Detecting LLM-Generated Spam Reviews by Integrating Language Model Embeddings and Graph Neural Network
Pith reviewed 2026-05-18 10:38 UTC · model grok-4.3
The pith
FraudSquad detects LLM-generated spam reviews by combining language model embeddings with a gated graph transformer to capture semantic and behavioral signals.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that integrating pre-trained language model embeddings with a gated graph transformer in FraudSquad enables effective spam node classification by capturing both semantic content and behavioral connections in review graphs, without manual features or massive training resources, and yields up to 44.22 percent higher precision and 43.01 percent higher recall than state-of-the-art baselines on three LLM-generated spam datasets while remaining effective on human-written spam data.
What carries the argument
FraudSquad, the hybrid model that integrates text embeddings from a pre-trained language model with a gated graph transformer for spam node classification in review graphs.
If this is right
- FraudSquad outperforms state-of-the-art baselines by up to 44.22% in precision and 43.01% in recall on the three LLM-generated datasets.
- The model also produces promising results when tested on two separate human-written spam datasets.
- FraudSquad requires only a modest model size and minimal labeled training data for practical deployment.
- The new synthetic datasets demonstrate high persuasion and deceptive potential according to GPT-4.1 evaluations.
Where Pith is reading between the lines
- The graph component may allow the detector to identify coordinated spam campaigns even when individual reviews appear human-like.
- Similar embedding-plus-graph architectures could extend to detecting LLM-generated fake news or social media comments.
- If behavioral signals remain useful against machine-generated text, platforms might shift focus from pure linguistic analysis toward network patterns.
Load-bearing premise
The three synthetic datasets, built by guiding LLMs with product metadata and genuine reference reviews, accurately represent the deceptive and persuasive qualities of real-world LLM-generated spam that would appear on platforms.
What would settle it
Testing FraudSquad on a collection of actual LLM-generated spam reviews scraped from live e-commerce sites and verifying whether the reported precision and recall gains hold.
Figures
read the original abstract
The rise of large language models (LLMs) has enabled the generation of highly persuasive spam reviews that closely mimic human writing. These reviews pose significant challenges for existing detection systems and threaten the credibility of online platforms. In this work, we first create three realistic LLM-generated spam review datasets using three distinct LLMs, each guided by product metadata and genuine reference reviews. Evaluations by GPT-4.1 confirm the high persuasion and deceptive potential of these reviews. To address this threat, we propose FraudSquad, a hybrid detection model that integrates text embeddings from a pre-trained language model with a gated graph transformer for spam node classification. FraudSquad captures both semantic and behavioral signals without relying on manual feature engineering or massive training resources. Experiments show that FraudSquad outperforms state-of-the-art baselines by up to 44.22% in precision and 43.01% in recall on three LLM-generated datasets, while also achieving promising results on two human-written spam datasets. Furthermore, FraudSquad maintains a modest model size and requires minimal labeled training data, making it a practical solution for real-world applications. Our contributions include new synthetic datasets, a practical detection framework, and empirical evidence highlighting the urgency of adapting spam detection to the LLM era. Our code and datasets are available at: https://anonymous.4open.science/r/FraudSquad-5389/.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces three synthetic datasets of LLM-generated spam reviews created by prompting three different LLMs with product metadata and genuine reference reviews; these are validated for persuasiveness via GPT-4.1. It proposes FraudSquad, a hybrid architecture that fuses embeddings from a pre-trained language model with a gated graph transformer to perform node classification on a review graph, thereby capturing both semantic content and behavioral connectivity signals. Experiments report that FraudSquad outperforms existing baselines by up to 44.22% in precision and 43.01% in recall on the three synthetic datasets and yields promising results on two human-written spam datasets. The method is presented as practical due to its modest size and low labeled-data requirements. Code and datasets are released via an anonymous repository.
Significance. If the empirical claims are substantiated, the work is significant because it supplies the first publicly available synthetic benchmarks specifically targeting LLM-generated spam and demonstrates a lightweight, non-feature-engineered detector that jointly models textual semantics and review-graph structure. The open release of code and data supports reproducibility and future benchmarking in an area where realistic evaluation resources have been scarce. The results underscore the practical urgency of adapting spam-detection pipelines to generative models that can produce human-like deceptive text.
major comments (3)
- [§3] §3 (Dataset Construction): The generation procedure—guiding LLMs with product metadata plus genuine reference reviews—receives no ablation or control experiments that isolate generation-specific artifacts (e.g., consistent lexical or embedding biases traceable to the source LLMs) from deception-specific signals. Because the central performance claims rest on these datasets accurately proxying real-world LLM spam, the absence of such controls leaves open the possibility that reported gains exploit generation artifacts rather than genuine deceptive patterns.
