo, and Faloutsos 2012).…”
Section: Related Workmentioning
confidence: 99%
“…There is a lot of work on Anomaly detection (Akoglu, Tong, and Koutra 2015;Liu, Ting, and Zhou 2008;Lee et al 2021); on dense sub-graph detection, which are usually suspicious (Hooi et al 2016;Shin, Eliassi-Rad, and Faloutsos 2016); on unsupervised clustering, that group nearby points and indicates groups and trends in the dataset (Hamerly and Elkan 2003;Ester et al 1996;Ankerst et al 1999;; on (semi-)supervised methods, when only some of the nodes have labels (Ester et al 1996;Ankerst et al 1999;Hamerly and Elkan 2003); on time-evolving graphs (Kazemi et al 2020;Lee et al 2020); on graph visualization (Stolper et al 2014;Chau et al 2011;Zheng et al 2022); and on call graphs (de Melo et al 2010;Akoglu, de Melo, and Faloutsos 2012).…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection has been deployed in financial services systems to capture the differentiating characteristics of fraud in the immense quantities of financial transaction data [65], [66]. It provides insights on the data patterns by focusing on the distinct characteristics in terms of connectivity, entity characteristics, flow, traffic patterns (both locally and globally), sub-graph characteristics and events in the graph representations [67,68], [69], [66].…”
Section: Graph Anomaly Detectionmentioning
confidence: 99%
“…Anomaly detection (AD), also known as outlier detection, is a crucial learning task with many real-world applications, including malware detection (Nguyen et al 2019), anti-money laundering (Lee et al 2020), rare-disease detection (Li et al 2018) and so on. Although there are numerous detection algorithms (Aggarwal 2013;Pang et al 2021;Zhao, Rossi, and Akoglu 2021;Liu et al 2022), existing AD methods assume the availability of (partial) labels that are clean (i.e.…”
Section: Introductionmentioning
confidence: 99%