{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:06:22Z","timestamp":1772121982175,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031104633","type":"print"},{"value":"9783031104640","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10464-0_14","type":"book-chapter","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T13:04:06Z","timestamp":1657112646000},"page":"214-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Ensemble-Based Machine Learning for\u00a0Predicting Fraud of\u00a0Credit Card Transactions"],"prefix":"10.1007","author":[{"given":"Tahani","family":"Baabdullah","sequence":"first","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Chunmei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Amani","family":"Alzahrani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/23080477.2020.1783491","volume":"8","author":"M Arya","year":"2020","unstructured":"Arya, M., Sastry, G.H.: DEAL-\u2018deep ensemble algorithm\u2019 framework for credit card fraud detection in real-time data stream with google TensorFlow. Smart Sci. 8(2), 71\u201383 (2020)","journal-title":"Smart Sci."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Awoyemi, J.O., Adetunmbi, A.O., Oluwadare, S.A.: Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 International Conference on Computing Networking and Informatics (ICCNI), pp. 1\u20139 (2017)","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"14_CR4","unstructured":"Baabdullah, T., Alzahrani, A., Rawat, D.B.: On the comparative study of prediction accuracy for credit card fraud detection with imbalanced classifications. In: 2020 Spring Simulation Conference (SpringSim), pp. 1\u201312 (2020)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.inffus.2017.09.005","volume":"41","author":"F Carcillo","year":"2018","unstructured":"Carcillo, F., Dal Pozzolo, A., Le Borgne, Y.-A., Caelen, O., Mazzer, Y., Bontempi, G.: SCARFF: a scalable framework for streaming credit card fraud detection with spark. Inf. Fusion 41, 182\u2013194 (2018)","journal-title":"Inf. Fusion"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2021","unstructured":"Carcillo, F., Le Borgne, Y.-A., Caelen, O., Kessaci, Y., Obl\u00e9, F., Bontempi, G.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. 557, 317\u2013331 (2021)","journal-title":"Inf. Sci."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Dighe, D., Patil, S., Kokate, S.: Detection of credit card fraud transactions using machine learning algorithms and neural networks: a comparative study. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICCUBEA.2018.8697799"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/jrfm11010012","volume":"11","author":"S Hamori","year":"2018","unstructured":"Hamori, S., Kawai, M., Kume, T., Murakami, Y., Watanabe, C.: Ensemble learning or deep learning? Application to default risk analysis. J. Risk Financ. Manag. 11(1), 12 (2018)","journal-title":"J. Risk Financ. Manag."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.eswa.2018.01.037","volume":"100","author":"J Jurgovsky","year":"2018","unstructured":"Jurgovsky, J., et al.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234\u2013245 (2018)","journal-title":"Expert Syst. Appl."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Modi, K., Dayma, R.: Review on fraud detection methods in credit card transactions. In: 2017 International Conference on Intelligent Computing and Control (I2C2), pp. 1\u20135 (2017)","DOI":"10.1109\/I2C2.2017.8321781"},{"issue":"6","key":"14_CR11","first-page":"863","volume":"6","author":"A Motwani","year":"2018","unstructured":"Motwani, A., Bajaj, G., Mohane, S.: Predictive modelling for credit risk detection using ensemble method. Int. J. Comput. Sci. Eng. 6(6), 863\u2013867 (2018)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCAS.2006.1688199","volume":"6","author":"R Polikar","year":"2006","unstructured":"Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21\u201345 (2006)","journal-title":"IEEE Circ. Syst. Mag."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Popat, R.R., Chaudhary, J.: A survey on credit card fraud detection using machine learning. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1120\u20131125 (2018)","DOI":"10.1109\/ICOEI.2018.8553963"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"14277","DOI":"10.1109\/ACCESS.2018.2806420","volume":"6","author":"K Randhawa","year":"2018","unstructured":"Randhawa, K., Loo, C.K., Seera, M., Lim, C.P., Nandi, A.K.: Credit card fraud detection using AdaBoost and majority voting. IEEE Access 6, 14277\u201314284 (2018)","journal-title":"IEEE Access"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Rayana, S., Zhong, W., Akoglu, L.: Sequential ensemble learning for outlier detection: a bias-variance perspective. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 1167\u20131172 (2016)","DOI":"10.1109\/ICDM.2016.0154"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Sohony, I., Pratap, R., Nambiar, U.: Ensemble learning for credit card fraud detection. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, pp. 289\u2013294 (2018)","DOI":"10.1145\/3152494.3156815"},{"key":"14_CR17","unstructured":"Tiwari, P., Mehta, S., Sakhuja, N., Kumar, J., Singh, A.K.: Credit card fraud detection using machine learning: a study. arXiv preprint arXiv:2108.10005 (2021)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: $${AI}^2$$: training a big data machine to defend. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 49\u201354 (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-89656-4_7","volume-title":"Advances in Artificial Intelligence","author":"S Young","year":"2018","unstructured":"Young, S., Abdou, T., Bener, A.: Deep super learner: a deep ensemble for classification problems. In: Bagheri, E., Cheung, J.C.K. (eds.) Canadian AI 2018. LNCS (LNAI), vol. 10832, pp. 84\u201395. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89656-4_7"},{"issue":"2015","key":"14_CR20","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.procs.2015.04.201","volume":"48","author":"M Zareapoor","year":"2015","unstructured":"Zareapoor, M., Shamsolmoali, P., et al.: Application of credit card fraud detection: based on bagging ensemble classifier. Procedia Comput. Sci. 48(2015), 679\u2013685 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.ins.2019.05.023","volume":"557","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Han, Y., Wei, X., Wang, Q.: HOBA: a novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Inf. Sci. 557, 302\u2013316 (2021)","journal-title":"Inf. Sci."},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2594473.2594476","volume":"15","author":"A Zimek","year":"2014","unstructured":"Zimek, A., Campello, R.J.G.B., Sander, J.: Ensembles for unsupervised outlier detection: challenges and research questions a position paper. ACM SIGKDD Explor. Newsl. 15(1), 11\u201322 (2014)","journal-title":"ACM SIGKDD Explor. Newsl."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10464-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T14:04:21Z","timestamp":1663164261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10464-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031104633","9783031104640"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10464-0_14","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}