Subtopic Deep Dive

Online Fraud Detection Techniques
Research Guide

What is Online Fraud Detection Techniques?

Online Fraud Detection Techniques encompass machine learning, graph neural networks, and anomaly detection methods to identify phishing, payment fraud, Ponzi schemes, and account takeovers in digital transactions.

Researchers apply GNNs for imbalanced fraud data (Liu et al., 2021, 345 citations) and frequent itemset mining for credit card patterns (Seeja and Zareapoor, 2014, 153 citations). Blockchain fraud detection targets Ponzi schemes (Chen et al., 2018, 391 citations) and cryptocurrency illicit activity (Foley et al., 2019, 837 citations). Over 2,500 papers exist on these techniques per OpenAlex data.

15
Curated Papers
3
Key Challenges

Why It Matters

Liu et al. (2021) GNN approach detects fraud in graph-structured data, reducing false negatives in e-commerce platforms handling billions of transactions daily. Thennakoon et al. (2019) real-time ML models cut credit card losses estimated at $76 billion annually from bitcoin-related crimes (Foley et al., 2019). Chen et al. (2018) methods protect Ethereum users from Ponzi schemes, safeguarding decentralized finance systems.

Key Research Challenges

Class Imbalance in Fraud Data

Fraud transactions are rare, causing GNN models to underperform on minorities (Liu et al., 2021). Standard classifiers favor majority legal patterns. Resampling techniques often degrade graph relations.

Adversarial Robustness Gaps

Fraudsters evade detection by mimicking legitimate behaviors, challenging anomaly models (Xu, 2016). Blockchain attacks persist despite consensus (Xu, 2016). Real-time adaptation lags behind evolving threats.

Scarce Labeled Datasets

Insider threat data is hard to obtain for training (Glasser and Lindauer, 2013). Synthetic generation bridges gaps but risks realism (Glasser and Lindauer, 2013). Credit card anonymity limits pattern mining (Seeja and Zareapoor, 2014).

Essential Papers

1.

Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed through Cryptocurrencies?

Sean Foley, Jonathan R. Karlsen, Tālis J. Putniņš · 2019 · Review of Financial Studies · 837 citations

Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users are involved in illegal activity. We estimate that around $\$$76 bil...

2.

Detecting Ponzi Schemes on Ethereum

Weili Chen, Zibin Zheng, Jiahui Cui et al. · 2018 · 391 citations

Blockchain technology becomes increasingly popular. It also attracts scams, for example, Ponzi scheme, a classic fraud, has been found making a notable amount of money on Blockchain, which has a ve...

3.

Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward

Sudeep Tanwar, Qasim Bhatia, Pruthvi P. Patel et al. · 2019 · IEEE Access · 352 citations

In recent years, the emergence of blockchain technology (BT) has become a unique, most disruptive, and trending technology. The decentralized database in BT emphasizes data security and privacy. Al...

4.

Pick and Choose: A GNN-based Imbalanced Learning Approach for Fraud Detection

Yang Liu, Xiang Ao, Zidi Qin et al. · 2021 · 345 citations

Graph-based fraud detection approaches have escalated lots of attention recently due to the abundant relational information of graph-structured data, which may be beneficial for the detection of fr...

5.

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data

Joshua Glasser, Brian Lindauer · 2013 · 300 citations

The threat of malicious insider activity continues to be of paramount concern in both the public and private sectors. Though there is great interest in advancing the state of the art in predicting ...

6.

Are blockchains immune to all malicious attacks?

Jennifer Xu · 2016 · Financial Innovation · 218 citations

Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because o...

7.

Real-time Credit Card Fraud Detection Using Machine Learning

Anuruddha Thennakoon, Chee Bhagyani, Sasitha Premadasa et al. · 2019 · 217 citations

Credit card fraud events take place frequently and then result in huge financial losses [1]. The number of online transactions has grown in large quantities and online credit card transactions hold...

