• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fraud detection on payment transaction networks via graph computing and visualization①

    2020-10-09 07:38:14SunQuan孫權(quán)TangTaoZhengJianbinLinJialeZhaoJintaoLiuHongbao
    High Technology Letters 2020年3期
    關(guān)鍵詞:孫權(quán)

    SunQuan(孫權(quán)),TangTao②,ZhengJianbin**,LinJiale***,ZhaoJintao**,LiuHongbao**

    (*School of Computer Science, Fudan University, Shanghai 200433, P.R.China) (* *China UnionPay Research Institute of Electronic Payment, Shanghai 201201, P.R.China) (* * *School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, P.R.China)

    Abstract

    Key words: payment fraud detection, graph computing, graph embedding, machine learning

    0 Introduction

    Payment has been evolving to a new era whereby the mobile Apps have taken a dominant role in many emerging areas. There are multiple big giants for payment in China including Alipay, UnionPay, etc. With the propensity of the payment mobile Apps, more and more individual users, merchants, and other players have entered this area, many persons are benefiting from the advanced and convenient mobile payment technology and business.

    As a matter of fact, the payment giants have spent large amounts of investment in promoting their payment tools and one of the main promoting ways is to give discount or back cash to individuals who use their payment Apps when do purchase. The payment can either be fulfilled by online and offline, while the online especially mobile Apps are becoming the major channel to attract the public to get used to the new payment habit. The promotion naturally incurs the attackers including both individual users and merchants that take advantage of the promotion events to obtain extra rewards in an unjustified way. For example, the users may intentionally repeat 10 purchase on the same goods in a merchant, which can, in turn, get back cash from the payment service provider, and the user may share this reward with the merchant. In fact, such fraud has become the major concern for payment campaign, which can cause significant loss to payment service providers. As a result, how to effectively detect the underlying fraud makers (including both individual users and merchants) has been a hot research topic in literature, though many focused on other relevant but different domains. This work also focuses on this important problem, and conducts the empirical study on a major payment service provider in China, to verify the idea and the proposed technical approach. In general, this paper aims to make the following highlights:

    ? A graph computing-based approach is proposed for payment fraud detection, particularly in the setting of mobile Apps payment tools. The proposed approach is unsupervised and can work on large-scale transaction networks, whereby the nodes denote both individual users and merchants, and the edges denote the transaction records.

    ? Specifically, the proposed approach consists of the 2 main steps: the first step is to use graph computing to break the giant network into small communities, and the second step is to adopt data visualization to help the investigators pinpoint the risk nodes and edges in a certain time period.

    ? Case study with preliminary experimental results is provided on the real-world dataset from a major payment player in China. The results show that the proposed approach can effectively detect suspicious frauds on large-scale payment networks.

    The rest of the paper is organized as follows. This paper discusses the related work in Section 1. The major technical approach based on network analysis is presented in Section 2. Case study and preliminary experiments are given in Section 3. Conclusion is in Section 4.

    1 Related work

    In this section, related work on fraud detection is presented. In particular, the review will cover different business area for fraud detection as well as the technical approaches including both supervised and unsupervised learning-based methods.

    1.1 Fraud detection business requirements

    Fraud detection has been a long standing task in financial related business. It ranges across multiple industry sectors and researchers from different disciplines have devoted considerable efforts.

    One major business scenario is credit card fraud detection, whereby unlawful transactions by credit cards need be timely detected. Ref.[1] studied the fraudulent credit card transactions occurring among the retail companies in Chile whereby the association rule method is employed. In Ref.[2], the fraud detection score was specially focused to transform it to a probability, which is important for decision making in credit card risk management. Another typical and important sector is automobile. Ref.[3] proposed an expert detection system against the group of collective automobile insurance fraudulent activities. The entities involved in the car insurance fraud can be drivers, chiropractors, garage mechanics, lawyers, police officers, insurance workers and others. In the more recent Ref.[4] showed the fraud detection experience on large-scale e-commerce platforms, based on Alibaba’s large-scale computing system called Open Data Processing Service (ODPS). An anti-fraud system has been developed and verified on 2 large e-commerce datasets with the size of tens of millions of users and items, which is further deployed to Alibaba’s online business Taobao. Fraud can also happen in the online customer reviews, which are assumed to be unbiased opinion of other consumers’ experiences with the items or services. In fact, it is possible that the publishers, writers and vendors consistently manipulate online consumer reviews. And these manipulations can incur significant bias to the potential buyers such that the customers may purchase goods under misleading. To address this issue, Ref.[5] analyzed typical patterns of review manipulation and provided an empirical study on the real-world data from Amazon and Barnes & Noble. For telecom fraud detection, it has been a serious problem in many developing countries, e.g. China, and it is rather difficult to coordinate multiple agencies to avoid fraudulent activities thoroughly. Thus machine learning methods are applied in Ref.[6] to detect the fraudsters. More specifically, they proposed to use generative adversarial network (GAN)[7]based model to estimate the likelihood of a fraud transaction, as such the bank can take some measures to prevent monetary loss. The GAN based model shows promising results against traditional supervised learning models. In the setting of healthcare service, fraud detection has also been a central issue especially given the trend that more and more online payment channels are becoming available. For instance, Ref.[8] disclosed the typical online healthcare service delivery process in China. The fraudsters i.e. third party agents use software robots and script to obtain hospital appointments from the authorized platforms, and then the agents ask for unjustified high price to resell them to the true clients. To tackle this problem, they first use clustering based models to discover the potential user groups from agents, then the profile of user groups are extracted from the event sequence of the users to provide evidence for fraud detection. Moreover, a case study is deployed in a real-world hospital to show its effectiveness and reliability.

