DATE: Dual Attentive Tree-aware Embedding for Customs Fraud Detection

Cited 0 time in webofscience Cited 4 time in scopus
  • Hit : 304
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Sundongko
dc.contributor.authorTsai, Yu-Cheko
dc.contributor.authorSingh, Karandeepko
dc.contributor.authorChoi, Yeonsooko
dc.contributor.authorIbok, Etimko
dc.contributor.authorLi, Cheng-Teko
dc.contributor.authorCha, Meeyoungko
dc.date.accessioned2020-11-24T02:30:18Z-
dc.date.available2020-11-24T02:30:18Z-
dc.date.created2020-11-03-
dc.date.issued2020-08-24-
dc.identifier.citation26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2020, pp.2880 - 2890-
dc.identifier.urihttp://hdl.handle.net/10203/277526-
dc.description.abstractIntentional manipulation of invoices that lead to undervaluation of trade goods is the most common type of customs fraud to avoid ad valorem duties and taxes. To secure government revenue without interrupting legitimate trade flows, customs administrations around the world strive to develop ways to detect illicit trades. This paper proposes DATE, a model of Dual-task Attentive Tree-aware Embedding, to classify and rank illegal trade flows that contribute the most to the overall customs revenue when caught. The strength of DATE comes from combining a tree-based model for interpretability and transaction-level embeddings with dual attention mechanisms. To accurately identify illicit transactions and predict tax revenue, DATE learns simultaneously from illicitness and surtax of each transaction. With a five-year amount of customs import data with a test illicit ratio of 2.24%, DATE shows a remarkable precision of 92.7% on illegal cases and a recall of 49.3% on revenue after inspecting only 1% of all trade flows. We also discuss issues on deploying DATE in Nigeria Customs Service, in collaboration with the World Customs Organization.-
dc.languageEnglish-
dc.publisherAssociation for Computing Machinery-
dc.titleDATE: Dual Attentive Tree-aware Embedding for Customs Fraud Detection-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85090412171-
dc.type.rimsCONF-
dc.citation.beginningpage2880-
dc.citation.endingpage2890-
dc.citation.publicationname26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2020-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationVirtual-
dc.identifier.doi10.1145/3394486.3403339-
dc.contributor.localauthorCha, Meeyoung-
dc.contributor.nonIdAuthorKim, Sundong-
dc.contributor.nonIdAuthorTsai, Yu-Che-
dc.contributor.nonIdAuthorSingh, Karandeep-
dc.contributor.nonIdAuthorChoi, Yeonsoo-
dc.contributor.nonIdAuthorIbok, Etim-
dc.contributor.nonIdAuthorLi, Cheng-Te-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0