• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fraud detection on payment transaction networks via graph computing and visualization①

    2020-10-09 07:38:14SunQuan孫權(quán)TangTaoZhengJianbinLinJialeZhaoJintaoLiuHongbao
    High Technology Letters 2020年3期
    關(guān)鍵詞:孫權(quán)

    SunQuan(孫權(quán)),TangTao②,ZhengJianbin**,LinJiale***,ZhaoJintao**,LiuHongbao**

    (*School of Computer Science, Fudan University, Shanghai 200433, P.R.China) (* *China UnionPay Research Institute of Electronic Payment, Shanghai 201201, P.R.China) (* * *School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, P.R.China)

    Abstract

    Key words: payment fraud detection, graph computing, graph embedding, machine learning

    0 Introduction

    Payment has been evolving to a new era whereby the mobile Apps have taken a dominant role in many emerging areas. There are multiple big giants for payment in China including Alipay, UnionPay, etc. With the propensity of the payment mobile Apps, more and more individual users, merchants, and other players have entered this area, many persons are benefiting from the advanced and convenient mobile payment technology and business.

    As a matter of fact, the payment giants have spent large amounts of investment in promoting their payment tools and one of the main promoting ways is to give discount or back cash to individuals who use their payment Apps when do purchase. The payment can either be fulfilled by online and offline, while the online especially mobile Apps are becoming the major channel to attract the public to get used to the new payment habit. The promotion naturally incurs the attackers including both individual users and merchants that take advantage of the promotion events to obtain extra rewards in an unjustified way. For example, the users may intentionally repeat 10 purchase on the same goods in a merchant, which can, in turn, get back cash from the payment service provider, and the user may share this reward with the merchant. In fact, such fraud has become the major concern for payment campaign, which can cause significant loss to payment service providers. As a result, how to effectively detect the underlying fraud makers (including both individual users and merchants) has been a hot research topic in literature, though many focused on other relevant but different domains. This work also focuses on this important problem, and conducts the empirical study on a major payment service provider in China, to verify the idea and the proposed technical approach. In general, this paper aims to make the following highlights:

    ? A graph computing-based approach is proposed for payment fraud detection, particularly in the setting of mobile Apps payment tools. The proposed approach is unsupervised and can work on large-scale transaction networks, whereby the nodes denote both individual users and merchants, and the edges denote the transaction records.

    ? Specifically, the proposed approach consists of the 2 main steps: the first step is to use graph computing to break the giant network into small communities, and the second step is to adopt data visualization to help the investigators pinpoint the risk nodes and edges in a certain time period.

    ? Case study with preliminary experimental results is provided on the real-world dataset from a major payment player in China. The results show that the proposed approach can effectively detect suspicious frauds on large-scale payment networks.

    The rest of the paper is organized as follows. This paper discusses the related work in Section 1. The major technical approach based on network analysis is presented in Section 2. Case study and preliminary experiments are given in Section 3. Conclusion is in Section 4.

    1 Related work

    In this section, related work on fraud detection is presented. In particular, the review will cover different business area for fraud detection as well as the technical approaches including both supervised and unsupervised learning-based methods.

    1.1 Fraud detection business requirements

    Fraud detection has been a long standing task in financial related business. It ranges across multiple industry sectors and researchers from different disciplines have devoted considerable efforts.

    One major business scenario is credit card fraud detection, whereby unlawful transactions by credit cards need be timely detected. Ref.[1] studied the fraudulent credit card transactions occurring among the retail companies in Chile whereby the association rule method is employed. In Ref.[2], the fraud detection score was specially focused to transform it to a probability, which is important for decision making in credit card risk management. Another typical and important sector is automobile. Ref.[3] proposed an expert detection system against the group of collective automobile insurance fraudulent activities. The entities involved in the car insurance fraud can be drivers, chiropractors, garage mechanics, lawyers, police officers, insurance workers and others. In the more recent Ref.[4] showed the fraud detection experience on large-scale e-commerce platforms, based on Alibaba’s large-scale computing system called Open Data Processing Service (ODPS). An anti-fraud system has been developed and verified on 2 large e-commerce datasets with the size of tens of millions of users and items, which is further deployed to Alibaba’s online business Taobao. Fraud can also happen in the online customer reviews, which are assumed to be unbiased opinion of other consumers’ experiences with the items or services. In fact, it is possible that the publishers, writers and vendors consistently manipulate online consumer reviews. And these manipulations can incur significant bias to the potential buyers such that the customers may purchase goods under misleading. To address this issue, Ref.[5] analyzed typical patterns of review manipulation and provided an empirical study on the real-world data from Amazon and Barnes & Noble. For telecom fraud detection, it has been a serious problem in many developing countries, e.g. China, and it is rather difficult to coordinate multiple agencies to avoid fraudulent activities thoroughly. Thus machine learning methods are applied in Ref.[6] to detect the fraudsters. More specifically, they proposed to use generative adversarial network (GAN)[7]based model to estimate the likelihood of a fraud transaction, as such the bank can take some measures to prevent monetary loss. The GAN based model shows promising results against traditional supervised learning models. In the setting of healthcare service, fraud detection has also been a central issue especially given the trend that more and more online payment channels are becoming available. For instance, Ref.[8] disclosed the typical online healthcare service delivery process in China. The fraudsters i.e. third party agents use software robots and script to obtain hospital appointments from the authorized platforms, and then the agents ask for unjustified high price to resell them to the true clients. To tackle this problem, they first use clustering based models to discover the potential user groups from agents, then the profile of user groups are extracted from the event sequence of the users to provide evidence for fraud detection. Moreover, a case study is deployed in a real-world hospital to show its effectiveness and reliability.