    On the other hand, unsupervised models are developed and used for fraud detection, partly due to the lack of labeled samples for training an effective supervised model. Among them, clustering[9,10]is a mainly used technique. The clustering is usually performed on the user profiles to help identify the abnormal users, and the recent advance of deep network-based clustering techniques[11]can be of more help in this direction.

    There are also some technically relevant work on abnormal detection and prediction. For temporal data, Ref.[12]showed a dictionary learning-based model for robust time series anomaly detection. While a more recent work[13]showed failure prediction using both event sequence and time series data. However, this technique can be difficult to be applied in the setting. The main reason is that fraudulent transactions at the individual level are a rare event, which can hardly form a long sequence of events across a long-time period, and so for time series. In addition, it is useful to predict fraud detection rather than detection after fraudulent transactions have happened. In this sense, the early risk prediction model of fraudulent transactions are needed, and there are also a line of work[14-17]on event prediction over time, based on statistical learning models. These directions involving more complicated models are left for future study, given more data can be collected as the business spans.

    1.2 Fraud detection technologies

    From the technical perspective, fraud detection has been a challenging task partly due to the fact that the supervised learning-based models call for enough positive samples including transactions, client individuals and merchants, in comparison with the normal samples. However, in fact, many frauds may happen without being detected hence the positive samples are often a subset of the true whole fraud samples set. This leads to the following problems: 1) the distribution of the positive samples (fraud) and negative samples can be biased; 2) the number of positive samples becomes even smaller as some are not detected, especially compared with those unlimited number of normal samples.

    In literature, different methods are adopted for fraud detection in both supervised and unsupervised learning based ways. When supervision is given, as 2 rather popular machine learning methods, support vector machine (SVM) and Logistic regression (LR) have been applied in fraud detection. While in reality, supervision information is often difficult to acquire, in such cases, unsupervised methods have attracted lots of attention whereby clustering methods have been the dominant techniques.

    1.3 Remarks

    As discussed above, though fraud detection has been a long-standing problem in different financial areas while the study in the context of mobile payment Apps has not been fully explored. In particular, it is an emerging area and China has been one of the major countries for payment tools promotion. Hence it is motivated to take an in-depth study based on real-world business need (as one of the biggest payment players in the world) and rich transaction-related data. In the subsequent sections, a model based on network analysis whereby graph computing has been applied is proposed and case studies are given in detail.

    2 Graph computing based approach for fraud detection

    In this section, the graph computing based pipeline for fraud detection for unjustified profits will be discussed. The deployed method for building the transaction graph will be first described, whereby the graph computing procedure can be performed. This section also briefly discusses other alternative techniques that have been tried while not really adopted for stability and computational tractability issues.

    2.1 Transaction network construction and processing

    In the approach, the transaction network for the payments on a daily basis is built. An overview working flow of the transaction network processing and visualization is shown in Fig.1. The input transaction data is used to build the transaction network first, which is followed by filtering to remove some unimportant edges and nodes. Then community detection e.g. fast-unfolding (Fig.2) is performed to narrow down the study on relatively small communities. In the final stage, there are multiple ways of further analysis, including graph embedding (Fig.3), and rule driven community visualization (Fig.4) for fraud detection.

    Fig.1 Working flow of the transaction network processing and visualization

    2.1.1 Transaction network construction

    Specifically, when there are multiple transactions in one day for a pair of nodes, e.g. between a user and a merchant, these transactions will be aggregated into one edge (or 2 directed edges if the direction is considered), whose attributes store the average transaction amount, mean transaction time, mean transaction between time, and the total number of transactions (in one direction). Note the above statistics can also be conducted on a longer period than one day, e.g. one week or month, which can be applied dependently.

