Combining Data Mining and Machine Learning for Effective Fraud Detection. Fawcett, T. & Provost, F. In AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, pages 14-19, 1997. AAAI Press. Website abstract bibtex This paper describes the automatic design of methods for detecting fraudulent behavior. Much of the design is accomplished using a series of machine learning methods. In particular, we combine data mining and constructive induction with more standard machine learning techniques to design methods for detecting fraudulent usage of cellular telephones based on profiling customer behavior. Specifically, we use a rule learning program to uncover indicators of fraudulent behavior from a large database of cellular calls. These indicators are used to create profilers, which then serve as features to a system that combines evidence from multiple profilers to generate high-confidence alarms. Experiments indicate that this automatic approach performs nearly as well as the best hand-tuned methods for detecting fraud.
@inProceedings{
title = {Combining Data Mining and Machine Learning for Effective Fraud Detection},
type = {inProceedings},
year = {1997},
keywords = {anomaly detection,data mining,fraud detection,machine learning},
pages = {14-19},
websites = {https://pdfs.semanticscholar.org/4f58/2a003bc01f6cffeb3b6efb6fbcf8a2389245.pdf,https://vvvvw.aaai.org/Papers/KDD/1996/KDD96-002.pdf},
publisher = {AAAI Press},
id = {c7533a91-6880-3ad7-99fd-28048e262604},
created = {2009-08-18T04:22:16.000Z},
file_attached = {false},
profile_id = {7edb4dd2-367e-3b20-8e26-a7e1d668fa33},
last_modified = {2017-10-14T18:03:58.963Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {FawcettProvost_workshop:1997},
source_type = {inproceedings},
private_publication = {false},
abstract = {This paper describes the automatic design of methods for detecting fraudulent behavior. Much of the design is accomplished using a series of machine learning methods. In particular, we combine data mining and constructive induction with more standard machine learning techniques to design methods for detecting fraudulent usage of cellular telephones based on profiling customer behavior. Specifically, we use a rule learning program to uncover indicators of fraudulent behavior from a large database of cellular calls. These indicators are used to create profilers, which then serve as features to a system that combines evidence from multiple profilers to generate high-confidence alarms. Experiments indicate that this automatic approach performs nearly as well as the best hand-tuned methods for detecting fraud.},
bibtype = {inProceedings},
author = {Fawcett, Tom and Provost, Foster},
booktitle = {AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management}
}
Downloads: 0
{"_id":"sSGP6bXaNwDNR3kLD","bibbaseid":"fawcett-provost-combiningdataminingandmachinelearningforeffectivefrauddetection-1997","downloads":0,"creationDate":"2016-03-15T04:09:55.088Z","title":"Combining Data Mining and Machine Learning for Effective Fraud Detection","author_short":["Fawcett, T.","Provost, F."],"year":1997,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"Combining Data Mining and Machine Learning for Effective Fraud Detection","type":"inProceedings","year":"1997","keywords":"anomaly detection,data mining,fraud detection,machine learning","pages":"14-19","websites":"https://pdfs.semanticscholar.org/4f58/2a003bc01f6cffeb3b6efb6fbcf8a2389245.pdf,https://vvvvw.aaai.org/Papers/KDD/1996/KDD96-002.pdf","publisher":"AAAI Press","id":"c7533a91-6880-3ad7-99fd-28048e262604","created":"2009-08-18T04:22:16.000Z","file_attached":false,"profile_id":"7edb4dd2-367e-3b20-8e26-a7e1d668fa33","last_modified":"2017-10-14T18:03:58.963Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"FawcettProvost_workshop:1997","source_type":"inproceedings","private_publication":false,"abstract":"This paper describes the automatic design of methods for detecting fraudulent behavior. Much of the design is accomplished using a series of machine learning methods. In particular, we combine data mining and constructive induction with more standard machine learning techniques to design methods for detecting fraudulent usage of cellular telephones based on profiling customer behavior. Specifically, we use a rule learning program to uncover indicators of fraudulent behavior from a large database of cellular calls. These indicators are used to create profilers, which then serve as features to a system that combines evidence from multiple profilers to generate high-confidence alarms. Experiments indicate that this automatic approach performs nearly as well as the best hand-tuned methods for detecting fraud.","bibtype":"inProceedings","author":"Fawcett, Tom and Provost, Foster","booktitle":"AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management","bibtex":"@inProceedings{\n title = {Combining Data Mining and Machine Learning for Effective Fraud Detection},\n type = {inProceedings},\n year = {1997},\n keywords = {anomaly detection,data mining,fraud detection,machine learning},\n pages = {14-19},\n websites = {https://pdfs.semanticscholar.org/4f58/2a003bc01f6cffeb3b6efb6fbcf8a2389245.pdf,https://vvvvw.aaai.org/Papers/KDD/1996/KDD96-002.pdf},\n publisher = {AAAI Press},\n id = {c7533a91-6880-3ad7-99fd-28048e262604},\n created = {2009-08-18T04:22:16.000Z},\n file_attached = {false},\n profile_id = {7edb4dd2-367e-3b20-8e26-a7e1d668fa33},\n last_modified = {2017-10-14T18:03:58.963Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {FawcettProvost_workshop:1997},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This paper describes the automatic design of methods for detecting fraudulent behavior. Much of the design is accomplished using a series of machine learning methods. In particular, we combine data mining and constructive induction with more standard machine learning techniques to design methods for detecting fraudulent usage of cellular telephones based on profiling customer behavior. Specifically, we use a rule learning program to uncover indicators of fraudulent behavior from a large database of cellular calls. These indicators are used to create profilers, which then serve as features to a system that combines evidence from multiple profilers to generate high-confidence alarms. Experiments indicate that this automatic approach performs nearly as well as the best hand-tuned methods for detecting fraud.},\n bibtype = {inProceedings},\n author = {Fawcett, Tom and Provost, Foster},\n booktitle = {AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management}\n}","author_short":["Fawcett, T.","Provost, F."],"urls":{"Website":"https://pdfs.semanticscholar.org/4f58/2a003bc01f6cffeb3b6efb6fbcf8a2389245.pdf,https://vvvvw.aaai.org/Papers/KDD/1996/KDD96-002.pdf"},"bibbaseid":"fawcett-provost-combiningdataminingandmachinelearningforeffectivefrauddetection-1997","role":"author","keyword":["anomaly detection","data mining","fraud detection","machine learning"],"downloads":0},"search_terms":["combining","data","mining","machine","learning","effective","fraud","detection","fawcett","provost"],"keywords":["anomaly detection","data mining","fraud detection","machine learning"],"authorIDs":["56e653e66ce2f4b112000039","56e78b13a1235cde52000005"]}