- [§5] §5 (Experiments): The paper states improvements of up to 44.22% precision and 43.01% recall but provides neither statistical significance tests, standard deviations across multiple runs, nor detailed descriptions of baseline re-implementations and hyper-parameter choices. Without these, it is impossible to determine whether the gains are robust or partly attributable to implementation differences, undermining the load-bearing claim of consistent outperformance.
- [§4.2] §4.2 (Model Architecture): The gated graph transformer component is described at a high level, yet the precise definition of the review graph—node features, edge construction criteria, and connectivity rules—is not specified. This detail is essential for verifying that behavioral signals are genuinely captured rather than being an artifact of how the synthetic data were assembled.
minor comments (2)
- [Abstract] The abstract and introduction could more explicitly list the three LLMs used for dataset generation and the two human-written spam datasets referenced in the results.
- [Figures/Tables] Figure captions and table headers would benefit from additional detail on the exact metrics and dataset splits being reported.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback, which has helped us identify areas for improvement in the manuscript. We address each major comment below and commit to substantial revisions that will strengthen the empirical rigor, clarity, and reproducibility of the work while preserving its core contributions.
read point-by-point responses
-
Referee: [§3] §3 (Dataset Construction): The generation procedure—guiding LLMs with product metadata plus genuine reference reviews—receives no ablation or control experiments that isolate generation-specific artifacts (e.g., consistent lexical or embedding biases traceable to the source LLMs) from deception-specific signals. Because the central performance claims rest on these datasets accurately proxying real-world LLM spam, the absence of such controls leaves open the possibility that reported gains exploit generation artifacts rather than genuine deceptive patterns.
Authors: We acknowledge the validity of this concern. Although the datasets were constructed to simulate realistic LLM-generated spam and validated for persuasiveness by GPT-4.1, and although consistent gains across three distinct source LLMs provide some indirect evidence against pure artifact exploitation, we agree that explicit controls are needed. In the revised manuscript we will add ablation studies that (i) compare performance on reference-guided vs. metadata-only generations, (ii) quantify lexical and embedding biases across the three LLMs, and (iii) evaluate FraudSquad on a held-out set of human-written deceptive reviews to further separate generation artifacts from deception signals. revision: yes
-
Referee: [§5] §5 (Experiments): The paper states improvements of up to 44.22% precision and 43.01% recall but provides neither statistical significance tests, standard deviations across multiple runs, nor detailed descriptions of baseline re-implementations and hyper-parameter choices. Without these, it is impossible to determine whether the gains are robust or partly attributable to implementation differences, undermining the load-bearing claim of consistent outperformance.
Authors: We fully agree that statistical rigor and implementation transparency are required to substantiate the performance claims. In the revised version we will (i) report mean and standard deviation over at least five independent runs with different random seeds, (ii) include paired statistical significance tests (e.g., McNemar or t-tests) against each baseline, and (iii) provide an expanded appendix detailing baseline re-implementations, hyper-parameter search ranges, and the exact training/validation splits used for all experiments. revision: yes
-
Referee: [§4.2] §4.2 (Model Architecture): The gated graph transformer component is described at a high level, yet the precise definition of the review graph—node features, edge construction criteria, and connectivity rules—is not specified. This detail is essential for verifying that behavioral signals are genuinely captured rather than being an artifact of how the synthetic data were assembled.
Authors: We appreciate this request for greater precision. In the revised Section 4.2 we will explicitly define: node features as the concatenation of the pre-trained language-model embedding with reviewer and product metadata; edges as undirected connections between reviews that share the same product or exhibit cosine similarity above a tunable threshold on their embeddings; and the connectivity rules that govern graph construction from the raw review metadata. These additions will clarify how behavioral signals are extracted independently of the synthetic generation process. revision: yes
Circularity Check
No circularity: empirical evaluation with independent metrics and baselines
full rationale
The paper creates synthetic LLM-generated spam datasets via metadata and reference reviews, proposes FraudSquad as a hybrid LM-embedding + gated graph transformer model, and reports empirical precision/recall gains against external baselines on both synthetic and human-written datasets. No derivation chain, equations, or first-principles results exist that could reduce to inputs by construction. No self-citations, fitted parameters renamed as predictions, or ansatz smuggling appear in the abstract or described contributions. The central claims rest on reported performance numbers and code/dataset release, which are externally verifiable and do not rely on self-referential definitions.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Graph constructed from reviews encodes behavioral signals relevant to spam detection
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
FraudSquad integrates text embeddings from a pre-trained language model with a gated graph transformer for spam node classification... review graph built from same-user, same-product-same-star, same-product-same-month edges
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
LM-enhanced node embeddings... H_i = X_i + PReLU(...) and gated graph transformer layers with attention coefficients α^s_ij
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Forward citations
Cited by 1 Pith paper
-
JARVIS: An Evidence-Grounded Retrieval System for Interpretable Deceptive Reviews Adjudication
JARVIS combines hybrid retrieval and evidence graphs with LLMs to raise deceptive-review detection precision from 0.953 to 0.988 and recall from 0.830 to 0.901 on a custom dataset while cutting manual inspection time ...
