{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:06:54Z","timestamp":1755598014858,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030522452"},{"type":"electronic","value":"9783030522469"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52246-9_21","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"301-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Enhancing Credit Card Fraud Detection Using Deep Neural Network"],"prefix":"10.1007","author":[{"given":"Souad Larabi","family":"Marie-Sainte","sequence":"first","affiliation":[]},{"given":"Mashael Bin","family":"Alamir","sequence":"additional","affiliation":[]},{"given":"Deem","family":"Alsaleh","sequence":"additional","affiliation":[]},{"given":"Ghazal","family":"Albakri","sequence":"additional","affiliation":[]},{"given":"Jalila","family":"Zouhair","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"key":"21_CR1","unstructured":"Inc. US Legal. Internet fraud law and legal definition"},{"key":"21_CR2","unstructured":"U.S. payment card fraud losses by type 2018 | statistic"},{"key":"21_CR3","doi-asserted-by":"publisher","DOI":"10.1201\/9781315371658","volume-title":"Machine Learning: Algorithms and Applications","author":"M Mohammed","year":"2016","unstructured":"Mohammed, M., Khan, M.B., Bashier, E.B.M.: Machine Learning: Algorithms and Applications. Crc Press, Boca Raton (2016)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Xuan, S., Liu, G., Li, Z., Zheng, L., Wang, S., Jiang, C.: Random forest for credit card fraud detection. In 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICNSC.2018.8361343"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Roy, A., Sun, J., Mahoney, R., Alonzi, L., Adams, S., Beling, P.: Deep learning detecting fraud in credit card transactions. In: Systems and Information Engineering Design Symposium (SIEDS), pp. 129\u2013134 (2018)","DOI":"10.1109\/SIEDS.2018.8374722"},{"key":"21_CR6","unstructured":"Machine Learning: the Power and Promise of Computers That Learn by Example. The Royal Society, 2017, Machine Learning: the Power and Promise of Computers That Learn by Example. \nroyalsociety.org\/~\/media\/policy\/projects\/machine-learning\/publications\/machine-learning-report.pdf"},{"key":"21_CR7","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A., Bengio, Y.: Deep Learning, vol. 1. MIT press, Cambridge (2016)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Lu, Y.: Deep Neural Networks and Fraud Detection (2017)","DOI":"10.1155\/2017\/1376726"},{"key":"21_CR9","unstructured":"Gandhi, R.: Introduction to Sequence Models - RNN, Bidirectional RNN, LSTM, GRU. Towards Data Science, Towards Data Science, 26 June 2018. \ntowardsdatascience.com\/introduction-to-sequence-models-rnn-bidirectional-rnn-lstm-gru-73927ec9df15"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Charleonnan, A.: Credit card fraud detection using RUS and MRN algorithms. In: Management and Innovation Technology International Conference (MITicon), 2016, pp. MIT-73. IEEE (2016)","DOI":"10.1109\/MITICON.2016.8025244"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.engappai.2016.12.002","volume":"65","author":"C Luo","year":"2017","unstructured":"Luo, C., Desheng, W., Dexiang, W.: A deep learning approach for credit scoring using credit default swaps. Eng. Appl. Artif. Intell. 65, 465\u2013470 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Y., Ye, Z., Yan, L., Cai, W., Pan, S.: Credit card fraud detection based on whale algorithm optimized bp neural network. In: 2018 13th International Conference on Computer Science & Education (ICCSE), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/ICCSE.2018.8468855"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Ghobadi, F., Rohani, M.: Cost sensitive modeling of credit card fraud using neural network strategy. In: International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/ICSPIS.2016.7869880"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TPAMI.2017.2695539","volume":"40","author":"X-Y Zhang","year":"2018","unstructured":"Zhang, X.-Y., Yin, F., Zhang, Y.-M., Liu, C.-L., Bengio, Y.: Drawing and recognizing Chinese characters with recurrent neural network. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 849\u2013862 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"21_CR15","unstructured":"Yogatama, D., Dyer, C., Ling, W., Blunsom, P.: Generative and discriminative text classification with recurrent neural networks. arXiv preprint \narXiv:1703.01898\n\n (2017)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Toderici, G., Vincent, D., Johnston, N., Hwang, S.J., Minnen, D., Shor, J., Covell, M.: Full resolution image compression with recurrent neural networks. In: CVPR, pp. 5435\u20135443 (2017)","DOI":"10.1109\/CVPR.2017.577"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Choi, K., Fazekas, G., Sandler, M., Cho, K.: Convolutional recurrent neural networks for music classification. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2392\u20132396. IEEE (2017)","DOI":"10.1109\/ICASSP.2017.7952585"},{"key":"21_CR18","unstructured":"Kaggle: Your home for data science. \nhttps:\/\/www.kaggle.com"},{"key":"21_CR19","unstructured":"Tom SweersCredit Card Fraud. Radboud University, Bachelor thesis Computer Science (2018)"},{"issue":"4","key":"21_CR20","doi-asserted-by":"publisher","first-page":"4573","DOI":"10.22214\/ijraset.2018.4749","volume":"6","author":"H Naik","year":"2018","unstructured":"Naik, H.: Credit card fraud detection for online banking transactions. Int. J. Res. Appl. Sci. Eng. Technol. 6(4), 4573\u20134577 (2018)","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Behera, T.K., Panigrahi, S.: Credit card fraud detection using a neuro-fuzzy expert system. In: Computational Intelligence in Data Mining, pp. 835\u2013843. Springer, Singapore (2017)","DOI":"10.1007\/978-981-10-3874-7_79"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Save, P., Tiwarekar, P., Jain, K.N., Mahyavanshi, N.: A novel idea for credit card fraud detection using decision tree. Int. J. Comput. Appl. 161(13) (2017)","DOI":"10.5120\/ijca2017913413"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.dss.2017.01.002","volume":"95","author":"N Carneiro","year":"2017","unstructured":"Carneiro, N., Figueira, G., Costa, M.: A data mining based system for credit-card fraud detection in e-tail. Decis. Support Syst. 95, 91\u2013101 (2017)","journal-title":"Decis. Support Syst."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Maniraj, S.P., Aditya, S., Shadab, A., Deep Sarkar, S.: Credit card fraud detection using machine learning and data science. Int. J. Eng. Res. Technol. (IJERT) 08(09), September 2019","DOI":"10.17577\/IJERTV8IS090031"},{"key":"21_CR25","unstructured":"Renstrom, M., Holmsten, T.: Fraud Detection on Unlabeled Data with Unsupervised Machine Learning. The Royal Institute of Technology (2018)"},{"issue":"1","key":"21_CR26","first-page":"18","volume":"9","author":"A Pumsirirat","year":"2018","unstructured":"Pumsirirat, A., Yan, L.: Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine. Int. J. Adv. Comput. Sci. Appl. 9(1), 18\u201325 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"21_CR27","unstructured":"Reshma, R.S.: Deep learning enabled fraud detection in credit card transactions. Int. J. Res. Sci. Innov. (IJRSI) V(VII), 111\u2013115 (2018)"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Kazemi, Z., Zarrabi, H.: Using deep networks for fraud detection in the credit card transactions. In: 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), pp. 0630\u20130633. IEEE (2017)","DOI":"10.1109\/KBEI.2017.8324876"},{"issue":"5","key":"21_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/jamcs\/2019\/v33i530192","volume":"33","author":"M Al-Shabi","year":"2019","unstructured":"Al-Shabi, M.: Credit card fraud detection using autoencoder model in unbalanced datasets. J. Adv. Math. Comput. Sci. 33(5), 1\u201316 (2019). \nhttps:\/\/doi.org\/10.9734\/jamcs\/2019\/v33i530192","journal-title":"J. Adv. Math. Comput. Sci."},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Fu, K., Cheng, D., Tu, Y., Zhang, L.: Credit card fraud detection using convolutional neural networks. In: International Conference on Neural Information Processing, pp. 483\u2013490. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-46675-0_53"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Pozzolo, A.D., Caelen, O., Johnson, R.A., Bontempi, G.: Calibrating probability with undersampling for unbalanced classification. In: 2015 IEEE Symposium Series on Computational Intelligence, pp. 159\u2013166. IEEE (2015)","DOI":"10.1109\/SSCI.2015.33"},{"key":"21_CR32","unstructured":"Financial Transaction Card Originated Messages, document ISO 8583-1 (2003). \nhttps:\/\/www.iso.org\/standard\/31628.html"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52246-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T23:04:52Z","timestamp":1593817492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52246-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522452","9783030522469"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52246-9_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}