    On the other hand, unsupervised models are developed and used for fraud detection, partly due to the lack of labeled samples for training an effective supervised model. Among them, clustering[9,10]is a mainly used technique. The clustering is usually performed on the user profiles to help identify the abnormal users, and the recent advance of deep network-based clustering techniques[11]can be of more help in this direction.

    There are also some technically relevant work on abnormal detection and prediction. For temporal data, Ref.[12]showed a dictionary learning-based model for robust time series anomaly detection. While a more recent work[13]showed failure prediction using both event sequence and time series data. However, this technique can be difficult to be applied in the setting. The main reason is that fraudulent transactions at the individual level are a rare event, which can hardly form a long sequence of events across a long-time period, and so for time series. In addition, it is useful to predict fraud detection rather than detection after fraudulent transactions have happened. In this sense, the early risk prediction model of fraudulent transactions are needed, and there are also a line of work[14-17]on event prediction over time, based on statistical learning models. These directions involving more complicated models are left for future study, given more data can be collected as the business spans.

    1.2 Fraud detection technologies

    From the technical perspective, fraud detection has been a challenging task partly due to the fact that the supervised learning-based models call for enough positive samples including transactions, client individuals and merchants, in comparison with the normal samples. However, in fact, many frauds may happen without being detected hence the positive samples are often a subset of the true whole fraud samples set. This leads to the following problems: 1) the distribution of the positive samples (fraud) and negative samples can be biased; 2) the number of positive samples becomes even smaller as some are not detected, especially compared with those unlimited number of normal samples.

    In literature, different methods are adopted for fraud detection in both supervised and unsupervised learning based ways. When supervision is given, as 2 rather popular machine learning methods, support vector machine (SVM) and Logistic regression (LR) have been applied in fraud detection. While in reality, supervision information is often difficult to acquire, in such cases, unsupervised methods have attracted lots of attention whereby clustering methods have been the dominant techniques.

    1.3 Remarks

    As discussed above, though fraud detection has been a long-standing problem in different financial areas while the study in the context of mobile payment Apps has not been fully explored. In particular, it is an emerging area and China has been one of the major countries for payment tools promotion. Hence it is motivated to take an in-depth study based on real-world business need (as one of the biggest payment players in the world) and rich transaction-related data. In the subsequent sections, a model based on network analysis whereby graph computing has been applied is proposed and case studies are given in detail.

    2 Graph computing based approach for fraud detection

    In this section, the graph computing based pipeline for fraud detection for unjustified profits will be discussed. The deployed method for building the transaction graph will be first described, whereby the graph computing procedure can be performed. This section also briefly discusses other alternative techniques that have been tried while not really adopted for stability and computational tractability issues.

    2.1 Transaction network construction and processing

    In the approach, the transaction network for the payments on a daily basis is built. An overview working flow of the transaction network processing and visualization is shown in Fig.1. The input transaction data is used to build the transaction network first, which is followed by filtering to remove some unimportant edges and nodes. Then community detection e.g. fast-unfolding (Fig.2) is performed to narrow down the study on relatively small communities. In the final stage, there are multiple ways of further analysis, including graph embedding (Fig.3), and rule driven community visualization (Fig.4) for fraud detection.

    Fig.1 Working flow of the transaction network processing and visualization

    2.1.1 Transaction network construction

    Specifically, when there are multiple transactions in one day for a pair of nodes, e.g. between a user and a merchant, these transactions will be aggregated into one edge (or 2 directed edges if the direction is considered), whose attributes store the average transaction amount, mean transaction time, mean transaction between time, and the total number of transactions (in one direction). Note the above statistics can also be conducted on a longer period than one day, e.g. one week or month, which can be applied dependently.

    Fig.2 Illustration for network community detection e.g. via FastUnfolding[18]. The input raw network has been divided by the 3 detected communities by the FastUnfolding method

    Fig.3 Network embedding on the detected community using node2vec[19] for merchants’ transaction networks

    Fig.4 Network visualization and rule checking based on the detected community from the raw networks

    2.1.2 Transaction network filtering

    Then filtering is performed on the formed (aggregated) transaction network, whereby the typical filtering criterion includes the total transaction count, amount, discount, and the between time. The purpose of filtering is to reduce the size of the network by sparsifying its edges and removing some less important nodes. As such the whole network can be cut into a collection of sub-networks, each of which is of a reasonable size for further processing. The filtering mainly involves 2 steps: the first step is to remove the edges whose attributes as stated above are smaller than given thresholds. The nodes with a very limited number of out/in degrees will also be removed in the second step.

