Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Bank Fraud Detection with Graph Neural Networks

Authors: A. I. Sergadeeva, D. S. Lavrova, D. P. Zegzhda

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This study proposes a method for detecting bank fraud based on graph neural networks. Financial transactions are represented in the form of a graph and analyzed with a graph neural network with the goal of detecting transactions typical of fraud schemes. The results of experimental tests indicate the high potential of the proposed approach.
Literature
5.
go back to reference Save, P., Tiwarekar, P., Jain, K.N., and Mahyavanshi, N., A novel idea for credit card fraud detection using decision tree, Int. J. Comput. Appl., 2017, vol. 161, no. 13, pp. 6–9. Save, P., Tiwarekar, P., Jain, K.N., and Mahyavanshi, N., A novel idea for credit card fraud detection using decision tree, Int. J. Comput. Appl., 2017, vol. 161, no. 13, pp. 6–9.
9.
go back to reference Zou, J., Zhang, J., and Jiang, P., Credit card fraud detection using autoencoder neural network, 2019. arXi-v:1908.11553 [cs.LG] Zou, J., Zhang, J., and Jiang, P., Credit card fraud detection using autoencoder neural network, 2019. arXi-v:1908.11553 [cs.LG]
10.
go back to reference Zhong, Q., Liu, Ya., Ao, X., Hu, B., Feng, J., Tang, J., and He, Q., Financial defaulter detection on online credit payment via multi-view attributed heterogeneous information network, WWW ’20: Proc. The Web Conf. 2020, Taipei, Taiwan, 2020, New York: Association for Computing Machinery, 2020, pp. 785–795. https://doi.org/10.1145/3366423.3380159 Zhong, Q., Liu, Ya., Ao, X., Hu, B., Feng, J., Tang, J., and He, Q., Financial defaulter detection on online credit payment via multi-view attributed heterogeneous information network, WWW ’20: Proc. The Web Conf. 2020, Taipei, Taiwan, 2020, New York: Association for Computing Machinery, 2020, pp. 785–795.  https://​doi.​org/​10.​1145/​3366423.​3380159
11.
go back to reference Dou, Yi., Liu, Zh., Sun, L., Deng, Yu., Peng, H., and Yu, P.S., Enhancing graph neural network-based fraud detectors against camouflaged fraudsters, CIKM ’20: Proc.29th ACM Int. Conf. on Information & Knowledge Management, 2020, New York: Association for Computing Machinery, 2020, pp. 315–324. https://doi.org/10.1145/3340531.3411903 Dou, Yi., Liu, Zh., Sun, L., Deng, Yu., Peng, H., and Yu, P.S., Enhancing graph neural network-based fraud detectors against camouflaged fraudsters, CIKM ’20: Proc.29th ACM Int. Conf. on Information & Knowledge Management, 2020, New York: Association for Computing Machinery, 2020, pp. 315–324.  https://​doi.​org/​10.​1145/​3340531.​3411903
13.
go back to reference Pavlenko, E. and Poltavtseva, M., Mathematical methods for implementing homeostatic control in digital production systems, Technological Transformation: A New Role for Human, Machines and Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 1–9. https://doi.org/10.1007/978-3-030-64430-7_1 Pavlenko, E. and Poltavtseva, M., Mathematical methods for implementing homeostatic control in digital production systems, Technological Transformation: A New Role for Human, Machines and Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 1–9. https://​doi.​org/​10.​1007/​978-3-030-64430-7_​1
14.
go back to reference Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1–16. https://doi.org/10.1007/978-3-030-93872-7_1 Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1–16.  https://​doi.​org/​10.​1007/​978-3-030-93872-7_​1
15.
go back to reference Kalinin, M. and Krundyshev, V., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122. https://doi.org/10.1109/WorldS451998.2021.9514004 Kalinin, M. and Krundyshev, V., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122. https://​doi.​org/​10.​1109/​WorldS451998.​2021.​9514004
Metadata
Title
Bank Fraud Detection with Graph Neural Networks
Authors
A. I. Sergadeeva
D. S. Lavrova
D. P. Zegzhda
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080223

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue