• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

检测数字市场中图形网络的异常情况。

Detecting anomalies in graph networks on digital markets.

作者信息

Skorupka Agata

机构信息

SGH Warsaw School of Economics, Warsaw, Poland.

出版信息

PLoS One. 2024 Dec 23;19(12):e0315849. doi: 10.1371/journal.pone.0315849. eCollection 2024.

DOI:10.1371/journal.pone.0315849
PMID:39715209
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11666048/
Abstract

The study examines different graph-based methods of detecting anomalous activities on digital markets, proposing the most efficient way to increase market actors' protection and reduce information asymmetry. Anomalies are defined below as both bots and fraudulent users (who can be both bots and real people). Methods are compared against each other, and state-of-the-art results from the literature and a new algorithm is proposed. The goal is to find an efficient method suitable for threat detection, both in terms of predictive performance and computational efficiency. It should scale well and remain robust on the advancements of the newest technologies. The article utilized three publicly accessible graph-based datasets: one describing the Twitter social network (TwiBot-20) and two describing Bitcoin cryptocurrency markets (Bitcoin OTC and Bitcoin Alpha). In the former, an anomaly is defined as a bot, as opposed to a human user, whereas in the latter, an anomaly is a user who conducted a fraudulent transaction, which may (but does not have to) imply being a bot. The study proves that graph-based data is a better-performing predictor than text data. It compares different graph algorithms to extract feature sets for anomaly detection models. It states that methods based on nodes' statistics result in better model performance than state-of-the-art graph embeddings. They also yield a significant improvement in computational efficiency. This often means reducing the time by hours or enabling modeling on significantly larger graphs (usually not feasible in the case of embeddings). On that basis, the article proposes its own graph-based statistics algorithm. Furthermore, using embeddings requires two engineering choices: the type of embedding and its dimension. The research examines whether there are types of graph embeddings and dimensions that perform significantly better than others. The solution turned out to be dataset-specific and needed to be tailored on a case-by-case basis, adding even more engineering overhead to using embeddings (building a leaderboard of grid of embedding instances, where each of them takes hours to be generated). This, again, speaks in favor of the proposed algorithm based on nodes' statistics. The research proposes its own efficient algorithm, which makes this engineering overhead redundant.

摘要

该研究考察了基于图的不同方法,用于检测数字市场上的异常活动,提出了提高市场参与者保护水平和减少信息不对称的最有效方法。异常情况在下文定义为机器人程序和欺诈用户(包括机器人程序和真实人类)。对各种方法进行了相互比较,并引用了文献中的最新成果,还提出了一种新算法。目标是找到一种在预测性能和计算效率方面都适合威胁检测的有效方法。它应具有良好的扩展性,并在最新技术发展的情况下保持稳健。本文使用了三个可公开获取的基于图的数据集:一个描述推特社交网络(TwiBot-20),另外两个描述比特币加密货币市场(比特币场外交易平台和比特币阿尔法平台)。在前者中,异常定义为机器人程序,与人类用户相对,而在后者中,异常是指进行了欺诈性交易的用户,这可能(但不一定)意味着是机器人程序。该研究证明基于图的数据是比文本数据性能更好的预测器。它比较了不同的图算法,以提取用于异常检测模型的特征集。研究表明,基于节点统计的方法比最新的图嵌入方法能产生更好的模型性能。它们在计算效率上也有显著提高。这通常意味着将时间缩短数小时,或者能够在大得多的图上进行建模(在嵌入方法的情况下通常不可行)。在此基础上,本文提出了自己基于图的统计算法。此外,使用嵌入需要两个工程选择:嵌入类型及其维度。该研究考察了是否存在比其他类型和维度表现显著更好的图嵌入类型。结果表明解决方案是特定于数据集的,需要逐案定制,这给使用嵌入方法增加了更多工程开销(构建嵌入实例网格的排行榜,其中每个实例的生成都需要数小时)。这再次表明了基于节点统计的所提出算法的优势。该研究提出了自己的高效算法,使这种工程开销变得多余。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/bc68130f73d6/pone.0315849.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/3493ba39deca/pone.0315849.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/b8d68479385b/pone.0315849.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/5b17568f7fd1/pone.0315849.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c0c0a7dac43d/pone.0315849.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/98ea9c50a1e5/pone.0315849.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4200782031fc/pone.0315849.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c0632ca852f3/pone.0315849.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/76e17ceaeaaf/pone.0315849.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c2bae688e7c5/pone.0315849.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4bce7bb17222/pone.0315849.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4744216a6aed/pone.0315849.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/02fe2821560d/pone.0315849.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/e1a437774e02/pone.0315849.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/bc68130f73d6/pone.0315849.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/3493ba39deca/pone.0315849.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/b8d68479385b/pone.0315849.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/5b17568f7fd1/pone.0315849.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c0c0a7dac43d/pone.0315849.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/98ea9c50a1e5/pone.0315849.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4200782031fc/pone.0315849.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c0632ca852f3/pone.0315849.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/76e17ceaeaaf/pone.0315849.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/c2bae688e7c5/pone.0315849.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4bce7bb17222/pone.0315849.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/4744216a6aed/pone.0315849.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/02fe2821560d/pone.0315849.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/e1a437774e02/pone.0315849.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0654/11666048/bc68130f73d6/pone.0315849.g014.jpg