    2.2 Fast community detection

    Community detection can be applied on the filtered network as shown in Fig.2, to further break down the large-scale network into small sub networks. As such, more sophisticated measurements can be computed within a reasonable time period to quickly detect the risks. There are many available community detection algorithms, of which one popular method is FastUnfolding[18]. Here is a detailed description of FastUnfolding, whereby the modularity scoreQis defined as follows:

    (1)

    whereiandjindicate the 2 nodes in the network, andAi, jdenotes the weight between the 2 nodes. Whilecijdenotes the community ID that a node is tagged, and the delta functionδ(ci,cj) returns 1 if the 2 nodes are assigned to the same community; otherwise it is set 0.

    ? Initialization: label each node to different communities;

    ? For each node, label it to the community that one of its neighboring nodes belongs to, such that the corresponding modularity score by Eq.(1) is maximized. Then the differenceΔQcompared with the original modularity score is calculated;

    ? IfΔQ>0, accept the latest community division; otherwise, keep the original division;

    ? Repeat the above steps until the modularity scoreQcannot be improved anymore.

    2.3 Detected community embedding and visualization

    One popular method is to embed the community network into vectorized feature representation, for which the scalability issue need be particularly addressed for real-world applications. In fact, there are many new network embedding methods[19-21]which can convert graph vertex into a vectorized feature points in the new space. As such, traditional machine learning methods such as support vector machine, logistic regression and decision tree can be easily reused.

    Another direct and powerful method for fraud detection based on the detected communities is visualization as will also be shown in the case studies. In general, in the detected community, the scale of the graph as well as the edge density is relatively small, hence it is easier to do graph visualization, whereby the bank card accounts and merchants can be shown in different colors to help the investigators quickly discern the abnormal patterns.

    3 Experiments and case study

    In this section, case study and preliminary experimental results on real-world payment data are provided. The data is collected from the major payment service player in China whose registered users have surpassed the number for 2 billion, and every day there are around 3 million transactions. In the proposed approach, the large-scale transaction network has been formed and graph based computing methods are used to detect the potential fraudsters. In consequence, subsequent followups can be taken to further verify the illness of the detected fraudsters.

    3.1 Platform infrastructure

    As the platform needs to support large-scale and efficient (sometimes even real-time) computing and storage, distributed system is used based on popular tools including Hadoop, HIVE, etc. The general overview of the infrastructure system is shown in Fig.5. The data is updated on a daily basis, whereby the daily records are stored on their respective nodes to ensure fast access and consistency. In addition, because the HIVE data warehouse is not friendly to interactive SQL query, the tool Impala is used for the more efficient query, which can achieve a speedup about 10 times.

    3.2 Protocol

    The proposed heterogeneous network involves individual users, merchants, as well as bank card for redistribution of the earned unjustified (monetary) credits.

    3.3 Preliminary qualitative results

    The network has been built by the definition of entities and their relationships. Then some particular sub networks can be visualized. Fig.6 shows 4 typical cases for fraudulent conspiracy among the merchants, individual users with their payment account and the bank card for monetary redistribution. More specifically:

    ? In Fig.6(a), there are 2 central merchants (in light color) to which many payment transactions have been conducted from a large number of individual users (in dark color), and it can be easily discovered that these 2 merchants have high risk for fraudulent behavior and appropriate measures can be taken to perform further investigation on the 2 merchants and the relevant individual accounts.

    ? In Fig.6(b), many individual users pay to the merchant at the promotion period, such that they receive discount or backcash from the payment service provider. And the merchant gets back the unjustified fraud money from the users by a certain ratio, e.g. 50 percentages.

    Fig.5 Overview of the infrastructure system for graph computing based fraud detection on the transaction network

    (a) Two fraudulent merchants (in light color) and their associated users(in deep color), best viewed in color

    (b) Fraudulent patterns by the suspect single bank card for money redistribution (in light color), the users (in deep color) and the merchant (in black)

    (c) Fraudulent patterns by the suspect multiple bank cards for money redistribution (in right nodes), the users (in midnodes) and the merchant (in left nodes)

    (d) Group fraudulent patterns formed by the suspect redistribution bank cards (in left nodes), the users (in midnodes) and the merchant (in right nodes)

    ? While in the example of Fig.6(c), there is no explicit merchant in the network, while the bank cards have an active link with many shared users in a short time period. This suggests the potential fraud group among these entities, such that the earned backcash may be redistributed through this network.

