Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2025, Vol. 59 Issue (10): 2164-2174    DOI: 10.3785/j.issn.1008-973X.2025.10.017
    
Dual-channel E-commerce fraud detection method integrating user behavior and review relationships
Lizhou FENG1(),Zhichun BAI1,Youwei WANG2,*()
1. School of Statistics, Tianjin University of Finance and Economics, Tianjin 300222, China
2. School of Information, Central University of Finance and Economics, Beijing 100081, China
Download: HTML     PDF(1252KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A dual-channel graph neural network method was proposed for user-level fraud detection tasks on E-commerce platforms to address the limitations of existing approaches that overemphasized global modeling of user behavior while insufficiently exploiting comment information. Multi-dimensional user behavior was modeled through the construction of two complementary graphs: an entity interaction graph and a comment semantic graph. The entity interaction graph was designed to capture global interaction patterns based on purchase and rating behaviors, while the comment semantic graph was built to model time-sensitive semantic relations between comments for characterizing fine-grained behavioral features. Parallel modeling of the dual graphs was performed using graph neural networks. Dynamic interaction optimization between dual-channel features was achieved through an attention mechanism, and higher-order node features containing multi-hop neighborhood information were generated. A comprehensive user-level behavior representation was produced by adaptively fusing different neighborhood ranges and feature spaces with a multi-head additive attention mechanism. Experimental evaluations were conducted on public datasets to validate the proposed method, and significant improvements were observed in multiple evaluation metrics compared to traditional approaches. Results show that the proposed method effectively enhances fraud detection performance at the user level.



Key wordsgraph neural networks      attention mechanism      fraud detection      user behavior      review relationships     
Received: 08 January 2025      Published: 27 October 2025
CLC:  TP 393  
Fund:  天津市教委科研计划项目(2023SK115).
Corresponding Authors: Youwei WANG     E-mail: flzvg@126.com;ywwang15@126.com
Cite this article:

Lizhou FENG,Zhichun BAI,Youwei WANG. Dual-channel E-commerce fraud detection method integrating user behavior and review relationships. Journal of ZheJiang University (Engineering Science), 2025, 59(10): 2164-2174.

URL:

https://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2025.10.017     OR     https://www.zjujournals.com/eng/Y2025/V59/I10/2164


融合用户行为与评论关系的双通道电商欺诈检测方法

现有方法偏重用户行为的全局建模,对评论信息挖掘不足,为此提出双通道图神经网络方法用于电商平台用户级欺诈检测任务. 通过实体交互图和评论语义图对用户的多维行为建模,实体交互图基于购买与评分行为捕捉整体交互模式,评论语义图利用时间敏感性建模评论之间的语义关联以刻画细粒度行为特性. 利用图神经网络对双图并行建模,通过注意力机制实现双通道特征的动态交互优化,生成包含多跳邻居信息的高阶节点特征. 通过多头加性注意力机制自适应融合不同邻域范围和特征空间,生成用户级的综合行为表示. 在公开数据集上的实验结果表明,所提方法在多个指标上显著优于传统方法,验证了方法在用户级欺诈检测中的有效性.


