2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT) 2015
DOI: 10.1109/wi-iat.2015.13
|View full text |Cite
|
Sign up to set email alerts
|

A Fraud Detection Model Based on Feature Selection and Undersampling Applied to Web Payment Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 12 publications
0
6
0
1
Order By: Relevance
“…However, among these primary studies, there is sufficient evidence that SLR studies on data preprocessing are lacking, as indicated by the fact that only 2% of the primary studies considered in this study followed SLR guidelines. This finding [136] N P N Y 1.5 [105] N N N Y 1.0 [86] N Y N Y 2.0 [137] N N N Y 1.0 [106] N P N Y 1.5 [83] N Y N Y 2.0 [138] N P N Y 1.5 [139] N P N Y 1.5 [140] N N N Y 1.0 [68] N Y N Y 2.0 [141] N P N Y 1.5 [142] N P N Y 1.5 [67] N P N Y 1.5 [90] N P N Y 1.5 [50] N P N Y 1.5 [53] N N N Y 1.0 [52] N P N Y 1.5 [47] N P N Y 1.5 [48] N N N Y 1.0 [143] N P N Y 1.5 [117] N Y N Y 2.0 [144] N N N Y 1.0 [145] N P N Y 1.5 [73] Y Y Y Y 4.0 [146] N P N Y 1.5 [147] N P N Y 1.5 [148] N N N Y 1.0 [149] N P N Y 1.5 [150] N P N Y 1.5 [60] N P N Y 1.5 [151] N N N Y 1.0 [152] N P N Y 1.5 [153] N N N Y 1.0 [154] N N N Y 1.0 [155] N N N Y 1.0 [156] N N N Y 1.0 [157] N N N Y 1.0 [158] N P N Y 1.5 [159] N N N Y 1.0 [160] N N N Y 1.0 [161] N N N Y 1.0 [162] N N N Y 1.0…”
Section: What Are the Limitations Of Current Research?mentioning
confidence: 63%
“…However, among these primary studies, there is sufficient evidence that SLR studies on data preprocessing are lacking, as indicated by the fact that only 2% of the primary studies considered in this study followed SLR guidelines. This finding [136] N P N Y 1.5 [105] N N N Y 1.0 [86] N Y N Y 2.0 [137] N N N Y 1.0 [106] N P N Y 1.5 [83] N Y N Y 2.0 [138] N P N Y 1.5 [139] N P N Y 1.5 [140] N N N Y 1.0 [68] N Y N Y 2.0 [141] N P N Y 1.5 [142] N P N Y 1.5 [67] N P N Y 1.5 [90] N P N Y 1.5 [50] N P N Y 1.5 [53] N N N Y 1.0 [52] N P N Y 1.5 [47] N P N Y 1.5 [48] N N N Y 1.0 [143] N P N Y 1.5 [117] N Y N Y 2.0 [144] N N N Y 1.0 [145] N P N Y 1.5 [73] Y Y Y Y 4.0 [146] N P N Y 1.5 [147] N P N Y 1.5 [148] N N N Y 1.0 [149] N P N Y 1.5 [150] N P N Y 1.5 [60] N P N Y 1.5 [151] N N N Y 1.0 [152] N P N Y 1.5 [153] N N N Y 1.0 [154] N N N Y 1.0 [155] N N N Y 1.0 [156] N N N Y 1.0 [157] N N N Y 1.0 [158] N P N Y 1.5 [159] N N N Y 1.0 [160] N N N Y 1.0 [161] N N N Y 1.0 [162] N N N Y 1.0…”
Section: What Are the Limitations Of Current Research?mentioning
confidence: 63%
“…Mengingat maraknya penipuan pada situs e-commerce yang dapat mengakibatkan kerugian finansial yang cukup besar, sebagai konsumen perlu adanya pengetahuan mengenai jenis penipuan yang umum terjadi dan metode pencegahan yang digunakan untuk mendeteksi penipuan agar terhindar dari berbagai kerugian. Beberapa penelitian sebelumnya hanya membahas tentang identifikasi dan metode pencegahan penipuan e-commerce ( Makarti, 2011;Chang & Chang, 2012;Syed & Shabbir, 2013;Valentin, 2013;Caldeira, Brandao, & Pereira, 2014;Leung, Lai, Chen, & Wan, 2014;Massa & Valverde, 2014;Hwang & Lai, 2015;JRana & Baria, 2015;Singh & Singh, 2015;Abdallah, Maarof, & Zainal, 2016;Beránek, Nýdl, & Remeš, 2016;Gerlach, Pavlovic, & Gerlach, 2016;Lima & Pereira, 2016;Yang et al, 2016;Ramadhan & Amelia, 2016;Sun et al, 2017;Prisha, Neo, Ong, & Teo, 2017;Raghava-Raju, 2017;Shaji & Panchal, 2017;Wiralestari, 2017;Renjith, 2018;Weng et al, 2018;Zhao et al, 2018;Zheng et al, 2018); Amasiatu Amiruddin et al, 2019;Carta et al, 2019;Raghavan & Gayar, 2019;Shah et al, 2019;Soomro et al, 2019. Sementara penelitian lainnya lebih fokus pada penipuan sistem pembayaran dan penipuan terkait dengan pelanggan (Keraf & Hidup, 2010;Rofiq & Mula, 2010;Raj & Portia, 2011;Hu, Liu, & Sambamurthy, 2011;…”
Section: Pendahuluanunclassified
“…Imbalanced data is perversive in all aspects of our living life, e.g., cancer gene data from hospitals for health examination [1], software defect data generated by defect detecting software [2] and telecommunication fraud data [3], [4] formed in telecommunication systems, which can be classified into different categories, the aforementioned data are called imbalanced data [5]. Generally speaking, machine learning approaches use a large amount of sample data to train…”
Section: Introductionmentioning
confidence: 99%