    ? In the 4th example as shown in Fig.6(d), there are also only 4 merchants which have attracted many transactions within a group of users. In addition, there are multiple bank cards for redistribution of the money, this scenario is often more difficult to detect as more entities are involved.

    The network embedding using the node2vec method[19]on a segmented network of merchants is also used. In this way, each merchant is represented by a feature vector. For the convenience and effect of the display, 50 merchants and their associated users project their feature representation further into the 2D plane. The edges in the projected network are created by certain means of the common clients shared by the 2 merchants (when the number exceeds a certain threshold). As shown in Fig.7, on the left, the raw network shows multiple clustering pattern regarding connected components, and such clustering behavior is well preserved in the projected 2D space on the right. This result shows the effectiveness of the adopted node2vec method.

    (a) The input networks with 10 connected components in different colors

    (b) The projection on 2D plane from the embedded feature

    3.4 Summary and discussion

    This paper gives 4 typical cases of fraud pattern which are extracted from a series of network processing including raw transaction network construction based on daily records aggregation, transaction network decomposition based on edge and node filtering and community detection to focus on suspicious networks based on data visualization.

    4 Conclusions

    This paper proposes a principled and effective approach for automatic payment fraud detection in the context of individuals and merchants, whereby a payment transaction network can be established for further analysis of the payment behavior to find suspicious fraud transactions and their latent individuals and merchants in an unsupervised learning manner.

    Specifically, this paper develops a network analysis method to discover the abnormal patterns of transactions over the network in a certain period of time. The design is based on the fact that little labeled data samples are available and there also lacks systematic rules for summarizing the behavior of fraud.

    There are many possible directions for future work. First, in this paper, an unsupervised approach is mainly adopted due to the lack of labels for fraud merchants and individuals. While as the data accumulates, more labels can be obtained and then it is possible to develop supervised learning methods such as decision tree and deep neural networks. Second, fusing multiple networks with different definitions to form a more effective detection pipeline is future direction. For this need, graph matching, especially for multiple graph matching[22,23], and online graph matching[24], can be a possible solution infusing networks with corresponding structures. Third, recently there are many temporal models for behavioral modeling, and one of the promising technique is the so-called temporal point process[25]. A variety of temporal point process models has been witnessed, ranging from classic parametric models[14]to nonparametric models[26]and to deep network based approaches[27-29]. What’s more, combining two-way exploration[30], GAN[31]with the proposed method is one of the future directions. Last but not least, how to learn an interpretable behavioral model[32,33]over time is also the immediate interest.

