2018
DOI: 10.1109/access.2018.2816564
|View full text |Cite
|
Sign up to set email alerts
|

CoDetect: Financial Fraud Detection With Anomaly Feature Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(34 citation statements)
references
References 38 publications
0
29
0
Order By: Relevance
“…Secondly, when the clustering number is n, calculate the centroid c ni (1 ≤ i ≤ k) of samples in each cluster by formula (4).…”
Section: F I G U R E 3 Process Of Selecting the Optimum Clustering Numentioning
confidence: 99%
“…Secondly, when the clustering number is n, calculate the centroid c ni (1 ≤ i ≤ k) of samples in each cluster by formula (4).…”
Section: F I G U R E 3 Process Of Selecting the Optimum Clustering Numentioning
confidence: 99%
“…To identify the fraud, the framework provides a way of sparse matrix. By the help of CoDetect framework, not only the financial fraud supervision can be detected and also by suspicions method it can be able to trace the original fraud [12]. In today's world the fraud detection activity for national economics have become an important task and also in the international economics.…”
Section: Devika S P Nisarga K S Gagana P Rao Chandini S B Rajkumar Nmentioning
confidence: 99%
“…A fraud happens when a unknown user uses somebody's credit card for personal usage and even the issuing banks are unaware of the card being used [11]. The fraudulent of transaction reveals the interactions between entities and anomaly detection on features that detect details of fraud activities [12]. The fraudulent quickly identifies the thresholds and take advantages and exploit the tools which remain static [13].…”
Section: Introductionmentioning
confidence: 99%
“…Graph mining approaches have been used to detect suspicious sets of transactions through graph isomorphism [26], detecting fraudulent behaviour using graph based anomaly detection (GBAD) [27,28], and role based approaches have been used to detect terrorist groups [29]. These approaches are not applicable in the stated context due to the uncertainty and incompleteness present in the data, not to mention the scale of the data, which is significant enough to preclude the use of such supervised learning approaches.…”
Section: Related Workmentioning
confidence: 99%