2018
DOI: 10.1007/s40595-018-0116-x
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid mobile call fraud detection model using optimized fuzzy C-means clustering and group method of data handling-based network

Abstract: A novel two-stage fraud detection system in mobile telecom networks has been presented in this paper that identifies the malicious calls among the normal ones in two stages. Initially, a genetic algorithm-based optimized fuzzy c-means clustering is applied to the user's historical call records for constructing the calling profile. Thereafter, the identification of the fraudulent calls occurs in two stages. In the first stage, each incoming call is passed to the clustering module that identifies the call as gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Finally, some studies combine two or more algorithms to improve the classifier; in this approach, one algorithm works as a preprocessing mechanism to create a user profile, and the second algorithm is used to take these generated user profile clusters as input to the SVM classifier, as in [ 128 , 130 ]. Another example is studies [ 122 , 124 ], which use multiple algorithms, where unsupervised algorithms such as k-means and PCA are used for feature dimensionality reduction and supervised algorithms such as SVM and RF are selected according to which will achieve the best classification results.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, some studies combine two or more algorithms to improve the classifier; in this approach, one algorithm works as a preprocessing mechanism to create a user profile, and the second algorithm is used to take these generated user profile clusters as input to the SVM classifier, as in [ 128 , 130 ]. Another example is studies [ 122 , 124 ], which use multiple algorithms, where unsupervised algorithms such as k-means and PCA are used for feature dimensionality reduction and supervised algorithms such as SVM and RF are selected according to which will achieve the best classification results.…”
Section: Discussionmentioning
confidence: 99%
“…Fraud detection is used to detect fraudulent activities in telecommunications companies. For example, [ 128 ] and [ 130 ] detected fraudulent calls in mobile telecommunication networks based on extracting mobile subscribers’ calling behaviors. To depict subscribers’ calling behaviors, the authors extracted calling features from CDRs data, such as type of calls, call duration, frequency of a call, and call timestamp, which were later used to help classify mobile subscribers into three categories: genuine, fraudulent, and suspicious.…”
Section: Research Opportunitiesmentioning
confidence: 99%
“…Let a denote input vector of a data object, which can be encoded to a feature representation b by a nonlinear activation function f θ , as shown in (3).…”
Section: Autoencoder (Ae)mentioning
confidence: 99%
“…Clustering analysis, an important unsupervised data analysis and data mining approaches, has been studied extensively and applied successfully to various domains, such as gene expression analysis [1,2], fraud detection [3], imagine segmentation [4], and document mining [5,6]. The basic clustering algorithms mainly group data objects into different clusters based on the similarities between objects in original data space, making objects in the same cluster are more similar while those in different clusters are more dissimilar.…”
Section: Introductionmentioning
confidence: 99%
“…Telecommunications companies often experience huge financial losses due to fraud incidents caused by their services, and this makes the importance of fraud detection to ASTESJ ISSN: 2415-6698 reduce the impact of this risk [7]. Fraud on telecommunications can be divided into several types, and the most typical is accessing calls using the original customer account to make fraudulent calls [8]. Imagine an unknown call from a local number, and that from a friend or family who lives abroad, it's really strange to receive international calls from a local number, basically this also fraud [9].…”
Section: Introductionmentioning
confidence: 99%