    Fig.2 Illustration for network community detection e.g. via FastUnfolding[18]. The input raw network has been divided by the 3 detected communities by the FastUnfolding method

    Fig.3 Network embedding on the detected community using node2vec[19] for merchants’ transaction networks

    Fig.4 Network visualization and rule checking based on the detected community from the raw networks

    2.1.2 Transaction network filtering

    Then filtering is performed on the formed (aggregated) transaction network, whereby the typical filtering criterion includes the total transaction count, amount, discount, and the between time. The purpose of filtering is to reduce the size of the network by sparsifying its edges and removing some less important nodes. As such the whole network can be cut into a collection of sub-networks, each of which is of a reasonable size for further processing. The filtering mainly involves 2 steps: the first step is to remove the edges whose attributes as stated above are smaller than given thresholds. The nodes with a very limited number of out/in degrees will also be removed in the second step.

    2.2 Fast community detection

    Community detection can be applied on the filtered network as shown in Fig.2, to further break down the large-scale network into small sub networks. As such, more sophisticated measurements can be computed within a reasonable time period to quickly detect the risks. There are many available community detection algorithms, of which one popular method is FastUnfolding[18]. Here is a detailed description of FastUnfolding, whereby the modularity scoreQis defined as follows:

    (1)

    whereiandjindicate the 2 nodes in the network, andAi, jdenotes the weight between the 2 nodes. Whilecijdenotes the community ID that a node is tagged, and the delta functionδ(ci,cj) returns 1 if the 2 nodes are assigned to the same community; otherwise it is set 0.

    ? Initialization: label each node to different communities;

    ? For each node, label it to the community that one of its neighboring nodes belongs to, such that the corresponding modularity score by Eq.(1) is maximized. Then the differenceΔQcompared with the original modularity score is calculated;

    ? IfΔQ>0, accept the latest community division; otherwise, keep the original division;

    ? Repeat the above steps until the modularity scoreQcannot be improved anymore.

    2.3 Detected community embedding and visualization

    One popular method is to embed the community network into vectorized feature representation, for which the scalability issue need be particularly addressed for real-world applications. In fact, there are many new network embedding methods[19-21]which can convert graph vertex into a vectorized feature points in the new space. As such, traditional machine learning methods such as support vector machine, logistic regression and decision tree can be easily reused.

    Another direct and powerful method for fraud detection based on the detected communities is visualization as will also be shown in the case studies. In general, in the detected community, the scale of the graph as well as the edge density is relatively small, hence it is easier to do graph visualization, whereby the bank card accounts and merchants can be shown in different colors to help the investigators quickly discern the abnormal patterns.

    3 Experiments and case study

    In this section, case study and preliminary experimental results on real-world payment data are provided. The data is collected from the major payment service player in China whose registered users have surpassed the number for 2 billion, and every day there are around 3 million transactions. In the proposed approach, the large-scale transaction network has been formed and graph based computing methods are used to detect the potential fraudsters. In consequence, subsequent followups can be taken to further verify the illness of the detected fraudsters.

    3.1 Platform infrastructure

    As the platform needs to support large-scale and efficient (sometimes even real-time) computing and storage, distributed system is used based on popular tools including Hadoop, HIVE, etc. The general overview of the infrastructure system is shown in Fig.5. The data is updated on a daily basis, whereby the daily records are stored on their respective nodes to ensure fast access and consistency. In addition, because the HIVE data warehouse is not friendly to interactive SQL query, the tool Impala is used for the more efficient query, which can achieve a speedup about 10 times.

    3.2 Protocol

    The proposed heterogeneous network involves individual users, merchants, as well as bank card for redistribution of the earned unjustified (monetary) credits.

    3.3 Preliminary qualitative results

    The network has been built by the definition of entities and their relationships. Then some particular sub networks can be visualized. Fig.6 shows 4 typical cases for fraudulent conspiracy among the merchants, individual users with their payment account and the bank card for monetary redistribution. More specifically:

    ? In Fig.6(a), there are 2 central merchants (in light color) to which many payment transactions have been conducted from a large number of individual users (in dark color), and it can be easily discovered that these 2 merchants have high risk for fraudulent behavior and appropriate measures can be taken to perform further investigation on the 2 merchants and the relevant individual accounts.

    ? In Fig.6(b), many individual users pay to the merchant at the promotion period, such that they receive discount or backcash from the payment service provider. And the merchant gets back the unjustified fraud money from the users by a certain ratio, e.g. 50 percentages.

    Fig.5 Overview of the infrastructure system for graph computing based fraud detection on the transaction network

    (a) Two fraudulent merchants (in light color) and their associated users(in deep color), best viewed in color

    (b) Fraudulent patterns by the suspect single bank card for money redistribution (in light color), the users (in deep color) and the merchant (in black)

    (c) Fraudulent patterns by the suspect multiple bank cards for money redistribution (in right nodes), the users (in midnodes) and the merchant (in left nodes)

    (d) Group fraudulent patterns formed by the suspect redistribution bank cards (in left nodes), the users (in midnodes) and the merchant (in right nodes)

    ? While in the example of Fig.6(c), there is no explicit merchant in the network, while the bank cards have an active link with many shared users in a short time period. This suggests the potential fraud group among these entities, such that the earned backcash may be redistributed through this network.

