2015
DOI: 10.3103/s1060992x15030030
|View full text |Cite
|
Sign up to set email alerts
|

Payment card fraud detection using neural network committee and clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Shen et al proposed a deep learning model composed of a long-short-term-memory (LSTM) network and the adaptive boosting (AdaBoost) algorithm for evaluating credit risk and applied an improved synthetic minority oversampling technique (SMOTE) to address dataset imbalances effectively [13]. Bekirev et al proposed the Financial Service scenario Deep learning based Behavior data representation method for Clustering (FinDeepBehaviorCluster) approach for detecting fraudulent e-commerce transactions using unstructured behavioral sequence data [14]. Wassan et al evaluated the detection performances of fraudulent transaction detection methods based on various machine learning algorithms [15], including SVM, k-nearest neighbors clustering, RF, decision tree (DT), and a multilayer perceptron (MLP) network, when applied to large e-commerce and e-banking datasets, and the method based on the MLP network attained the highest precision of 97%.…”
Section: Related Researchmentioning
confidence: 99%
“…Shen et al proposed a deep learning model composed of a long-short-term-memory (LSTM) network and the adaptive boosting (AdaBoost) algorithm for evaluating credit risk and applied an improved synthetic minority oversampling technique (SMOTE) to address dataset imbalances effectively [13]. Bekirev et al proposed the Financial Service scenario Deep learning based Behavior data representation method for Clustering (FinDeepBehaviorCluster) approach for detecting fraudulent e-commerce transactions using unstructured behavioral sequence data [14]. Wassan et al evaluated the detection performances of fraudulent transaction detection methods based on various machine learning algorithms [15], including SVM, k-nearest neighbors clustering, RF, decision tree (DT), and a multilayer perceptron (MLP) network, when applied to large e-commerce and e-banking datasets, and the method based on the MLP network attained the highest precision of 97%.…”
Section: Related Researchmentioning
confidence: 99%
“…As emerging of new technologies, new innovations are inevitable for detecting the fraudulent transaction because fraudsters are committing fraudulent transaction in a new way every time. The various techniques are used to find the fraudulent transaction such as hidden Markov model (Agrawal et al, 2015;Prakash and Chandrasekar, 2015;Dhok and Bamnote, 2012;Prakash and Chandrasekar, 2012;Khan et al, 2014b), artificial neural network (Behera and Panigrahi, 2015;Bekirev et al, 2015;Carneiro et al, 2015;Van Vlasselaer et al, 2015;Khan et al, 2014a;Brause et al, 1999;Aleskerov et al, 1997), big data (Chen et al, 2015), genetic (Assis et al, 2014;Ramakalyani and Umadevi, 2012;Duman and Ozcelik, 2011), artificial immune system (Halvaiee and Akbari, 2014;Soltani et al, 2012), Bayesian (Singh and Singh, 2015;Renuga et al, 2014;Panigrahi et al, 2009), migrating bird optimization , data mining (Philip and Sherly, 2012) and others (Sánchez et al, 2009;Quah and Sriganesh, 2008;Bentley et al, 2000;Ganji and Mannem,2012). Every methodology has its own characteristics with their Automated fraud detection techniques advantages and disadvantages.…”
Section: Fraud Detection Techniquesmentioning
confidence: 99%
“…Other two supervised approaches are [44], and [3]. The first proposes a dynamic model which is updated with a sliding window approach.…”
Section: Related Workmentioning
confidence: 99%
“…To solve our optimization problem, we formalized it with the "AMPL modeling language" 3 . As solver we used the "IBM CPLEX solver" 4 thakt exploits the well known simplex method to solve optimization problems.…”
Section: Definition 61 (Mimicry Attack)mentioning
confidence: 99%