Reference graph
Works this paper leans on
-
[1]
Giuseppina Andresini, Andrea Iovine, Roberto Gasbarro, Marco Lomolino, Marco Degemmis, and Annalisa Appice. 2022. Review Spam Detection using Multi-View Deep Learning Combining Content and Behavioral Features. InThe 1st Italian Conference on Big Data and Data Science (itaDATA)
work page 2022
-
[2]
Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Chris- tos Faloutsos. 2013. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior In Social Networks. InProceedings of the 22nd International Conference on World Wide Web. 119–130
work page 2013
-
[3]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. InPro- ceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 477–488
work page 2014
-
[4]
2024.The Economic Toll of Fake Reviews: Market Data and Pre- vention Strategies
Max Chekalov. 2024.The Economic Toll of Fake Reviews: Market Data and Pre- vention Strategies. https://www.99firms.com/blog/the-economic-toll-of-fake- reviews/?utm_source=chatgpt.com
work page 2024
-
[5]
DeepSeek-AI, Daya Guo, Dejian Yang, Haowei Zhang, Junxiao Song, Ruoyu Zhang, Runxin Xu, Qihao Zhu, Shirong Ma, Peiyi Wang, Xiao Bi, Xiaokang Zhang, Xingkai Yu, Yu Wu, Z. F. Wu, Zhibin Gou, Zhihong Shao, Zhuoshu Li, Ziyi Gao, Aixin Liu, Bing Xue, Bingxuan Wang, Bochao Wu, Bei Feng, Chengda Lu, Chenggang Zhao, Chengqi Deng, Chenyu Zhang, Chong Ruan, Damai D...
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[6]
Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies
work page 2019
-
[7]
Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters.Proceedings of the 29th ACM International Conference on Information & Knowledge Management(2020)
work page 2020
-
[8]
Mingjiang Duan, Tongya Zheng, Yang Gao, Gang Wang, Zunlei Feng, and Xinyu Wang. 2024. DGA-GNN: Dynamic Grouping Aggregation GNN for Fraud Detec- tion. InProceedings of the AAAI Conference on Artificial Intelligence. 11820–11828
work page 2024
-
[9]
Nyamawe, Jude Tchaye-Kondi, and Abdulganiyu Abdu Yusuf
Ramadhani Ally Duma, Zhendong Niu, Ally S. Nyamawe, Jude Tchaye-Kondi, and Abdulganiyu Abdu Yusuf. 2023. A Deep Hybrid Model for fake review detection by jointly leveraging review text, overall ratings, and aspect ratings. Soft Computing27 (2023), 6281–6296
work page 2023
- [10]
-
[11]
Shangbin Feng, Herun Wan, Ningnan Wang, Zhaoxuan Tan, Minnan Luo, and Yulia Tsvetkov. 2024. What does the bot say? Opportunitiesm and risks of large language models in social media bot detection. InProceedings of the 62nd Annual Meeting of the Association for Computational Linguistics. 3580–3601
work page 2024
-
[12]
Aaron Grattafiori, Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Ab- hishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Alex Vaughan, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava...