    ? In the 4th example as shown in Fig.6(d), there are also only 4 merchants which have attracted many transactions within a group of users. In addition, there are multiple bank cards for redistribution of the money, this scenario is often more difficult to detect as more entities are involved.

    The network embedding using the node2vec method[19]on a segmented network of merchants is also used. In this way, each merchant is represented by a feature vector. For the convenience and effect of the display, 50 merchants and their associated users project their feature representation further into the 2D plane. The edges in the projected network are created by certain means of the common clients shared by the 2 merchants (when the number exceeds a certain threshold). As shown in Fig.7, on the left, the raw network shows multiple clustering pattern regarding connected components, and such clustering behavior is well preserved in the projected 2D space on the right. This result shows the effectiveness of the adopted node2vec method.

    (a) The input networks with 10 connected components in different colors

    (b) The projection on 2D plane from the embedded feature

    3.4 Summary and discussion

    This paper gives 4 typical cases of fraud pattern which are extracted from a series of network processing including raw transaction network construction based on daily records aggregation, transaction network decomposition based on edge and node filtering and community detection to focus on suspicious networks based on data visualization.

    4 Conclusions

    This paper proposes a principled and effective approach for automatic payment fraud detection in the context of individuals and merchants, whereby a payment transaction network can be established for further analysis of the payment behavior to find suspicious fraud transactions and their latent individuals and merchants in an unsupervised learning manner.

    Specifically, this paper develops a network analysis method to discover the abnormal patterns of transactions over the network in a certain period of time. The design is based on the fact that little labeled data samples are available and there also lacks systematic rules for summarizing the behavior of fraud.

    There are many possible directions for future work. First, in this paper, an unsupervised approach is mainly adopted due to the lack of labels for fraud merchants and individuals. While as the data accumulates, more labels can be obtained and then it is possible to develop supervised learning methods such as decision tree and deep neural networks. Second, fusing multiple networks with different definitions to form a more effective detection pipeline is future direction. For this need, graph matching, especially for multiple graph matching[22,23], and online graph matching[24], can be a possible solution infusing networks with corresponding structures. Third, recently there are many temporal models for behavioral modeling, and one of the promising technique is the so-called temporal point process[25]. A variety of temporal point process models has been witnessed, ranging from classic parametric models[14]to nonparametric models[26]and to deep network based approaches[27-29]. What’s more, combining two-way exploration[30], GAN[31]with the proposed method is one of the future directions. Last but not least, how to learn an interpretable behavioral model[32,33]over time is also the immediate interest.

