2011 IEEE Electronics, Robotics and Automotive Mechanics Conference 2011
DOI: 10.1109/cerma.2011.14
|View full text |Cite
|
Sign up to set email alerts
|

Outlier Detection Applying an Innovative User Transaction Modeling with Automatic Explanation

Abstract: We present a method to detect outlier or exceptional transactions records applying an innovative user modeling. We use a large financial database to validate our method. Our method has two stages. The first stage is for user transaction modeling and it obtains user behavior according to historic transactions based on categorical or numerical attributes. The second stage is the monitoring where a new transaction is compared against the corresponding user model, in order to determine if this transaction is unusu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…When there is no label for the sample data, the researchers detect abnormal user groups by decomposing the social network graph. Perez et al [ 22 ] constructed an SVN network based on topic similarity, deleted a part of edges based on text feature similarity to form an SPN network, clustered and mined abnormal users' group communities based on the similarity of modulus, and gave the accuracy of the method. The TIA algorithm [ 23 ] initializes normal users and malicious users according to different centrality value boundaries, then takes various decomposition diagram operations according to different attack modes, and continuously updates malicious users and regular user groups to achieve the purpose of predicting malicious users in the Slashdot network.…”
Section: Unsupervised Algorithmmentioning
confidence: 99%
“…When there is no label for the sample data, the researchers detect abnormal user groups by decomposing the social network graph. Perez et al [ 22 ] constructed an SVN network based on topic similarity, deleted a part of edges based on text feature similarity to form an SPN network, clustered and mined abnormal users' group communities based on the similarity of modulus, and gave the accuracy of the method. The TIA algorithm [ 23 ] initializes normal users and malicious users according to different centrality value boundaries, then takes various decomposition diagram operations according to different attack modes, and continuously updates malicious users and regular user groups to achieve the purpose of predicting malicious users in the Slashdot network.…”
Section: Unsupervised Algorithmmentioning
confidence: 99%
“…This is an open access post-print version; the final authenticated version is available online at https://link.springer.com/chapter/10.1007/978-3-030-57321-8_18 by © IFIP International Federation for Information Processing 2020. [22,36,43,44,55,68,71,72,80,88,89,92,93,95,96,97,98,101,102,103,104,105,106,107] 24 Yes…”
Section: Usage Of Scenarios For Requirements Elicitation For Explanatmentioning
confidence: 99%
“…Zhu used the model-based approach and introduced a new cross outlier detection model based on distance definition incorporated with the financial transaction data features [52]. In addition, the authors of [53] proposed a two-stage model which firstly obtains user behavior according to historic transactions based on categorical or numerical attributes, and secondly, compares every new transaction against the corresponding user model, in order to determine if this transaction is suspicious or not.…”
Section: Outlier Detection Algorithms and Related Workmentioning
confidence: 99%