    猜你喜歡
    孫權(quán)
    三十六計(jì)之反間計(jì)
    任用拆臺的人
    任用拆臺的人
    孫權(quán):“包郵”好有說服力
    七擒孟獲
    任用拆臺的人
    今日文摘(2017年17期)2017-09-28 20:43:56
    孫權(quán)用人,忠誠為先
    PHOTO FINISH
    漢語世界(2017年2期)2017-07-05 14:54:46
    任用拆臺的人
    妙筆繪華章——東吳大帝孫權(quán)紀(jì)念館
    大眾考古(2014年9期)2014-06-21 07:11:08
    精品高清国产在线一区| 麻豆乱淫一区二区| 日本五十路高清| 国产精品国产av在线观看| 精品国产乱码久久久久久男人| 最新的欧美精品一区二区| 一级毛片 在线播放| 日本av手机在线免费观看| 欧美日韩精品网址| 亚洲精品久久成人aⅴ小说| 看十八女毛片水多多多| 亚洲国产av影院在线观看| 丰满迷人的少妇在线观看| 一边摸一边抽搐一进一出视频| 亚洲av成人不卡在线观看播放网 | 人体艺术视频欧美日本| 亚洲人成电影免费在线| 国产av国产精品国产| 在线观看www视频免费| 两个人免费观看高清视频| 亚洲av日韩精品久久久久久密 | 老司机在亚洲福利影院| 青春草视频在线免费观看| 香蕉丝袜av| 精品久久久久久电影网| 婷婷色综合www| 日本五十路高清| 日韩熟女老妇一区二区性免费视频| 欧美日韩成人在线一区二区| 亚洲情色 制服丝袜| 十八禁高潮呻吟视频| 国产精品香港三级国产av潘金莲 | 国产精品一区二区精品视频观看| 另类亚洲欧美激情| 免费高清在线观看视频在线观看| av国产精品久久久久影院| 妹子高潮喷水视频| 久久av网站| 亚洲激情五月婷婷啪啪| 中文精品一卡2卡3卡4更新| 人妻人人澡人人爽人人| 亚洲国产毛片av蜜桃av| 99国产精品一区二区蜜桃av | 天天躁狠狠躁夜夜躁狠狠躁| 高清黄色对白视频在线免费看| 国产一区亚洲一区在线观看| 老司机在亚洲福利影院| 午夜福利一区二区在线看| 99国产精品一区二区蜜桃av | 国产一区二区三区综合在线观看| 亚洲人成电影免费在线| 美国免费a级毛片| 女人高潮潮喷娇喘18禁视频| 国产免费福利视频在线观看| 亚洲国产欧美在线一区| 一二三四在线观看免费中文在| 国产精品香港三级国产av潘金莲 | 黄色 视频免费看| www.999成人在线观看| 亚洲五月婷婷丁香| 亚洲色图综合在线观看| 亚洲国产精品国产精品| 免费高清在线观看日韩| 99热网站在线观看| 国产精品久久久久久精品电影小说| 巨乳人妻的诱惑在线观看| 国产伦人伦偷精品视频| 大码成人一级视频| 国产精品熟女久久久久浪| 美女午夜性视频免费| 男女之事视频高清在线观看 | 99久久人妻综合| 久久久国产精品麻豆| 人人妻人人澡人人看| 好男人视频免费观看在线| av线在线观看网站| 男女免费视频国产| 国产精品一区二区在线不卡| 免费看av在线观看网站| 色94色欧美一区二区| 老司机午夜十八禁免费视频| 国产精品熟女久久久久浪| 欧美在线黄色| 亚洲人成电影观看| 国产免费视频播放在线视频| 无遮挡黄片免费观看| 国产伦人伦偷精品视频| 久久午夜综合久久蜜桃| 亚洲精品中文字幕在线视频| 国产精品av久久久久免费| 亚洲免费av在线视频| 国产在视频线精品| 国产欧美日韩一区二区三 | 99热网站在线观看| 一边摸一边抽搐一进一出视频| 久热这里只有精品99| 视频在线观看一区二区三区| 天堂8中文在线网| 女人被躁到高潮嗷嗷叫费观| 中文字幕另类日韩欧美亚洲嫩草| svipshipincom国产片| 久久国产精品影院| 国产亚洲欧美在线一区二区| 各种免费的搞黄视频| www日本在线高清视频| 国产精品香港三级国产av潘金莲 | 好男人电影高清在线观看| 90打野战视频偷拍视频| 亚洲欧洲日产国产| 欧美成人精品欧美一级黄| 大香蕉久久网| 色综合欧美亚洲国产小说| a 毛片基地| 国产又色又爽无遮挡免| 国产成人一区二区三区免费视频网站 | 欧美+亚洲+日韩+国产| 一二三四社区在线视频社区8| 久9热在线精品视频| 少妇猛男粗大的猛烈进出视频| av线在线观看网站| 日韩av在线免费看完整版不卡| av天堂久久9| 老汉色∧v一级毛片| 亚洲av日韩精品久久久久久密 | 黄色 视频免费看| 美女高潮到喷水免费观看| 一级毛片 在线播放| 一边摸一边抽搐一进一出视频| 国产91精品成人一区二区三区 | 久久99精品国语久久久| 亚洲中文日韩欧美视频| 久久精品aⅴ一区二区三区四区| 欧美亚洲 丝袜 人妻 