    猜你喜歡
    孫權(quán)
    三十六計(jì)之反間計(jì)
    任用拆臺的人
    任用拆臺的人
    孫權(quán):“包郵”好有說服力
    七擒孟獲
    任用拆臺的人
    今日文摘(2017年17期)2017-09-28 20:43:56
    孫權(quán)用人,忠誠為先
    PHOTO FINISH
    漢語世界(2017年2期)2017-07-05 14:54:46
    任用拆臺的人
    妙筆繪華章——東吳大帝孫權(quán)紀(jì)念館
    大眾考古(2014年9期)2014-06-21 07:11:08
    色播亚洲综合网| 亚洲第一区二区三区不卡| av专区在线播放| 特大巨黑吊av在线直播| 尤物成人国产欧美一区二区三区| 欧美极品一区二区三区四区| 天堂影院成人在线观看| av专区在线播放| 欧美精品啪啪一区二区三区| 亚洲国产精品合色在线| 99久久九九国产精品国产免费| 22中文网久久字幕| 亚洲综合色惰| 九九热线精品视视频播放| 久久久久久大精品| 99九九线精品视频在线观看视频| 久久久精品欧美日韩精品| 男女边吃奶边做爰视频| 久久久久久国产a免费观看| 丰满乱子伦码专区| 久久久久久大精品| 欧美性猛交╳xxx乱大交人| 免费人成视频x8x8入口观看| 午夜福利视频1000在线观看| 最近中文字幕高清免费大全6 | 免费大片18禁| 国产精华一区二区三区| 熟女人妻精品中文字幕| 日本a在线网址| 国产一区二区在线av高清观看| 久久久午夜欧美精品| 婷婷精品国产亚洲av| 91精品国产九色| 国产精品三级大全| 又紧又爽又黄一区二区| 如何舔出高潮| 91在线精品国自产拍蜜月| 日韩欧美精品v在线| 可以在线观看毛片的网站| 久久人人爽人人爽人人片va| 亚洲美女搞黄在线观看 | 在线免费观看的www视频| 一个人看视频在线观看www免费| 亚洲国产色片| 99九九线精品视频在线观看视频| 久久久久久伊人网av| 国产主播在线观看一区二区| 久久久成人免费电影| 亚洲精品色激情综合| 99热网站在线观看| 五月伊人婷婷丁香| 国产精品免费一区二区三区在线| eeuss影院久久| 99久久精品热视频| 久久久久久久午夜电影| 午夜福利18| 欧美不卡视频在线免费观看| 亚洲第一电影网av| 最近最新免费中文字幕在线| av在线观看视频网站免费| 又黄又爽又免费观看的视频| 麻豆一二三区av精品| 婷婷丁香在线五月| 美女xxoo啪啪120秒动态图| 亚洲人成网站在线播放欧美日韩| 在线播放无遮挡| 国内精品久久久久精免费| 日本撒尿小便嘘嘘汇集6| 国产精品人妻久久久影院| 成人精品一区二区免费| 午夜免费激情av| 在线免费观看的www视频| 特级一级黄色大片| 亚洲avbb在线观看| 岛国在线免费视频观看| 一级a爱片免费观看的视频| 变态另类成人亚洲欧美熟女| 97超级碰碰碰精品色视频在线观看| 我的女老师完整版在线观看| 亚洲经典国产精华液单| 看片在线看免费视频| 国产成人aa在线观看| 国产一区二区三区在线臀色熟女| 午夜福利18| 国产久久久一区二区三区| 久久天躁狠狠躁夜夜2o2o| 久久热精品热| 国产探花极品一区二区| 美女高潮的动态| 天堂动漫精品| 三级国产精品欧美在线观看| 中文亚洲av片在线观看爽| 国产精品国产高清国产av| 日本成人三级电影网站| 美女大奶头视频| 美女黄网站色视频| 舔av片在线| 99riav亚洲国产免费| 亚洲av日韩精品久久久久久密| 国产精品,欧美在线| 国内毛片毛片毛片毛片毛片| 亚洲五月天丁香| 国产69精品久久久久777片| 亚洲欧美日韩高清在线视频| 伦理电影大哥的女人| 亚洲成人久久性| 亚洲精品一区av在线观看| 高清日韩中文字幕在线| 日韩强制内射视频| 综合色av麻豆| 99久久无色码亚洲精品果冻| 色精品久久人妻99蜜桃| 人妻少妇偷人精品九色| 夜夜夜夜夜久久久久| 老司机午夜福利在线观看视频| 夜夜夜夜夜久久久久| 别揉我奶头 嗯啊视频| 久久精品国产鲁丝片午夜精品 | 三级国产精品欧美在线观看| 在线观看av片永久免费下载| 国产午夜福利久久久久久| 成人毛片a级毛片在线播放| 亚洲精品在线观看二区| 日本色播在线视频| 亚洲性夜色夜夜综合| 最近在线观看免费完整版| 亚洲男人的天堂狠狠| 在线播放无遮挡| 小说图片视频综合网站| 午夜影院日韩av| 国产人妻一区二区三区在| 成熟少妇高潮喷水视频| 在线播放无遮挡| 一个人看的www免费观看视频| 悠悠久久av| 两个人的视频大全免费| 国产精品98久久久久久宅男小说| 国产 一区 欧美 