{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:GM5QXSWPHPHS6RGQTNXLH2GY2X","short_pith_number":"pith:GM5QXSWP","schema_version":"1.0","canonical_sha256":"333b0bcacf3bcf2f44d09b6eb3e8d8d5ebc3feb84ac34ba8d253f9bf9c9f8e13","source":{"kind":"arxiv","id":"1705.02505","version":2},"attestation_state":"computed","paper":{"title":"HoloScope: Topology-and-Spike Aware Fraud Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SI","authors_text":"Bryan Hooi, Christos Faloutsos, Shenghua Liu","submitted_at":"2017-05-06T16:50:28Z","abstract_excerpt":"As online fraudsters invest more resources, including purchasing large pools of fake user accounts and dedicated IPs, fraudulent attacks become less obvious and their detection becomes increasingly challenging. Existing approaches such as average degree maximization suffer from the bias of including more nodes than necessary, resulting in lower accuracy and increased need for manual verification. Hence, we propose HoloScope, which uses information from graph topology and temporal spikes to more accurately detect groups of fraudulent users. In terms of graph topology, we introduce \"contrast sus"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1705.02505","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2017-05-06T16:50:28Z","cross_cats_sorted":[],"title_canon_sha256":"d704e45bd943cc606b44cf2fa9b69b396e0eb62bc26ad1f8d8ddccb5465ba126","abstract_canon_sha256":"3d56540ef1778bdcec3398badb35f546b683440807c596a122c9d9d8642fe6f4"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:43:43.103126Z","signature_b64":"d3SM4H7WMF0ba9bkO5E/ulYkAHau2zfb6yieWHSKGj8YiZpNjvPJL4yG/bnSR0HUVrfh3HWsFyp9IW7Z/ESwDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"333b0bcacf3bcf2f44d09b6eb3e8d8d5ebc3feb84ac34ba8d253f9bf9c9f8e13","last_reissued_at":"2026-05-18T00:43:43.102732Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:43:43.102732Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"HoloScope: Topology-and-Spike Aware Fraud Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SI","authors_text":"Bryan Hooi, Christos Faloutsos, Shenghua Liu","submitted_at":"2017-05-06T16:50:28Z","abstract_excerpt":"As online fraudsters invest more resources, including purchasing large pools of fake user accounts and dedicated IPs, fraudulent attacks become less obvious and their detection becomes increasingly challenging. Existing approaches such as average degree maximization suffer from the bias of including more nodes than necessary, resulting in lower accuracy and increased need for manual verification. Hence, we propose HoloScope, which uses information from graph topology and temporal spikes to more accurately detect groups of fraudulent users. In terms of graph topology, we introduce \"contrast sus"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.02505","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1705.02505","created_at":"2026-05-18T00:43:43.102789+00:00"},{"alias_kind":"arxiv_version","alias_value":"1705.02505v2","created_at":"2026-05-18T00:43:43.102789+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.02505","created_at":"2026-05-18T00:43:43.102789+00:00"},{"alias_kind":"pith_short_12","alias_value":"GM5QXSWPHPHS","created_at":"2026-05-18T12:31:18.294218+00:00"},{"alias_kind":"pith_short_16","alias_value":"GM5QXSWPHPHS6RGQ","created_at":"2026-05-18T12:31:18.294218+00:00"},{"alias_kind":"pith_short_8","alias_value":"GM5QXSWP","created_at":"2026-05-18T12:31:18.294218+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X","json":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X.json","graph_json":"https://pith.science/api/pith-number/GM5QXSWPHPHS6RGQTNXLH2GY2X/graph.json","events_json":"https://pith.science/api/pith-number/GM5QXSWPHPHS6RGQTNXLH2GY2X/events.json","paper":"https://pith.science/paper/GM5QXSWP"},"agent_actions":{"view_html":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X","download_json":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X.json","view_paper":"https://pith.science/paper/GM5QXSWP","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1705.02505&json=true","fetch_graph":"https://pith.science/api/pith-number/GM5QXSWPHPHS6RGQTNXLH2GY2X/graph.json","fetch_events":"https://pith.science/api/pith-number/GM5QXSWPHPHS6RGQTNXLH2GY2X/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X/action/timestamp_anchor","attest_storage":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X/action/storage_attestation","attest_author":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X/action/author_attestation","sign_citation":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X/action/citation_signature","submit_replication":"https://pith.science/pith/GM5QXSWPHPHS6RGQTNXLH2GY2X/action/replication_record"}},"created_at":"2026-05-18T00:43:43.102789+00:00","updated_at":"2026-05-18T00:43:43.102789+00:00"}