SAT-BO: Verification Rule Learning and Optimization for FraudTransaction Detection
- URL: http://arxiv.org/abs/2507.02635v1
- Date: Thu, 03 Jul 2025 14:01:26 GMT
- Title: SAT-BO: Verification Rule Learning and Optimization for FraudTransaction Detection
- Authors: Mao Luo, Zhi Wang, Yiwen Huang, Qingyun Zhang, Zhouxing Su, Zhipeng Lv, Wen Hu, Jianguo Li,
- Abstract summary: Even a minor error within this high-volume environment could precipitate substantial financiallosses.<n>To mitigate this risk, manually constructed verification rules are typically employed to identify andscrutinize transactions.<n>However, due to the absence of a systematic approach to ensure the robustness ofthese verification rules against vulnerabilities, they remain suscep-tible to exploitation.
- Score: 16.828436361894653
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Electronic payment platforms are estimated to process billions oftransactions daily, with the cumulative value of these transactionspotentially reaching into the trillions. Even a minor error within thishigh-volume environment could precipitate substantial financiallosses. To mitigate this risk, manually constructed verification rules,developed by domain experts, are typically employed to identifyand scrutinize transactions in production environments. However,due to the absence of a systematic approach to ensure the robust-ness of these verification rules against vulnerabilities, they remainsusceptible to exploitation.To mitigate this risk, manually constructed verification rules, de-veloped by domain experts, are typically employed to identify andscrutinize transactions in production environments. However, dueto the absence of a systematic approach to ensure the robustness ofthese verification rules against vulnerabilities, they remain suscep-tible to exploitation. To ensure data security, database maintainersusually compose complex verification rules to check whether aquery/update request is valid. However, the rules written by ex-perts are usually imperfect, and malicious requests may bypassthese rules. As a result, the demand for identifying the defects ofthe rules systematically emerges.
Related papers
- Credit Card Fraud Detection Using RoFormer Model With Relative Distance Rotating Encoding [0.0]
Fraud detection is one of the most important challenges that financial systems must address.<n>Relative Distance Rotating (ReDRE) enhances the characterization of time series data within the RoFormer model.
arXiv Detail & Related papers (2025-07-12T20:02:02Z) - On Continuous Monitoring of Risk Violations under Unknown Shift [46.65571623109494]
We propose a general framework for the real-time monitoring of risk violations in evolving data streams.<n>Our method operates under minimal assumptions on the nature of encountered shifts.<n>We illustrate the effectiveness of our approach by monitoring risks in outlier detection and set prediction under a variety of shifts.
arXiv Detail & Related papers (2025-06-19T15:52:24Z) - Robust ML Auditing using Prior Knowledge [3.513282443657269]
Audit manipulation occurs when a platform deliberately alters its answers to a regulator to pass an audit without modifying its answers to other users.<n>This paper introduces a novel approach to manipulation-proof auditing by taking into account the auditor's prior knowledge of the task solved by the platform.
arXiv Detail & Related papers (2025-05-07T20:46:48Z) - TrustLoRA: Low-Rank Adaptation for Failure Detection under Out-of-distribution Data [62.22804234013273]
We propose a simple failure detection framework to unify and facilitate classification with rejection under both covariate and semantic shifts.<n>Our key insight is that by separating and consolidating failure-specific reliability knowledge with low-rank adapters, we can enhance the failure detection ability effectively and flexibly.
arXiv Detail & Related papers (2025-04-20T09:20:55Z) - SConU: Selective Conformal Uncertainty in Large Language Models [59.25881667640868]
We propose a novel approach termed Selective Conformal Uncertainty (SConU)<n>We develop two conformal p-values that are instrumental in determining whether a given sample deviates from the uncertainty distribution of the calibration set at a specific manageable risk level.<n>Our approach not only facilitates rigorous management of miscoverage rates across both single-domain and interdisciplinary contexts, but also enhances the efficiency of predictions.