日韩| 午夜激情福利司机影院| 在线免费观看不下载黄p国产 | 精品一区二区三区视频在线观看免费| 2021天堂中文幕一二区在线观| 国产乱人视频| 免费观看在线日韩| 97人妻精品一区二区三区麻豆| 丰满乱子伦码专区| 国产精品久久视频播放| 亚洲欧美清纯卡通| 日本a在线网址| 国产成人aa在线观看| 日韩欧美国产在线观看| 可以在线观看毛片的网站| 国产黄片美女视频| 黄色配什么色好看| 欧美最新免费一区二区三区| 动漫黄色视频在线观看| 国产午夜福利久久久久久| 97碰自拍视频| 五月伊人婷婷丁香| 美女高潮喷水抽搐中文字幕| 精品久久国产蜜桃| 日本免费a在线| 成人午夜高清在线视频| 人妻少妇偷人精品九色| 亚洲美女搞黄在线观看 | 欧洲精品卡2卡3卡4卡5卡区| 色综合婷婷激情| 成人永久免费在线观看视频| 国产视频一区二区在线看| 国产极品精品免费视频能看的| 国产精品一区二区性色av| 国产一区二区三区av在线 | 又爽又黄无遮挡网站| 婷婷丁香在线五月| 亚洲第一电影网av| netflix在线观看网站| 久久久久国产精品人妻aⅴ院| 欧美一区二区精品小视频在线| 成人三级黄色视频| 久久这里只有精品中国| 免费电影在线观看免费观看| 久久精品影院6| 校园人妻丝袜中文字幕| 国产精品久久视频播放| 99精品久久久久人妻精品| 春色校园在线视频观看| 变态另类丝袜制服| 日本精品一区二区三区蜜桃| 精华霜和精华液先用哪个| 搡女人真爽免费视频火全软件 | av福利片在线观看| av中文乱码字幕在线| 国产免费av片在线观看野外av| 日韩强制内射视频| 春色校园在线视频观看| 又爽又黄无遮挡网站| 午夜久久久久精精品| 国内精品一区二区在线观看| 精品久久久久久,| 欧美一区二区国产精品久久精品| 国模一区二区三区四区视频| 99久国产av精品| 亚洲中文日韩欧美视频| 欧美激情久久久久久爽电影| 国产精品久久久久久亚洲av鲁大| 国产91精品成人一区二区三区| 欧美成人性av电影在线观看| 别揉我奶头~嗯~啊~动态视频| 黄色欧美视频在线观看| 国产伦一二天堂av在线观看| av国产免费在线观看| 91在线精品国自产拍蜜月| 最新在线观看一区二区三区| 午夜免费男女啪啪视频观看 | 国产黄片美女视频| 97碰自拍视频| 久久久久久久午夜电影| 别揉我奶头~嗯~啊~动态视频| 国产色爽女视频免费观看| 老熟妇乱子伦视频在线观看| 国产一区二区三区av在线 | 欧美最黄视频在线播放免费| 欧美精品啪啪一区二区三区| 日本成人三级电影网站| 在线观看av片永久免费下载| 自拍偷自拍亚洲精品老妇| 成人特级av手机在线观看| 18禁裸乳无遮挡免费网站照片| 亚洲精华国产精华精| 最新在线观看一区二区三区| 大又大粗又爽又黄少妇毛片口| 又紧又爽又黄一区二区| 丰满的人妻完整版| 一进一出好大好爽视频| 乱人视频在线观看| 简卡轻食公司| 国产探花在线观看一区二区| 亚洲精品一卡2卡三卡4卡5卡| 久久精品人妻少妇| 欧美精品国产亚洲| 嫁个100分男人电影在线观看| 一级av片app| 亚洲国产日韩欧美精品在线观看| 日韩一本色道免费dvd| 国国产精品蜜臀av免费| 国产单亲对白刺激| 亚洲欧美日韩东京热| 国产一区二区三区av在线 | 亚洲精品久久国产高清桃花| 免费看日本二区| 欧美日韩国产亚洲二区| 日日啪夜夜撸| 啪啪无遮挡十八禁网站| 久久久久精品国产欧美久久久| 99视频精品全部免费 在线| 九色成人免费人妻av| 成年女人毛片免费观看观看9| 色5月婷婷丁香| 亚洲美女视频黄频| 久久天躁狠狠躁夜夜2o2o| 国产精品野战在线观看| 成人国产一区最新在线观看| 丰满乱子伦码专区| 又爽又黄无遮挡网站| .国产精品久久| 日本精品一区二区三区蜜桃| 免费在线观看成人毛片| 搞女人的毛片| 美女大奶头视频| 久久午夜福利片| 最近最新中文字幕大全电影3| 悠悠久久av| 欧美一区二区国产精品久久精品| 国产精品久久久久久久久免| 人妻制服诱惑在线中文字幕| 日日撸夜夜添| 午夜激情欧美在线| 少妇高潮的动态图| 97超视频在线观看视频| 欧美3d第一页| 一区二区三区激情视频| 久久精品综合一区二区三区| 亚洲男人的天堂狠狠| 我的老师免费观看完整版| 在线观看美女被高潮喷水网站| 亚洲美女搞黄在线观看 | 最新中文字幕久久久久| 国产美女午夜福利| 黄色配什么色好看| 亚洲自偷自拍三级| 少妇人妻精品综合一区二区 | 我要搜黄色片| 最近最新中文字幕大全电影3| 2021天堂中文幕一二区在线观| 两个人视频免费观看高清| 亚洲天堂国产精品一区在线| 国产男靠女视频免费网站| 