在线| 免费在线观看日本一区| 国产在线一区二区三区精| 免费女性裸体啪啪无遮挡网站| 一边亲一边摸免费视频| 女人被躁到高潮嗷嗷叫费观| 亚洲一码二码三码区别大吗| 免费在线观看日本一区| 国产日韩欧美在线精品| 亚洲色图 男人天堂 中文字幕| 99久久综合免费| 国产在线观看jvid| 一区在线观看完整版| 99久久综合免费| 日韩 欧美 亚洲 中文字幕| 国产黄色免费在线视频| 9191精品国产免费久久| 国产免费又黄又爽又色| 亚洲人成电影免费在线| 狂野欧美激情性bbbbbb| 午夜福利免费观看在线| 多毛熟女@视频| 999精品在线视频| 最近中文字幕2019免费版| 高清av免费在线| 一区二区三区激情视频| 美女高潮到喷水免费观看| 亚洲av电影在线观看一区二区三区| 亚洲成人免费电影在线观看 | 一边摸一边抽搐一进一出视频| 尾随美女入室| 久久久久视频综合| 欧美成人午夜精品| 国产亚洲欧美在线一区二区| 狂野欧美激情性xxxx| 亚洲欧美日韩另类电影网站| 波野结衣二区三区在线| 黑人猛操日本美女一级片| 久久久久久人人人人人| 久久99一区二区三区| 精品第一国产精品| 巨乳人妻的诱惑在线观看| 91国产中文字幕| 午夜日韩欧美国产| 精品人妻在线不人妻| 国产精品一国产av| 欧美国产精品va在线观看不卡| 1024香蕉在线观看| 一本—道久久a久久精品蜜桃钙片| 黄色视频在线播放观看不卡| 成人免费观看视频高清| 亚洲欧洲精品一区二区精品久久久| 亚洲av综合色区一区| 国产成人精品在线电影| 国产视频首页在线观看| 国产野战对白在线观看| 制服诱惑二区| a 毛片基地| 黄色视频不卡| 国产片内射在线| 韩国精品一区二区三区| 亚洲五月婷婷丁香| 国产老妇伦熟女老妇高清| 男女床上黄色一级片免费看| 一级片'在线观看视频| 啦啦啦啦在线视频资源| 天天操日日干夜夜撸| 国产成人av激情在线播放| av天堂在线播放| 99久久精品国产亚洲精品| 亚洲国产精品一区三区| 老熟女久久久| 免费看十八禁软件| 高清欧美精品videossex| 亚洲精品一二三| 18禁黄网站禁片午夜丰满| 亚洲午夜精品一区,二区,三区| 亚洲国产日韩一区二区| 国产高清国产精品国产三级| 亚洲第一av免费看| 美女主播在线视频| 一级黄色大片毛片| 香蕉丝袜av| 久久人人爽av亚洲精品天堂| 国产一区有黄有色的免费视频| 久久九九热精品免费| 精品一区二区三区av网在线观看 | 99热国产这里只有精品6| 久久国产精品男人的天堂亚洲| 国产一卡二卡三卡精品| 丝袜美腿诱惑在线| 男人操女人黄网站| 伊人亚洲综合成人网| 日本vs欧美在线观看视频| 国精品久久久久久国模美| 亚洲精品国产区一区二| 99re6热这里在线精品视频| 男人操女人黄网站| 色视频在线一区二区三区| 国产视频一区二区在线看| 亚洲人成网站在线观看播放| 免费看十八禁软件| 在线观看国产h片| av线在线观看网站| 满18在线观看网站| 又大又黄又爽视频免费| 亚洲欧洲精品一区二区精品久久久| 欧美日韩国产mv在线观看视频| 欧美亚洲日本最大视频资源| 国产有黄有色有爽视频| 久久久久国产一级毛片高清牌| 咕卡用的链子| 人人妻,人人澡人人爽秒播 | 色网站视频免费| 国产成人欧美在线观看 | 嫩草影视91久久| 丝瓜视频免费看黄片| 亚洲一码二码三码区别大吗| 国产一区二区三区av在线| 国产激情久久老熟女| www日本在线高清视频| 欧美在线黄色| 日本午夜av视频| netflix在线观看网站| 国产一级毛片在线| 国产伦理片在线播放av一区| 91国产中文字幕| 精品国产国语对白av| 亚洲精品日本国产第一区| avwww免费| 最新的欧美精品一区二区| 亚洲欧美日韩高清在线视频 | 一区在线观看完整版| 久久精品国产综合久久久| 女人高潮潮喷娇喘18禁视频| 免费高清在线观看日韩| 日本vs欧美在线观看视频| 夜夜骑夜夜射夜夜干| 婷婷成人精品国产| 久久精品熟女亚洲av麻豆精品| 亚洲国产日韩一区二区| 男的添女的下面高潮视频| 777米奇影视久久| 中文字幕av电影在线播放| 啦啦啦啦在线视频资源| 一本一本久久a久久精品综合妖精| 婷婷色麻豆天堂久久| 亚洲欧洲日产国产| 国产精品久久久久成人av| 亚洲伊人色综图| 啦啦啦 在线观看视频| 黄频高清免费视频| 亚洲人成网站在线观看播放| 人人妻人人澡人人爽人人夜夜| 19禁男女啪啪无遮挡网站| 18禁裸乳无遮挡动漫免费视频| 黄色视频在线播放观看不卡| 亚洲av日韩精品久久久久久密 | 一区二区三区乱码不卡18| 国产伦理片在线播放av一区| 亚洲精品国产色婷婷电影| 亚洲国产成人一精品久久久| 