关键词: 图神经网络,  注意力机制,  欺诈检测,  用户行为,  评论关系 
Fig.1 Overall framework of dual-channel graph neural network method
数据集n
用户虚假用户评论虚假评论
Pet35 872637157 563713
Garden28 230903114 3541 080
Instrument17 81386687 6781 131
Yelp35 3781 102148 4453 328
Tab.1 Statistical details of datasets used in experiments
方法PetGardenInstrumentYelp
AUCRmF1AUCRmF1AUCRmF1AUCRmF1
GCN49.8950.0049.1249.7050.0048.4555.1151.4345.8852.3550.0049.10
GAT50.4850.3249.5349.0450.0048.7558.2952.7748.7551.7050.2149.29
GraghSAGE74.7150.0049.8973.1950.1349.4576.2255.4357.6867.4350.0049.29
GEM64.3659.1653.9454.3952.1151.7766.7263.2552.7964.8749.8949.09
GeniePath53.9950.0050.0355.7751.0248.9753.2150.0049.5851.2050.0049.79
FdGars63.9352.0050.1456.1251.3148.5852.5850.7847.8852.3751.3250.03
GraphConsis79.9374.8857.6874.5871.5954.2677.1172.2955.9869.1852.1049.28
PC-GNN67.8661.9051.4263.6659.0753.9063.6759.3450.0161.0854.7752.82
EC-GNN87.1479.0862.0588.0778.5267.0388.8981.0965.2186.7379.0354.26
Tab.2 Performance comparison of different fraud detection methods on experimental datasets %
消融模型PetGardenInstrumentYelp
AUCRmF1AUCRmF1AUCRmF1AUCRmF1
EC-NoERG84.6572.4259.3386.5276.7365.5684.5676.8660.8984.6976.6852.60
EC-NoCRG63.8957.2553.8956.2953.9453.4861.5560.7553.6270.1265.4052.19
EC-NoAtt84.8475.0959.0082.4472.5663.2182.4974.3258.4084.6776.7951.95
EC-Tfidf85.6372.8560.8678.3061.1360.7074.2369.0956.9570.4565.1352.19
EC-GNN87.1479.0862.0588.0778.5267.0388.8981.0965.2186.7379.0354.26
Tab.3 Comparison of model ablation experiment results based on experimental datasets %
Fig.2 Impact of entity interation graph hidden dimensions on performance of dual-channel graph neural network method
Fig.3 Impact of comment semantic graph hidden dimensions on performance of dual-channel graph neural network method
Fig.4 Impact of iterations on performance of dual-channel graph neural network method
Fig.5 Visualization of fraud nodes and their one-hop neighbors
Fig.6 Visualization of normal nodes and their one-hop neighbors
[1]   肖可砾, 熊辉 运用数据挖掘技术检测金融欺诈行为[J]. 金融电子化, 2010, (8): 89- 90
XIAO Keli, XIONG Hui Detecting financial fraud using data mining techniques[J]. Financial Computerizing, 2010, (8): 89- 90
[2]   SALEH M M A, ALADWAN M, ALSINGLAWI O, et al Predicting fraudulent financial statements using fraud detection models[J]. Academy of Strategic Management Journal, 2021, 20 (Suppl.3): 1- 17
[3]   王成, 王昌琪 一种面向网络支付反欺诈的自动化特征工程方法[J]. 计算机学报, 2020, 43 (10): 1983- 2001
WANG Cheng, WANG Changqi An automated feature engineering method for online payment fraud detection[J]. Chinese Journal of Computers, 2020, 43 (10): 1983- 2001
[4]   琚春华, 陈冠宇, 鲍福光 基于kNN-Smote-LSTM的消费金融风险检测模型: 以信用卡欺诈检测为例[J]. 系统科学与数学, 2021, 41 (2): 481- 498
JU Chunhua, CHEN Guanyu, BAO Fuguang KNN-smote-LSTM based consumer financial risk detection model: a case credit card fraud detection[J]. Journal of Systems Science and Mathematical Sciences, 2021, 41 (2): 481- 498
[5]   JAN C L Detection of financial statement fraud using deep learning for sustainable development of capital markets under information asymmetry[J]. Sustainability, 2021, 13 (17): 9879
doi: 10.3390/su13179879
[6]   ÇAKıR M Y, ŞIRIN Y Enhanced autoencoder-based fraud detection: a novel approach with noise factor encoding and SMOTE[J]. Knowledge and Information Systems, 2024, 66 (1): 635- 652
doi: 10.1007/s10115-023-02016-z
[7]   KIM H, LEE B S, SHIN W Y, et al Graph anomaly detection with graph neural networks: current status and challenges[J]. IEEE Access, 2022, 10: 111820- 111829
doi: 10.1109/ACCESS.2022.3211306
[8]   LI Q, HE Y, XU C, et al. Dual-augment graph neural network for fraud detection [C]// Proceedings of the 31st ACM International Conference on Information and Knowledge Management. Atlanta: ACM, 2022: 4188–4192.