欧美成人一区二区免费高清观看| a级一级毛片免费在线观看| av国产免费在线观看| 国产人妻一区二区三区在| 国产毛片a区久久久久| 国产高清视频在线观看网站| 女的被弄到高潮叫床怎么办 | 能在线免费观看的黄片| 伦精品一区二区三区| 久久这里只有精品中国| 日韩欧美精品免费久久| 真人做人爱边吃奶动态| 99久久精品热视频| 国产亚洲欧美98| 国产亚洲精品久久久久久毛片| 国产精品日韩av在线免费观看| 一级黄片播放器| 亚洲av五月六月丁香网| 精品午夜福利在线看| 三级毛片av免费| 老熟妇乱子伦视频在线观看| 狂野欧美激情性xxxx在线观看| 别揉我奶头 嗯啊视频| 日韩一本色道免费dvd| 亚洲内射少妇av| 欧美日韩精品成人综合77777| 免费人成视频x8x8入口观看| 亚洲人成网站高清观看| 精品人妻偷拍中文字幕| 国产一区二区亚洲精品在线观看| 欧美色欧美亚洲另类二区| 亚洲av五月六月丁香网| 久久久久久久久久黄片| 一本一本综合久久| 中文字幕av在线有码专区| 国产男靠女视频免费网站| 久久6这里有精品| 中文在线观看免费www的网站| 国产老妇女一区| a级毛片免费高清观看在线播放| 成年免费大片在线观看| 国产伦在线观看视频一区| 黄片wwwwww| 春色校园在线视频观看| 欧美潮喷喷水| 免费观看在线日韩| 国产欧美日韩精品亚洲av| 国产亚洲av嫩草精品影院| 亚洲人成网站高清观看| 欧美一区二区精品小视频在线| 露出奶头的视频| bbb黄色大片| 久久久久免费精品人妻一区二区| 国产午夜精品久久久久久一区二区三区 | 日韩欧美在线乱码| 亚洲av中文av极速乱 | 日韩国内少妇激情av| 亚洲欧美日韩东京热| 精品一区二区三区视频在线观看免费| 国产欧美日韩精品亚洲av| 一级黄片播放器| 免费无遮挡裸体视频| 日韩欧美三级三区| 一进一出抽搐动态| 亚洲性久久影院| 亚洲成人中文字幕在线播放| 两性午夜刺激爽爽歪歪视频在线观看| 免费在线观看影片大全网站| 国产一区二区亚洲精品在线观看| 国内精品久久久久久久电影| 少妇熟女aⅴ在线视频| 国产精品一及| 美女 人体艺术 gogo| 天天一区二区日本电影三级| 久久中文看片网| 狂野欧美白嫩少妇大欣赏| 成人高潮视频无遮挡免费网站| 99久久中文字幕三级久久日本| 日韩 亚洲 欧美在线| 日韩,欧美,国产一区二区三区 | 99热网站在线观看| 成人av在线播放网站| 欧美日韩国产亚洲二区| 久久亚洲精品不卡| 给我免费播放毛片高清在线观看| 免费一级毛片在线播放高清视频| 久久人人精品亚洲av| 一区二区三区免费毛片| 精品国内亚洲2022精品成人| 2021天堂中文幕一二区在线观| 欧美黑人巨大hd| 国产色爽女视频免费观看| 欧美又色又爽又黄视频| а√天堂www在线а√下载| 尤物成人国产欧美一区二区三区| 一进一出抽搐gif免费好疼| 男女之事视频高清在线观看| 国产av一区在线观看免费| 悠悠久久av| 一夜夜www| 女的被弄到高潮叫床怎么办 | 中亚洲国语对白在线视频| 欧美一级a爱片免费观看看| 欧美日本亚洲视频在线播放| 成人无遮挡网站| a级一级毛片免费在线观看| 国产一区二区在线观看日韩| 久久九九热精品免费| 欧美人与善性xxx| 少妇丰满av| 别揉我奶头~嗯~啊~动态视频| 久久精品国产亚洲av涩爱 | 色尼玛亚洲综合影院| 1000部很黄的大片| 国产黄色小视频在线观看| 日本一本二区三区精品| 成人国产一区最新在线观看| 免费人成视频x8x8入口观看| 国内精品久久久久精免费| 国产精品无大码| 国产亚洲精品久久久com| 国产精品不卡视频一区二区| 日本 av在线| 精品人妻熟女av久视频| 国产毛片a区久久久久| 少妇的逼好多水| 国产精品久久电影中文字幕| 久久热精品热| 毛片一级片免费看久久久久 | 国产精品久久久久久久电影| 听说在线观看完整版免费高清| 国产精品永久免费网站| 久久久久久九九精品二区国产| 日韩av在线大香蕉| 观看免费一级毛片| 精品人妻1区二区| 午夜免费激情av| 尾随美女入室| 他把我摸到了高潮在线观看| 在线免费观看不下载黄p国产 | 一个人免费在线观看电影| 久久国产精品人妻蜜桃| 国产精品福利在线免费观看| 色播亚洲综合网| 在线观看舔阴道视频| 99久久中文字幕三级久久日本| x7x7x7水蜜桃| 黄色日韩在线| 12—13女人毛片做爰片一| 国产一区二区在线av高清观看| 啦啦啦啦在线视频资源| 国产精品亚洲一级av第二区| 国产精品日韩av在线免费观看| 校园春色视频在线观看| av在线蜜桃| 日本a在线网址| 日韩大尺度精品在线看网址| 精华霜和精华液先用哪个| 熟女人妻精品中文字幕| 