Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2013
DOI: 10.1145/2492517.2500292
|View full text |Cite
|
Sign up to set email alerts
|

Using social network knowledge for detecting spider constructions in social security fraud

Abstract: As social networks offer a vast amount of additional information to enrich standard learning algorithms, the most challenging part is extracting relevant information from networked data. Fraudulent behavior is imperceptibly concealed both in local and relational data, making it even harder to define useful input for prediction models. Starting from expert knowledge, this paper succeeds to efficiently incorporate social network effects to detect fraud for the Belgian governmental social security institution, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…As noted early, several studies have applied SMOTE in classification problems using social network data. For example, it was used to create a model that predicts social security fraud detection in Belgium [ 86 ]. In another case the technique was utilized to reduce some of the effects of class imbalance among Trust and Distrust classes in social network online services [ 84 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As noted early, several studies have applied SMOTE in classification problems using social network data. For example, it was used to create a model that predicts social security fraud detection in Belgium [ 86 ]. In another case the technique was utilized to reduce some of the effects of class imbalance among Trust and Distrust classes in social network online services [ 84 ].…”
Section: Discussionmentioning
confidence: 99%
“…Depending upon the amount of over–sampling required, neighbours from the k nearest neighbours are randomly chosen” ([ 59 ] [p. 328]). SMOTE has been successfully used to balance classes in classification problems involving social network data [ 84 86 ]. Here, for the WC case SMOTE obtained 42 synthetic observations for class 1 and 70 for class 0 while in the CN case, the corresponding numbers were 84 and 140.…”
Section: Methodsmentioning
confidence: 99%
“…Hence, the list of classification and approaches for hybrid level are discussed/ presented in Tables 12 and 13. Abdi and Hashemi (2015) Boosting, MDOBoost C4.5 MAUC, G-Mean, Recall UCI, KEEL repository Liu et al (2009) Undersampling AdaBoost AUC, F-measure, G-Mean UCI repository Huang and Zhang (2016) AdaBoost, SMOTE AdaBoost Precision, Recall, Specificity, SKEMPI Accuracy, F-measure Gazzah et al (2015) Hybrid Approach SVM TN, TP Faces94, SID signature databases Bai, 2013;Van Vlasselaer et al, 2013; 3. Very popular due to its simplicity and efficiency.…”
Section: Ensemble (Or) Hybrid Methodsmentioning
confidence: 99%
“…Telecom fraud detection systems are usually based on anomaly detection, where behaviour is compared with past behaviour of subscribers (Yesuf et al, 2017). Van Vlasselaer et al (2013) state that because of the many domainspecific characteristics of different fraud types, it becomes important to use a domain-specific solution. Our method provides the necessary flexibility due to the incorporation of expert knowledge.…”
Section: Business Problemmentioning
confidence: 99%