久久免费观看电影| 亚洲精品久久午夜乱码| 精品人妻在线不人妻| 欧美黄色淫秽网站| 好男人电影高清在线观看| 国产精品偷伦视频观看了| 老司机在亚洲福利影院| 嫁个100分男人电影在线观看 | 19禁男女啪啪无遮挡网站| 日韩av在线免费看完整版不卡| 欧美日韩福利视频一区二区| √禁漫天堂资源中文www| 精品国产国语对白av| 国产视频一区二区在线看| 97在线人人人人妻| 欧美激情极品国产一区二区三区| 欧美精品一区二区大全| 又大又黄又爽视频免费| 成人影院久久| 久久精品亚洲熟妇少妇任你| 男人舔女人的私密视频| 国产精品二区激情视频| 国产精品久久久久久人妻精品电影 | www.av在线官网国产| 欧美精品人与动牲交sv欧美| 99热国产这里只有精品6| 日韩av免费高清视频| 啦啦啦在线免费观看视频4| 亚洲自偷自拍图片 自拍| 亚洲精品在线美女| 国产亚洲精品第一综合不卡| www.999成人在线观看| 中国美女看黄片| e午夜精品久久久久久久| 午夜免费鲁丝| 亚洲熟女毛片儿| 一区福利在线观看| 久久国产精品大桥未久av| 男人操女人黄网站| 久久综合国产亚洲精品| 日韩 亚洲 欧美在线| 亚洲国产看品久久| 黄频高清免费视频| 国产97色在线日韩免费| 久久 成人 亚洲| 性色av一级| 久久精品aⅴ一区二区三区四区| 亚洲av电影在线进入| 最黄视频免费看| 亚洲情色 制服丝袜| 手机成人av网站| 国产日韩欧美亚洲二区| 国产欧美亚洲国产| 亚洲五月婷婷丁香| 亚洲国产精品一区三区| 九色亚洲精品在线播放| 久久国产精品男人的天堂亚洲| 成在线人永久免费视频| 免费观看a级毛片全部| 亚洲精品国产色婷婷电影| 欧美精品亚洲一区二区| 免费少妇av软件| 欧美日韩亚洲综合一区二区三区_| 亚洲av成人精品一二三区| 久久午夜综合久久蜜桃| 秋霞在线观看毛片| 两个人免费观看高清视频| 黄频高清免费视频| 爱豆传媒免费全集在线观看| 久久精品国产综合久久久| 男人舔女人的私密视频| videosex国产| 日本色播在线视频| 久久影院123| 9热在线视频观看99| 精品国产一区二区三区四区第35| 国产熟女欧美一区二区| 成人国产av品久久久| 热re99久久精品国产66热6| 1024香蕉在线观看| 国产黄色免费在线视频| 男女高潮啪啪啪动态图| 久久久久国产精品人妻一区二区| av欧美777| 伊人亚洲综合成人网| 亚洲欧洲日产国产| 午夜激情av网站| 热99久久久久精品小说推荐| 亚洲人成电影观看| 亚洲国产精品一区三区| 妹子高潮喷水视频| www.av在线官网国产| 精品一区二区三区四区五区乱码 | 飞空精品影院首页| 国产亚洲欧美在线一区二区| 国产精品秋霞免费鲁丝片| 少妇猛男粗大的猛烈进出视频| 免费在线观看影片大全网站 | 国产成人精品无人区| 久久久久视频综合| 亚洲精品国产av成人精品| 日本欧美视频一区| 老鸭窝网址在线观看| 多毛熟女@视频| 一级黄色大片毛片| 免费看不卡的av| 又大又爽又粗| 久久人人爽av亚洲精品天堂| 妹子高潮喷水视频| 五月开心婷婷网| 少妇人妻久久综合中文| 一本久久精品| 精品视频人人做人人爽| 叶爱在线成人免费视频播放| 亚洲五月婷婷丁香| 免费av中文字幕在线| 国产亚洲av高清不卡| 久热这里只有精品99| 成人手机av| 日日夜夜操网爽| 在线观看www视频免费| 成年人免费黄色播放视频| 菩萨蛮人人尽说江南好唐韦庄| 亚洲自偷自拍图片 自拍| 精品一品国产午夜福利视频| 交换朋友夫妻互换小说| 亚洲国产中文字幕在线视频| 侵犯人妻中文字幕一二三四区| 91麻豆精品激情在线观看国产 | 亚洲三区欧美一区| 亚洲男人天堂网一区| 老司机午夜十八禁免费视频| 无限看片的www在线观看| 午夜免费观看性视频| 日本av免费视频播放| 少妇猛男粗大的猛烈进出视频| tube8黄色片| 日韩一本色道免费dvd| 国产一区二区 视频在线| 好男人电影高清在线观看| 亚洲欧美精品自产自拍| 黑人猛操日本美女一级片| 久久久精品区二区三区| 女人久久www免费人成看片| 中文字幕色久视频| 建设人人有责人人尽责人人享有的| 国产在线视频一区二区| 在线av久久热| 国产黄色视频一区二区在线观看| 亚洲精品美女久久av网站| 性少妇av在线| 亚洲欧美一区二区三区国产| 久久精品久久久久久噜噜老黄| 9色porny在线观看| 国产又爽黄色视频| 国产精品秋霞免费鲁丝片| 悠悠久久av| 免费看十八禁软件| 2021少妇久久久久久久久久久| 性高湖久久久久久久久免费观看| 天堂8中文在线网| 国产不卡av网站在线观看| 18禁裸乳无遮挡动漫免费视频| 黑人巨大精品欧美一区二区蜜桃| 