99热这里只有是精品50| 免费看a级黄色片| 久久久久九九精品影院| 熟妇人妻久久中文字幕3abv| 国产精品国产三级国产av玫瑰| 在线看三级毛片| 不卡一级毛片| 国产伦人伦偷精品视频| 成人综合一区亚洲| 亚洲精品成人久久久久久| 男人和女人高潮做爰伦理| netflix在线观看网站| 免费不卡的大黄色大毛片视频在线观看 | 天堂网av新在线| 97人妻精品一区二区三区麻豆| 亚洲av免费高清在线观看| 欧美不卡视频在线免费观看| 国产黄a三级三级三级人| 女的被弄到高潮叫床怎么办 | 久久6这里有精品| 亚洲精华国产精华液的使用体验 | 在线播放国产精品三级| 久久久久久九九精品二区国产| 久久午夜福利片| 国产成人一区二区在线| 亚洲国产欧洲综合997久久,| 亚洲av电影不卡..在线观看| 男女啪啪激烈高潮av片| 桃红色精品国产亚洲av| 久久精品国产亚洲av涩爱 | 婷婷六月久久综合丁香| 国产中年淑女户外野战色| 亚洲国产高清在线一区二区三| 一区二区三区四区激情视频 | 国产一区二区激情短视频| 亚洲图色成人| 亚洲自拍偷在线| 别揉我奶头~嗯~啊~动态视频| 国产高清不卡午夜福利| 天天躁日日操中文字幕| 亚洲午夜理论影院| 波多野结衣高清作品| 亚洲图色成人| 国产精品无大码| 无人区码免费观看不卡| 久久香蕉精品热| 免费搜索国产男女视频| 免费av观看视频| 久久中文看片网| 国产精品久久电影中文字幕| 午夜福利18| 国产麻豆成人av免费视频| 一个人看的www免费观看视频| 偷拍熟女少妇极品色| 色综合婷婷激情| 国产精品女同一区二区软件 | 欧美日韩中文字幕国产精品一区二区三区| 成人一区二区视频在线观看| 深夜精品福利| 国内精品久久久久精免费| 99久久精品热视频| 国产精品久久久久久久久免| 亚洲 国产 在线| 久久国内精品自在自线图片| 欧美激情久久久久久爽电影| 日韩强制内射视频| 国产欧美日韩精品一区二区| 高清日韩中文字幕在线| 特大巨黑吊av在线直播| 自拍偷自拍亚洲精品老妇| 国产人妻一区二区三区在| 亚洲第一区二区三区不卡| 亚洲五月天丁香| 欧美激情久久久久久爽电影| 超碰av人人做人人爽久久| 欧美高清成人免费视频www| 天堂√8在线中文| 国产又黄又爽又无遮挡在线| 一a级毛片在线观看| 国产视频内射| 又粗又爽又猛毛片免费看| 简卡轻食公司| 夜夜看夜夜爽夜夜摸| 亚洲精品影视一区二区三区av| 国产精品乱码一区二三区的特点| a级毛片a级免费在线| 国产精品电影一区二区三区| 天堂√8在线中文| 精品一区二区三区av网在线观看| 免费电影在线观看免费观看| 精品久久久久久成人av| 97人妻精品一区二区三区麻豆| 国产69精品久久久久777片| 大型黄色视频在线免费观看| 精品欧美国产一区二区三| 日本-黄色视频高清免费观看| 国产精品久久视频播放| 欧美精品啪啪一区二区三区| 免费看美女性在线毛片视频| 中文字幕高清在线视频| 亚洲自偷自拍三级| 又爽又黄a免费视频| 成人三级黄色视频| 99国产精品一区二区蜜桃av| 国产伦精品一区二区三区四那| 色吧在线观看| 九九爱精品视频在线观看| 国产一区二区在线观看日韩| 美女 人体艺术 gogo| 黄色配什么色好看| 日韩强制内射视频| 成人美女网站在线观看视频| 久久精品人妻少妇| 俺也久久电影网| 欧美日韩综合久久久久久 | 成人亚洲精品av一区二区| 精品久久久久久,| 女人被狂操c到高潮| 美女免费视频网站| 国产69精品久久久久777片| 日本五十路高清| 在线免费观看不下载黄p国产 | 亚洲四区av| 亚洲中文字幕一区二区三区有码在线看| 亚洲精品久久国产高清桃花| 精品不卡国产一区二区三区| 亚洲精品久久国产高清桃花| 在线观看免费视频日本深夜| 国产成人影院久久av| 国产视频一区二区在线看| 亚洲黑人精品在线| 看十八女毛片水多多多| 免费人成视频x8x8入口观看| 少妇高潮的动态图| 日韩av在线大香蕉| 又紧又爽又黄一区二区| 99九九线精品视频在线观看视频| 91在线观看av| 深爱激情五月婷婷| 欧美激情国产日韩精品一区| 日韩欧美免费精品| 久久久久久久久久成人| 99国产精品一区二区蜜桃av| 99久久九九国产精品国产免费| 色播亚洲综合网| 婷婷精品国产亚洲av| 97热精品久久久久久| 国产视频一区二区在线看| 俺也久久电影网| 成人av一区二区三区在线看| 人妻少妇偷人精品九色| 大型黄色视频在线免费观看| 美女 人体艺术 gogo| 午夜免费成人在线视频| 夜夜夜夜夜久久久久| 久久国产乱子免费精品| 成人亚洲精品av一区二区| 亚洲综合色惰| 欧美一级a爱片免费观看看|