相似文献

1
Detecting anomalies in graph networks on digital markets.检测数字市场中图形网络的异常情况。
PLoS One. 2024 Dec 23;19(12):e0315849. doi: 10.1371/journal.pone.0315849. eCollection 2024.
2
Survey on graph embeddings and their applications to machine learning problems on graphs.关于图嵌入及其在图上机器学习问题中的应用的综述。
PeerJ Comput Sci. 2021 Feb 4;7:e357. doi: 10.7717/peerj-cs.357. eCollection 2021.
3
Detecting bots in social-networks using node and structural embeddings.使用节点和结构嵌入技术在社交网络中检测机器人程序。
J Big Data. 2023;10(1):119. doi: 10.1186/s40537-023-00796-3. Epub 2023 Jul 19.
4
SFGAE: a self-feature-based graph autoencoder model for miRNA-disease associations prediction.SFGAE:一种基于自特征的图自动编码器模型,用于 miRNA-疾病关联预测。
Brief Bioinform. 2022 Sep 20;23(5). doi: 10.1093/bib/bbac340.
5
Anomalous Node Detection in Blockchain Networks Based on Graph Neural Networks.基于图神经网络的区块链网络异常节点检测
Sensors (Basel). 2024 Dec 24;25(1):1. doi: 10.3390/s25010001.
6
A graph neural architecture search approach for identifying bots in social media.一种用于识别社交媒体中机器人的图神经网络架构搜索方法。
Front Artif Intell. 2024 Dec 20;7:1509179. doi: 10.3389/frai.2024.1509179. eCollection 2024.
7
Bitcoin Money Laundering Detection via Subgraph Contrastive Learning.通过子图对比学习检测比特币洗钱行为。
Entropy (Basel). 2024 Feb 28;26(3):211. doi: 10.3390/e26030211.
8
Dispelling the Fake: Social Bot Detection Based on Edge Confidence Evaluation.揭穿虚假:基于边缘置信度评估的社交机器人检测
IEEE Trans Neural Netw Learn Syst. 2025 Apr;36(4):7302-7315. doi: 10.1109/TNNLS.2024.3396192. Epub 2025 Apr 4.
9
GAD-NR: Graph Anomaly Detection via Neighborhood Reconstruction.GAD-NR:通过邻域重构进行图异常检测
Proc Int Conf Web Search Data Min. 2024 Mar;2024:576-585. doi: 10.1145/3616855.3635767. Epub 2024 Mar 4.
10
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.

本文引用的文献

1
Detecting bots in social-networks using node and structural embeddings.使用节点和结构嵌入技术在社交网络中检测机器人程序。
J Big Data. 2023;10(1):119. doi: 10.1186/s40537-023-00796-3. Epub 2023 Jul 19.
2
Botometer 101: social bot practicum for computational social scientists.Botometer 101:面向计算社会科学家的社交机器人实践
J Comput Soc Sci. 2022;5(2):1511-1528. doi: 10.1007/s42001-022-00177-5. Epub 2022 Aug 20.
3
Manipulation of the Bitcoin market: an agent-based study.比特币市场操纵:基于主体的研究。
Financ Innov. 2022;8(1):60. doi: 10.1186/s40854-022-00364-3. Epub 2022 Jun 1.
4
Anomaly Detection on Attributed Networks via Contrastive Self-Supervised Learning.基于对比自监督学习的属性网络异常检测
IEEE Trans Neural Netw Learn Syst. 2022 Jun;33(6):2378-2392. doi: 10.1109/TNNLS.2021.3068344. Epub 2022 Jun 1.