欧美精品一区二区免费开放| 亚洲欧美中文字幕日韩二区| 狠狠婷婷综合久久久久久88av| 日日爽夜夜爽网站| 欧美黑人欧美精品刺激| 国产高清国产精品国产三级| 男女无遮挡免费网站观看| 一级毛片 在线播放| 丝瓜视频免费看黄片| 亚洲熟女精品中文字幕| 99热全是精品| 久久99精品国语久久久| 91字幕亚洲| 国产成人欧美在线观看 | 我的亚洲天堂| 午夜福利在线免费观看网站| 国产片特级美女逼逼视频| 丝袜人妻中文字幕| 纯流量卡能插随身wifi吗| 色婷婷av一区二区三区视频| 精品人妻在线不人妻| 脱女人内裤的视频| 日本a在线网址| 日韩中文字幕欧美一区二区 | 成年动漫av网址| 黄色a级毛片大全视频| 大陆偷拍与自拍| 九色亚洲精品在线播放| 精品国产乱码久久久久久小说| 国产精品久久久av美女十八| 久久ye,这里只有精品| 亚洲国产日韩一区二区| 无限看片的www在线观看| 婷婷色麻豆天堂久久| 午夜视频精品福利| 啦啦啦在线观看免费高清www| 两个人免费观看高清视频| 国产av国产精品国产| 天堂中文最新版在线下载| 欧美国产精品va在线观看不卡| 最近中文字幕2019免费版| 王馨瑶露胸无遮挡在线观看| 精品福利永久在线观看| 一区二区三区激情视频| 一区二区三区精品91| 国产精品一二三区在线看| 菩萨蛮人人尽说江南好唐韦庄| 午夜福利乱码中文字幕| 精品一区二区三区av网在线观看 | 久久久国产欧美日韩av| 国产片内射在线| 成人亚洲精品一区在线观看| 亚洲午夜精品一区,二区,三区| 欧美日韩视频精品一区| 午夜影院在线不卡| 色视频在线一区二区三区| 中文字幕人妻丝袜制服| 久久久久久免费高清国产稀缺| 99热网站在线观看| 国产精品国产av在线观看| 精品少妇内射三级| 亚洲精品自拍成人| 精品人妻1区二区| 伦理电影免费视频| 成人亚洲精品一区在线观看| 一级a爱视频在线免费观看| 美女主播在线视频| 国产免费又黄又爽又色| 青青草视频在线视频观看| 大陆偷拍与自拍| 久久人人爽人人片av| 少妇人妻 视频| 成人午夜精彩视频在线观看| 日日爽夜夜爽网站| 久久99一区二区三区| 欧美成人精品欧美一级黄| 可以免费在线观看a视频的电影网站| 91麻豆精品激情在线观看国产 | 欧美精品高潮呻吟av久久| 国产成人av激情在线播放| 久久中文字幕一级| 久久久久久免费高清国产稀缺| 十分钟在线观看高清视频www| 久久毛片免费看一区二区三区| 亚洲国产欧美网| 日韩人妻精品一区2区三区| 亚洲精品国产av蜜桃| 亚洲欧洲日产国产| 精品久久久久久久毛片微露脸 | 乱人伦中国视频| 中文字幕色久视频| 国产精品麻豆人妻色哟哟久久| 少妇的丰满在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 精品一区二区三区四区五区乱码 | 久久女婷五月综合色啪小说| 欧美日韩国产mv在线观看视频| 亚洲欧美精品自产自拍| a 毛片基地| 一级,二级,三级黄色视频| 狂野欧美激情性bbbbbb| 在线看a的网站| 国产一区二区在线观看av| 黑人巨大精品欧美一区二区蜜桃| 国产国语露脸激情在线看| 午夜免费成人在线视频| 桃花免费在线播放| 欧美日韩黄片免| a级毛片在线看网站| 欧美 亚洲 国产 日韩一| 久久国产精品大桥未久av| 日韩免费高清中文字幕av| 国产免费福利视频在线观看| 日韩 亚洲 欧美在线| 欧美成狂野欧美在线观看| 在线亚洲精品国产二区图片欧美| 老司机午夜十八禁免费视频| 天天影视国产精品| 国产精品欧美亚洲77777| 欧美黄色片欧美黄色片| 看免费av毛片| 精品国产一区二区三区久久久樱花| 国产精品久久久久成人av| 国产精品 国内视频| 超碰97精品在线观看| 午夜av观看不卡| 韩国精品一区二区三区| 久久久久视频综合| 午夜免费男女啪啪视频观看| 欧美日韩视频高清一区二区三区二| 性高湖久久久久久久久免费观看| 婷婷色综合www| 精品福利永久在线观看| 久久精品久久久久久久性| 日韩伦理黄色片| 亚洲欧美色中文字幕在线| 天堂8中文在线网| 人成视频在线观看免费观看| 伊人久久大香线蕉亚洲五| 久久久精品94久久精品| 最近中文字幕2019免费版| 黄色 视频免费看| www.精华液| 叶爱在线成人免费视频播放| 每晚都被弄得嗷嗷叫到高潮| 丰满人妻熟妇乱又伦精品不卡| 免费观看人在逋| 亚洲专区中文字幕在线| 伦理电影免费视频| 国产成人精品久久久久久| 亚洲精品在线美女| 亚洲欧洲日产国产| 欧美日韩亚洲综合一区二区三区_| 另类精品久久| 2018国产大陆天天弄谢| 人人妻人人澡人人爽人人夜夜| 国产无遮挡羞羞视频在线观看|