Reading Guide

Foundational Papers

Start with Glasser and Lindauer (2013, 300 citations) for synthetic insider data generation methods, then Seeja and Zareapoor (2014, 153 citations) for FraudMiner itemset mining baselines.

Recent Advances

Study Liu et al. (2021, 345 citations) GNN imbalanced learning, Thennakoon et al. (2019, 217 citations) real-time credit fraud, Foley et al. (2019, 837 citations) crypto illicit quantification.

Core Methods

Core techniques: GNNs (Liu et al., 2021), frequent itemsets (Seeja, 2014), synthetic data (Glasser, 2013), real-time ML (Thennakoon, 2019), blockchain anomaly (Chen et al., 2018).

How PapersFlow Helps You Research Online Fraud Detection Techniques

Discover & Search

Research Agent uses searchPapers and citationGraph to map 837-citation Foley et al. (2019) bitcoin fraud hub to Chen et al. (2018) Ponzi detection, then findSimilarPapers for GNN extensions like Liu et al. (2021). exaSearch uncovers 2,500+ OpenAlex papers on 'GNN fraud detection Ethereum'.

Analyze & Verify

Analysis Agent runs readPaperContent on Liu et al. (2021) to extract GNN imbalance metrics, verifies via runPythonAnalysis recomputing AUROC on synthetic fraud graphs with pandas/NumPy, and applies GRADE grading for evidence strength in adversarial claims (Xu, 2016). CoVe chain-of-verification flags contradictions in bitcoin illicit estimates across Foley et al. (2019, 2018).

Synthesize & Write

Synthesis Agent detects gaps in real-time blockchain fraud post-Thennakoon et al. (2019), flags contradictions between Ponzi detectors (Chen et al., 2018). Writing Agent uses latexEditText for method sections, latexSyncCitations integrating Seeja (2014), and latexCompile for full reports; exportMermaid diagrams GNN fraud graphs from Liu et al. (2021).

Use Cases

"Reproduce GNN fraud AUROC from Liu et al. 2021 on imbalanced graphs"

Research Agent → searchPapers 'Liu 2021 GNN fraud' → Analysis Agent → readPaperContent + runPythonAnalysis (NumPy/pandas graph sim, matplotlib ROC) → researcher gets verified AUROC plot and code.

"Draft LaTeX review of credit card fraud ML vs blockchain Ponzi detection"

Synthesis Agent → gap detection (Thennakoon 2019, Chen 2018) → Writing Agent → latexEditText outline + latexSyncCitations (Foley, Seeja) + latexCompile → researcher gets compiled PDF with synced bibtex.

"Find GitHub repos implementing Seeja 2014 FraudMiner itemset mining"

Research Agent → searchPapers 'FraudMiner Seeja' → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect → researcher gets top 3 repos with code diffs and fraud dataset links.

Automated Workflows

Deep Research workflow scans 50+ papers from Foley et al. (2019) citationGraph → structured report on crypto fraud trends with GRADE scores. DeepScan 7-steps analyzes Liu et al. (2021) GNN: readPaperContent → runPythonAnalysis imbalance → CoVe verify. Theorizer generates hypotheses on adversarial GNN robustness from Xu (2016) + Glasser (2013) synthetic data.

Frequently Asked Questions

What defines online fraud detection techniques?

Methods using ML, GNNs, and anomaly detection to spot phishing, payment fraud, and Ponzi schemes in transactions (Liu et al., 2021; Chen et al., 2018).

What are key methods in this subtopic?

GNNs for graph fraud (Liu et al., 2021), frequent itemset mining (Seeja and Zareapoor, 2014), real-time ML classifiers (Thennakoon et al., 2019).

What are major papers?

Foley et al. (2019, 837 citations) on bitcoin crime; Chen et al. (2018, 391 citations) Ponzi detection; Liu et al. (2021, 345 citations) GNN imbalance.

What open problems exist?

Adversarial evasion (Xu, 2016), labeled data scarcity (Glasser and Lindauer, 2013), real-time blockchain robustness.

Research Cybercrime and Law Enforcement Studies with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Online Fraud Detection Techniques with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers