# Fraud/Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures

@inproceedings{Ezawa1995FraudUncollectibleDD, title={Fraud/Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures}, author={Kazuo J. Ezawa and Til Schuermann}, booktitle={UAI}, year={1995} }

The fraud/uncollectible debt problem in the telecommunications industry presents two technical challenges: the detection and the treatment of the account given the detection. In this paper, we focus on the first problem of detection using Bayesian network models, and we briefly discuss the application of a normative expert system for the treatment at the end. We apply Bayesian network models to the problem of fraud/uncollectible debt detection for telecommunication services. In addition to… Expand

#### 62 Citations

Knowledge Discovery in Telecommunication Services Data Using Bayesian Network Models

- Computer Science
- KDD
- 1995

This paper addresses the discovery of predictive knowledge bearing on fraud and uncollectible debt using a supervised machine learning method that constructs Bayesian network models and is able to predict rare event outcomes and cope with the quirks and copious amounts of input data. Expand

Bagging k-dependence probabilistic networks: An alternative powerful fraud detection tool

- Computer Science
- Expert Syst. Appl.
- 2012

This paper aims to present a pioneer study of the performance of the discrete and continuous k-dependence probabilistic networks within the context of bagging predictors classification and discovered that the probabilism networks are a strong modeling option with high predictive capacity and with a high increment using the bagging procedure when compared to traditional techniques. Expand

Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management

- Computer Science
- ICML
- 1996

It is argued and demonstrated that current Bayesian network learning methods may fail to perform satisfactorily in real life applications since they do not learn models tailored to a specific goal or purpose. Expand

Probabilistic Approaches to Fraud Detection

- Computer Science
- 1999

The problem of fraud detection is treated as a pattern recognition problem and models of both fraudulent behavior and normal behavior may be formulated and usage profiles may be used to detect abrupt changes in calling behavior. Expand

Data-driven fraud detection in international shipping

- Computer Science
- Expert Syst. Appl.
- 2018

A Bayesian network is developed that predicts the presence of goods on the cargo list of shipments and is compared with the accompanying documentation of a shipment to determine whether document fraud is perpetrated. Expand

A Bayesian Network Based Learning System: Architecture and Performance Comparison with Other Models

- Computer Science
- ECSQARU
- 1995

It is shown here that APRI does as well and in some cases better then these other methods with less demanding problems where other methods such as discriminant analysis and classification trees have difficulty in doing the task. Expand

Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts

- Computer Science
- IEEE Expert
- 1996

Software that builds Bayesian network models for predicting whether a customer account or transaction is collectible and how varying model parameters and hence model structure can affect predictive accuracy are described. Expand

Learning Influence Diagram from Data

- 2021

There are many cases where decisions are made (and actions are taken) repeatedly under uncertainty, and consequences (results) of those decisions are available. For example, in telecommunications… Expand

{36 () Bayesian Network Classiiers. *

- 1997

Recent work in supervised learning has shown that a surprisingly simple Bayesian classiier with strong assumptions of independence among features, called naive Bayes, is competitive with… Expand

Design of Evolutionary Methods Applied to the Learning of Bayesian Network Structures

- Computer Science
- 2010

In the case of the automatic determination of the appropriate graphical structure of a BN, it was shown that the search space is huge and that is a NP-hard problem for a scoring approach. Expand

#### References

SHOWING 1-10 OF 37 REFERENCES

A Bayesian Network Based Learning System: Architecture and Performance Comparison with Other Models

- Computer Science
- ECSQARU
- 1995

It is shown here that APRI does as well and in some cases better then these other methods with less demanding problems where other methods such as discriminant analysis and classification trees have difficulty in doing the task. Expand

An Entropy-driven System for Construction of Probabilistic Expert Systems from Databases

- Computer Science
- UAI
- 1990

Kutato is a system that takes as input a database of cases and produces a belief network that captures many of the dependence relations represented by those data and consistently reproduces the original belief networks with high fidelity. Expand

Discrimillant Analysis with Discrete and Continuous Variables

- Mathematics
- 1982

A paradigmatic methodologic approach does not exist for the problem of discriminant analysis with both discrete and continuous explanatory variables. Procedures that have been employed in this… Expand

Probabilistic similarity networks

- Computer Science, Mathematics
- Networks
- 1990

This research suggests strongly that, by identifying specific forms of conditional independence, and by developing representations that exploit these forms of independence for knowledge acquisition, knowledge engineers can construct normative expert systems for domains of larger scope and greater complexity than the domains previously through to be amenable to the decision-theoretic approach. Expand

Value of Evidence on Influence Diagrams

- Computer Science
- UAI
- 1994

This paper introduces evidence propagation operations on influence diagrams and a concept of value of evidence, which measures the value of experimentation, which allows us to compute directly an outcome sensitivity, avalue of perfect information and a value of control which are used in decision analysis. Expand

Learning Bayesian Networks Using Feature Selection

- Computer Science
- AISTATS
- 1995

The new approach selects a subset of features that maximizes predictive accuracy prior to the network learning phase, and generates networks that are computationally simpler to evaluate and display predictive accuracy comparable to that of Bayesian networks which model all attributes. Expand

Induction of Selective Bayesian Classifiers

- Computer Science, Mathematics
- UAI
- 1994

This paper embeds the naive Bayesian induction scheme within an algorithm that carries out a greedy search through the space of features, hypothesize that this approach will improve asymptotic accuracy in domains that involve correlated features without reducing the rate of learning in ones that do not. Expand

An algebra of bayesian belief universes for knowledge-based systems

- Mathematics, Computer Science
- Networks
- 1990

A scheme-the algebra of Bayesian belief universes-for absorbing and propagating evidence in multiply connected CPNs is outlined, which provides a secondary structure, a junction tree, and a simple set of algebraic operations between objects in this structure, Collect Evidence and Distribute Evidence. Expand

Criteria of estimation in large samples

- Mathematics
- 1965

The existing criteria of consistency and efficiency of estimation have been examined in the light of recent criticisms and controversies concerning them. A new criterion called uniform first order… Expand

An Entropy-based Learning Algorithm of Bayesian Conditional Trees

- Computer Science, Mathematics
- UAI
- 1992

The modified algorithm directs the user to group digits into several classes consisting of digits that are hard to distinguish and then constructing an optimal conditional tree representation for each class of digits instead of for each single digit as done by Chow and Liu (1968). Expand