JOURNAL ARTICLE

JMoE-FAP: A novel model for telecom network fraud victimization pattern analysis

Tuo ShiJing HuLi DanyangMin Chen

Year: 2025 Journal:   Journal of Safety Science and Resilience Vol: 6 (3)Pages: 100199-100199   Publisher: Elsevier BV

Abstract

A comprehensive examination of the victimization process, coupled with the development of effective preventive strategies, represents the most promising approach for mitigating telecom network fraud. However, the limited availability of telecom fraud case text data hinders the advancement of robust data extraction algorithms, thereby complicating the identification of victimization patterns. To address this gap, this study proposes a victimization process analysis model that leverages mixed expert event joint extraction, utilizing real telecom fraud case data. The model integrates LERT-MoE to extract trigger words and arguments related to the victimization process from law enforcement reports, followed by the application of a dot-product attention mechanism for argument role classification. To the best of our knowledge, this represents the first attempt to apply a mixture-of-experts model with a purpose-built dot-product attention mechanism for the in-depth analysis of telecom network fraud victimization patterns, overcoming the limitations of previous methods in managing the complexity and diversity of fraudulent behaviors. Additionally, the Apriori method is employed to uncover prevalent behavioral patterns in the victimization process. Experimental results demonstrate that the proposed model outperforms baseline models in precision, accuracy, and F1-score for event extraction tasks in telecom fraud instances. Furthermore, the model identifies more granular fraud patterns within the victimization process, offering a valuable knowledge base for the development of targeted preventive strategies. The identified patterns can be used to design focused awareness campaigns, enhance fraud detection algorithms, and improve law enforcement training, thereby significantly increasing the effectiveness of anti-fraud initiatives.

Keywords:
Telecommunications Computer security Business Computer science Computer network

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
25
Refs
0.03
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Imbalanced Data Classification Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cybercrime and Law Enforcement Studies
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Victimization mechanisms and countermeasures in telecom network fraud: a dual-system theoretical perspective

Fuming XuA. LiuXiao Li

Journal:   Frontiers in Psychology Year: 2025 Vol: 16 Pages: 1637935-1637935
JOURNAL ARTICLE

A Victim-Based Framework for Telecom Fraud Analysis: A Bayesian Network Model

Peifeng NiWei Yu

Journal:   Computational Intelligence and Neuroscience Year: 2022 Vol: 2022 Pages: 1-13
JOURNAL ARTICLE

Data-Driven Bayesian Network for Risk Analysis of Telecom Fraud

Binzhou SiHaichun SunM. Shao

Journal:   Computing and Informatics Year: 2025 Vol: 44 (4)Pages: 800-827
JOURNAL ARTICLE

Research on Telecom Fraud Detection Model Based on Cellular Network Data

Kaiyuan GuoWenbo Wang

Journal:   Journal of Networking and Telecommunications Year: 2020 Vol: 2 (1)Pages: 12-12
JOURNAL ARTICLE

Research on telecom and network fraud crime

Q. L. Zhang

Journal:   JOURNAL OF COMMERCIAL LAW REVIEW Year: 2025 Vol: 9 (1)Pages: 135-138
© 2026 ScienceGate Book Chapters — All rights reserved.