[9]   MOTIE S, RAAHEMI B Financial fraud detection using graph neural networks: a systematic review[J]. Expert Systems with Applications, 2024, 240: 122156
doi: 10.1016/j.eswa.2023.122156
[10]   BAI S, ZHANG F, TORR P H S Hypergraph convolution and hypergraph attention[J]. Pattern Recognition, 2021, 110: 107637
doi: 10.1016/j.patcog.2020.107637
[11]   LIU X, SONG Y Graph convolutional networks with dual message passing for subgraph isomorphism counting and matching[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2022, 36 (7): 7594- 7602
doi: 10.1609/aaai.v36i7.20725
[12]   LI Y, TAM D S H, XIE S, et al. Temporal graph representation learning for detecting anomalies in E-payment systems [C]// Proceedings of the International Conference on Data Mining Workshops. Auckland: IEEE, 2021: 983–990.
[13]   HU H, ZHANG L, LI S, et al. Fraudulent user detection via behavior information aggregation network (BIAN) on large-scale financial social network [EB/OL]. (2023–03–26)[2025–01–06]. https://arxiv.org/pdf/2211.06315.
[14]   CHEN M, WEI Z, HUANG Z, et al. Simple and deep graph convolutional networks [C]// Proceedings of the International Conference on Machine Learning. Vienna: PMLR, 2020: 1725–1735.
[15]   XU K, LI C, TIAN Y, et al. Representation learning on graphs with jumping knowledge networks [C]// Porceedings of International Conference on Machine Learning. Stockholm: PMLR, 2018: 5453–5462.
[16]   RUSCH T K, CHAMBERLAIN B P, MAHONEY M W, et al. Gradient gating for deep multi-rate learning on graphs [EB/OL]. (2023–03–15)[2025–03–31]. https://arxiv.org/pdf/2210.00513.
[17]   YING C, CAI T, LUO S, et al. Do transformers really perform badly for graph representation? [C]// Proceedings of the Neural Information Processing Systems. [S.l.]: NeurIPS, 2021: 1–12.
[18]   ZHANG S, YIN H, CHEN T, et al. GCN-based user representation learning for unifying robust recommendation and fraudster detection [C]// Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. [S.l.]: ACM, 2020: 689–698.
[19]   HE R, MCAULEY J. Ups and Downs: modeling the visual evolution of fashion trends with one-class collaborative filtering [C]// Proceedings of the 25th International Conference on World Wide Web. Montréal: International World Wide Web Conferences Steering Committee, 2016: 507–517.
[20]   HUSSAIN N, MIRZA H T, ALI A, et al Spammer group detection and diversification of customers’ reviews[J]. PeerJ Computer Science, 2021, 7: e472
doi: 10.7717/peerj-cs.472
[21]   SONG J, QU X, HU Z, et al A subgraph-based knowledge reasoning method for collective fraud detection in E-commerce[J]. Neurocomputing, 2021, 461: 587- 597
doi: 10.1016/j.neucom.2021.03.134
[22]   KUMAR S, HOOI B, MAKHIJA D, et al. REV2: fraudulent user prediction in rating platforms [C]// Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. Marina Del Rey: ACM, 2018: 333–341.
[23]   KIPF T N, WELLING M. Semi-supervised classification with graph convolutional networks [EB/OL]. (2017–02–22)[2025–01–06]. https://arxiv.org/pdf/1609.02907.
[24]   VELICKOVIC P, CUCURULL G, CASANOVA A, et al. Graph attention networks [EB/OL]. (2018–02–04)[2025–01–06]. https://arxiv.org/pdf/1710.10903.
[25]   HAMILTON W L, YING R, LESKOVEC J. Inductive representation learning on large graphs [C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. Long Beach: ACM, 2017: 1025–1035.
[26]   LIU Z, CHEN C, YANG X, et al. Heterogeneous graph neural networks for malicious account detection [C]// Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Torino: ACM, 2018: 2077–2085.
