EGNN: Graph structure learning based on evolutionary computation helps more in graph neural networks
Z Liu, D Yang, Y Wang, M Lu, R Li - Applied Soft Computing, 2023 - Elsevier
In recent years, graph neural networks (GNNs) have been successfully applied in many
fields due to their characteristics of neighborhood aggregation and have achieved state-of …
fields due to their characteristics of neighborhood aggregation and have achieved state-of …
Fraud feature boosting mechanism and spiral oversampling balancing technique for credit card fraud detection
L Ni, J Li, H Xu, X Wang, J Zhang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the flourishing of the credit card business and Internet technology, the risk of fraudulent
credit card transactions is ever-increasing due to the complex information involved in the …
credit card transactions is ever-increasing due to the complex information involved in the …
[HTML][HTML] Adaptive multi-channel Bayesian graph attention network for IoT transaction security
With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new
phase of application and is rapidly becoming a significant force in promoting economic …
phase of application and is rapidly becoming a significant force in promoting economic …
RegraphGAN: A graph generative adversarial network model for dynamic network anomaly detection
D Guo, Z Liu, R Li - Neural Networks, 2023 - Elsevier
Due to the wide application of dynamic graph anomaly detection in cybersecurity, social
networks, e-commerce, etc., research in this area has received increasing attention. Graph …
networks, e-commerce, etc., research in this area has received increasing attention. Graph …
Blockchain and Artificial Intelligence (AI) integration for revolutionizing security and transparency in finance
The convergence of Blockchain technology and Artificial Intelligence (AI) is exerting a
transformative influence, ushering in a new epoch of security and transparency within the …
transformative influence, ushering in a new epoch of security and transparency within the …
Heterogeneous graphs neural networks based on neighbor relationship filtering
Z Liu, Y Wang, S Wang, X Zhao, H Wang… - Expert Systems with …, 2024 - Elsevier
In recent years, heterogeneous graph neural networks have been applied to the analysis of
complex networks, and in ethereum transaction, fraudsters disguise themselves as normal …
complex networks, and in ethereum transaction, fraudsters disguise themselves as normal …
Multiattribute E-CARGO task assignment model based on adaptive heterogeneous residual networks
Z Liu, Z Zhao - IEEE Transactions on Computational Social …, 2024 - ieeexplore.ieee.org
Mobile crowd sensing (MCS) is an emerging approach to collect data using smart devices.
In MCS, task assignment is described as assigning existing tasks to known workers outside …
In MCS, task assignment is described as assigning existing tasks to known workers outside …
BTextCAN: Consumer fraud detection via group perception
S Lai, J Wu, Z Ma, C Ye - Information Processing & Management, 2023 - Elsevier
Traditional consumer fraud detection usually relies on the relevant regulatory authorities to
conduct inspections through sampling. This would be labor-intensive and inefficient. To …
conduct inspections through sampling. This would be labor-intensive and inefficient. To …
BI-FedGNN: Federated graph neural networks framework based on Bayesian inference
R Gao, Z Liu, C Jiang, Y Wang, S Wang, P Wang - Neural Networks, 2024 - Elsevier
The development of the Industrial Internet of Things (IIoT) in recent years has resulted in an
increase in the amount of data generated by connected devices, creating new opportunities …
increase in the amount of data generated by connected devices, creating new opportunities …
Adaptive attention-based graph representation learning to detect phishing accounts on the Ethereum blockchain
H Sun, Z Liu, S Wang, H Wang - IEEE Transactions on Network …, 2024 - ieeexplore.ieee.org
With Ethereum blockchain advancement, the Ethereum platform gathers numerous users. In
this context, traditional phishing appears new fraud methods, resulting in significant losses …
this context, traditional phishing appears new fraud methods, resulting in significant losses …