arXiv Detail & Related papers (2025-04-19T03:01:45Z) - Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions [51.43521977132062]
Money laundering is a financial crime that obscures the origin of illicit funds.<n>The proliferation of mobile payment platforms and smart IoT devices has significantly complicated anti-money laundering investigations.<n>This paper conducts a comprehensive review of deep learning solutions and the challenges associated with their use in AML.
arXiv Detail & Related papers (2025-03-13T05:19:44Z) - Towards Copyright Protection for Knowledge Bases of Retrieval-augmented Language Models via Reasoning [58.57194301645823]
Large language models (LLMs) are increasingly integrated into real-world personalized applications.<n>The valuable and often proprietary nature of the knowledge bases used in RAG introduces the risk of unauthorized usage by adversaries.<n>Existing methods that can be generalized as watermarking techniques to protect these knowledge bases typically involve poisoning or backdoor attacks.<n>We propose name for harmless' copyright protection of knowledge bases.
arXiv Detail & Related papers (2025-02-10T09:15:56Z) - RIFF: Inducing Rules for Fraud Detection from Decision Trees [5.640162873635426]
We propose RIFF, a rule induction algorithm that distills a low false positive rate rule set directly from decision trees.
Our experiments show that the induced rules are often able to maintain or improve performance of the original models for low FPR tasks.
arXiv Detail & Related papers (2024-08-23T11:14:20Z) - AGORA: Open More and Trust Less in Binary Verification Service [16.429846973928512]
We introduce a novel binary verification service, AGORA, scrupulously designed to overcome the challenge.
Certain tasks can be delegated to untrusted entities, while the corresponding validators are securely housed within the trusted computing base.
Through a novel blockchain-based bounty task manager, it also utilizes crowdsourcing to remove trust in theorem provers.
arXiv Detail & Related papers (2024-07-21T05:29:22Z) - Private Online Community Detection for Censored Block Models [60.039026645807326]
We study the private online change detection problem for dynamic communities, using a censored block model (CBM)
We propose an algorithm capable of identifying changes in the community structure, while maintaining user privacy.
arXiv Detail & Related papers (2024-05-09T12:35:57Z) - From Chaos to Clarity: Claim Normalization to Empower Fact-Checking [57.024192702939736]
Claim Normalization (aka ClaimNorm) aims to decompose complex and noisy social media posts into more straightforward and understandable forms.
We propose CACN, a pioneering approach that leverages chain-of-thought and claim check-worthiness estimation.
Our experiments demonstrate that CACN outperforms several baselines across various evaluation measures.
arXiv Detail & Related papers (2023-10-22T16:07:06Z) - Free Lunch for Generating Effective Outlier Supervision [46.37464572099351]
We propose an ultra-effective method to generate near-realistic outlier supervision.
Our proposed textttBayesAug significantly reduces the false positive rate over 12.50% compared with the previous schemes.
arXiv Detail & Related papers (2023-01-17T01:46:45Z) - Explainable Abuse Detection as Intent Classification and Slot Filling [66.80201541759409]
We introduce the concept of policy-aware abuse detection, abandoning the unrealistic expectation that systems can reliably learn which phenomena constitute abuse from inspecting the data alone.
We show how architectures for intent classification and slot filling can be used for abuse detection, while providing a rationale for model decisions.
arXiv Detail & Related papers (2022-10-06T03:33:30Z) - A Time-Frequency based Suspicious Activity Detection for Anti-Money
Laundering [0.0]
Money laundering is the crucial mechanism utilized by criminals to inject proceeds of crime to the financial system.
Most of the current systems in these institutions are rule-based and ineffective.
This article introduces a novel feature set based on time-frequency analysis, that makes use of 2-D representations of financial transactions.
arXiv Detail & Related papers (2020-11-17T08:01:50Z) - ARMS: Automated rules management system for fraud detection [1.7499351967216341]
We address online fraud detection, which consists of classifying incoming transactions as either legitimate or fraudulent in real-time.
Modern fraud detection systems consist of a machine learning model and rules defined by human experts.
We propose ARMS, an automated rules management system that evaluates the contribution of individual rules and optimize the set of active rules using search and a user-defined loss-function.
arXiv Detail & Related papers (2020-02-14T15:29:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.