[27]   LIU Z, CHEN C, LI L, et al GeniePath: graph neural networks with adaptive receptive paths[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2019, 33 (1): 4424- 4431
doi: 10.1609/aaai.v33i01.33014424
[28]   WANG J, WEN R, WU C, et al. FdGars: fraudster detection via graph convolutional networks in online app review system [C]// Proceedings of the Proceedings of The 2019 World Wide Web Conference. San Francisco: ACM, 2019: 310–316.
[29]   LIU Z, DOU Y, YU P S, et al. Alleviating the inconsistency problem of applying graph neural network to fraud detection [EB/OL]. (2020–07–02)[2025–01–06]. https://arxiv.org/pdf/2005.00625.
[1] Fujian WANG,Zetian ZHANG,Xiqun CHEN,Dianhai WANG. Usage prediction of shared bike based on multi-channel graph aggregation attention mechanism[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(9): 1986-1995.
[2] Xuejun ZHANG,Shubin LIANG,Wanrong BAI,Fenghe ZHANG,Haiyan HUANG,Meifeng GUO,Zhuo CHEN. Source code vulnerability detection method based on heterogeneous graph representation[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(8): 1644-1652.
[3] Yishan LIN,Jing ZUO,Shuhua LU. Multimodal sentiment analysis based on multi-head self-attention mechanism and MLP-Interactor[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(8): 1653-1661.
[4] Yahong ZHAI,Yaling CHEN,Longyan XU,Yu GONG. Improved YOLOv8s lightweight small target detection algorithm of UAV aerial image[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(8): 1708-1717.
[5] Jiarui FU,Zhaofei LI,Hao ZHOU,Wei HUANG. Camouflaged object detection based on Convnextv2 and texture-edge guidance[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(8): 1718-1726.
[6] Rongtai YANG,Yubin SHAO,Qingzhi DU. Structure-aware model for few-shot knowledge completion[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(7): 1394-1402.
[7] Shengju WANG,Zan ZHANG. Missing value imputation algorithm based on accelerated diffusion model[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(7): 1471-1480.
[8] Yongqing CAI,Cheng HAN,Wei QUAN,Wudi CHEN. Visual induced motion sickness estimation model based on attention mechanism[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(6): 1110-1118.
[9] Wenbo JU,Huajun DONG. Motherboard defect detection method based on context information fusion and dynamic sampling[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(6): 1159-1168.
[10] Xiangyu ZHOU,Yizhi LIU,Yijiang ZHAO,Zhuhua LIAO,Decheng ZHANG. Hierarchical spatial embedding BiGRU model for destination prediction[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(6): 1211-1218.
[11] Zongmin LI,Chang XU,Yun BAI,Shiyang XIAN,Guangcai RONG. Dual-neighborhood graph convolution method for point cloud understanding[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(5): 879-889.
[12] Hongwei LIU,Lei WANG,Yang LIU,Pengchao ZHANG,Shi QIAO. Short term load forecasting based on recombination quadratic decomposition and LSTNet-Atten[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(5): 1051-1062.
[13] Dengfeng LIU,Wenjing GUO,Shihai CHEN. Content-guided attention-based lane detection network[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(3): 451-459.
[14] Minghui YAO,Yueyan WANG,Qiliang WU,Yan NIU,Cong WANG. Siamese networks algorithm based on small human motion behavior recognition[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(3): 504-511.
[15] Xianglei YIN,Shaopeng QU,Yongfang XIE,Ni SU. Occluded bird nest detection based on asymptotic feature fusion and multi-scale dilated attention[J]. Journal of ZheJiang University (Engineering Science), 2025, 59(3): 535-545.