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[13]
Jiawei Gu, Xuhui Jiang, Zhichao Shi, Hexiang Tan, Xuehao Zhai, Chengjin Xu, Wei Li, Yinghan Shen, Shengjie Ma, Honghao Liu, et al . 2024. A survey on llm-as-a-judge.arXiv preprint arXiv:2411.15594(2024)
work page internal anchor Pith review Pith/arXiv arXiv 2024
-
[14]
Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. InAdvances in Neural Information Processing Systems. 1024–1034
work page 2017
-
[15]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. arXiv:1502.01852 [cs.CV] https://arxiv.org/abs/1502.01852
work page internal anchor Pith review Pith/arXiv arXiv 2015
-
[16]
Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. InProceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 895–904
work page 2016
-
[17]
Yupeng Hou, Jiacheng Li, Zhankui He, An Yan, Xiusi Chen, and Julian McAuley
-
[18]
Bridging Language and Items for Retrieval and Recommendation.arXiv preprint arXiv:2403.03952(2024)
work page internal anchor Pith review Pith/arXiv arXiv 2024
-
[19]
Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. InProceedings of the 2008 International Conference on Web Search and Data Mining. 219–230
work page 2008
-
[20]
Adam: A Method for Stochastic Optimization
Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Opti- mization.arXiv preprint arXiv:1412.6980(2014). https://arxiv.org/abs/1412.6980
work page internal anchor Pith review Pith/arXiv arXiv 2014
-
[21]
Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. InProceedings of the International Conference on Learning Representations
work page 2017
-
[22]
Fangtao Li, Minlie Huang, Yi Yang, and Xiaoyan Zhu. 2011. Learning to identify review spam. InProceedings of the Twenty-Second International Joint Conference on Artificial Intelligence - Volume Volume Three(Barcelona, Catalonia, Spain) (IJCAI’11). AAAI Press, 2488–2493
work page 2011
-
[23]
Fei Li, Minlie Huang, Yi Yang, and Xiaoyan Zhu. 2014. Towards a holistic approach to detect spam reviews in online review platforms.Proceedings of the 23rd International Conference on World Wide Web(2014), 459–470
work page 2014
- [24]
-
[25]
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Liu, and Hady Wirawan Lauw
-
[26]
Detecting product review spammers using rating behaviors. InProceedings of the 19th ACM International Conference on Information and Knowledge Manage- ment(Toronto, ON, Canada)(CIKM ’10). Association for Computing Machinery, New York, NY, USA, 939–948. https://doi.org/10.1145/1871437.1871557
-
[27]
Aiwei Liu, Qiang Sheng, and Xuming Hu. 2024. Preventing and Detecting Mis- information Generated by Large Language Models. InProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval. 3001–3004
work page 2024
-
[28]
Yang Liu, Xiang Ao, Zidi Qin, Jianfeng Chi, Jinghua Feng, Hao Yang, and Qing He. 2021. Pick and Choose: A GNN-based Imbalanced Learning Approach for Fraud Detection. InProceedings of the Web Conference 2021. 3168–3177
work page 2021
-
[29]
Yuli Liu, Yiqun Liu, Ke Zhou, Min Zhang, and Shaoping Ma. 2017. Detecting Col- lusive Spamming Activities in Community Question Answering. InProceedings of the 26th International Conference on World Wide Web. 1073–1082
work page 2017
-
[30]
Niklas Muennighoff, Nouamane Tazi, Loïc Magne, and Nils Reimers. 2022. MTEB: Massive Text Embedding Benchmark.arXiv preprint arXiv:2210.07316(2022). https://arxiv.org/abs/2210.07316
work page internal anchor Pith review Pith/arXiv arXiv 2022
-
[31]
OpenAI. 2023. GPT-4 Technical Report.OpenAI Report(2023). https://cdn.openai. com/papers/gpt-4.pdf
work page 2023
-
[32]
OpenAI. 2025. Introducing GPT-4.1 in the API. https://openai.com/index/gpt-4-1/. Accessed: 2025-05-22
work page 2025
-
[33]
Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T Hancock. 2011. Finding de- ceptive opinion spam by any stretch of the imagination. InProceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. 309–319
work page 2011
- [34]
-
[35]
Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. 2002. Bleu: a Method for Automatic Evaluation of Machine Translation. InProceedings of the 40th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, Philadelphia, Pennsylvania, USA, 311–318. https: //doi.org/10.3115/1073083.1073135
-
[36]
Shebuti Rayana and Leman Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and metadata. InProceeding of the 21st ACM SIGKDD international conference on Knowledge discovery and data mining
work page 2015
-
[37]
Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. InProceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 985–994
work page 2015
-
[38]
Yunsheng Shi, Zhengjie Huang, Shikun Feng, Hui Zhong, Wenjing Wang, and Yu Sun. 2021. Masked Label Prediction: Unified Message Passing Model for Semi- Supervised Classification. InProceedings of the 30th International Joint Conference on Artificial Intelligence
work page 2021
-
[39]
Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, and Tong Zhang. 2015. Crowd fraud de- tection in internet advertising. InProceedings of the 24th International Conference on World Wide Web. 1100–1110
work page 2015
-
[40]
Hugo Touvron, Thibaut Lavril, Gautier Izacard, Xavier Martinet, Marie-Anne Lachaux, Timothée Lacroix, Baptiste Rozière, Naman Goyal, Eric Hambro, Faisal Azhar, et al. 2023. Llama: Open and efficient foundation language models.arXiv preprint arXiv:2302.13971(2023)
work page internal anchor Pith review Pith/arXiv arXiv 2023
-
[41]
Hugo Touvron, Louis Martin, Kevin Stone, Peter Albert, Amjad Almahairi, Yas- mine Babaei, Nikolay Bashlykov, Soumya Batra, Prajjwal Bhargava, Shruti Bhos- ale, Dan Bikel, Lukas Blecher, Cristian Canton Ferrer, Moya Chen, Guillem Cucu- rull, David Esiobu, Jude Fernandes, Jeremy Fu, Wenyin Fu, Brian Fuller, Cynthia Gao, Vedanuj Goswami, Naman Goyal, Anthony...
