1 code implementation • 23 May 2023 • Sheng Tian, Jihai Dong, Jintang Li, Wenlong Zhao, Xiaolong Xu, Baokun Wang, Bowen Song, Changhua Meng, Tianyi Zhang, Liang Chen
Anomaly detection aims to distinguish abnormal instances that deviate significantly from the majority of benign ones.
no code implementations • 4 Jan 2022 • Yongchun Zhu, Dongbo Xi, Bowen Song, Fuzhen Zhuang, Shuai Chen, Xi Gu, Qing He
Thus, in this paper, we further propose a transfer framework to tackle the cross-domain fraud detection problem, which aims to transfer knowledge from existing domains (source domains) with enough and mature data to improve the performance in the new domain (target domain).
no code implementations • 31 Dec 2021 • Dongbo Xi, Fuzhen Zhuang, Bowen Song, Yongchun Zhu, Shuai Chen, Dan Hong, Tao Chen, Xi Gu, Qing He
Many prediction tasks of real-world applications need to model multi-order feature interactions in user's event sequence for better detection performance.
no code implementations • 8 Aug 2020 • Dongbo Xi, Bowen Song, Fuzhen Zhuang, Yongchun Zhu, Shuai Chen, Tianyi Zhang, Yuan Qi, Qing He
In this paper, we propose the Dual Importance-aware Factorization Machines (DIFM), which exploits the internal field information among users' behavior sequence from dual perspectives, i. e., field value variations and field interactions simultaneously for fraud detection.
no code implementations • 27 Feb 2020 • Wenjing Fang, Chaochao Chen, Bowen Song, Li Wang, Jun Zhou, Kenny Q. Zhu
Secure online transaction is an essential task for e-commerce platforms.
1 code implementation • 1 Oct 2019 • Bowen Song, Ari Trachtenberg
We consider the problem of reconciling similar, but remote, strings with minimum communication complexity.
Information Theory Information Theory