work page internal anchor Pith review Pith/arXiv arXiv 2023
-
[42]
Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio. 2018. Graph Attention Networks. InProceedings of the Sixth International Conference on Learning Representations
work page 2018
-
[43]
Jian Wang, Shuhua Feng, Bing Liu, and Yuming Li. 2017. Using a hybrid content- based and behavior-based featuring approach in fake review detection. InPro- ceedings of the 2017 International Conference on Information Systems. 849–861
work page 2017
-
[44]
Minjie Wang, Da Zheng, Zihao Ye, Quan Gan, Mufei Li, Xiang Song, Jinjing Zhou, Chao Ma, Lingfan Yu, Yu Gai, Tianjun Xiao, Tong He, George Karypis, Jinyang Li, and Zheng Zhang. 2020. Deep Graph Library: A Graph-Centric, Detecting LLM-Generated Spam Reviews by Integrating Language Model Embeddings and Graph Neural Network Conference’17, July 2017, Washingto...
-
[45]
Jiaying Wu, Jiafeng Guo, and Bryan Hooi. 2024. Fake News in Sheep’s Clothing: Robust Fake News Detection Against LLM-Empowered Style Attacks. InPro- ceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 3367–3378
work page 2024
-
[46]
Jiaying Wu and Bryan Hooi. 2023. DECOR: Degree-Corrected Social Graph Refinement for Fake News Detection. InProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 2582–2593
work page 2023
-
[47]
Sheng Xiang, Mingzhi Zhu, Dawei Cheng, Enxia Li, Ruihui Zhao, Yi Ouyang, Ling Chen, and Yefeng Zheng. 2023. Semi-Supervised Credit Card Fraud Detection via Attribute-Driven Graph Representation. InProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence. Article 1633, 9 pages
work page 2023
- [48]
- [49]
-
[50]
An Yang, Baosong Yang, Binyuan Hui, Bo Zheng, Bowen Yu, Chang Zhou, Cheng- peng Li, Chengyuan Li, Dayiheng Liu, Fei Huang, Guanting Dong, Haoran Wei, Huan Lin, Jialong Tang, Jialin Wang, Jian Yang, Jianhong Tu, Jianwei Zhang, Jianxin Ma, Jin Xu, Jingren Zhou, Jinze Bai, Jinzheng He, Junyang Lin, Kai Dang, Keming Lu, Keqin Chen, Kexin Yang, Mei Li, Mingfen...
work page internal anchor Pith review Pith/arXiv arXiv 2024
-
[51]
Hang Yu, Zhengyang Liu, and Xiangfeng Luo. 2024. Barely Supervised Learning for Graph-Based Fraud Detection.Proceedings of the AAAI Conference on Artificial Intelligence(Mar. 2024), 16548–16557
work page 2024
-
[52]
Rowan Zellers, Ari Holtzman, Yonatan Bisk, Ali Farhadi, and Yejin Choi. 2019. Defending against neural fake news. InProceedings of the 33rd International Conference on Neural Information Processing Systems, Vol. 32. Article 812
work page 2019
-
[53]
Yufan Zeng and Jiashan Tang. 2021. RLC-GNN: An Improved Deep Architecture for Spatial-Based Graph Neural Network with Application to Fraud Detection. Applied Sciences11, 12 (2021), 5656
work page 2021
- [54]
-
[55]
Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. InProceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 689–698
work page 2020
-
[56]
Yu Zhang, Pang-Ning Tan, and Ying Ding. 2020. Fraud review detection using graph convolutional networks. InProceedings of the 29th ACM International Conference on Information and Knowledge Management. ACM, 2773–2781
work page 2020
-
[57]
Wayne Xin Zhao, Kun Zhou, Junyi Li, Tianyi Tang, Xiaolei Wang, Yupeng Hou, Yingqian Min, Beichen Zhang, Junjie Zhang, Zican Dong, et al. 2023. A survey of large language models.arXiv preprint arXiv:2303.182231, 2 (2023)
work page internal anchor Pith review Pith/arXiv arXiv 2023
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.