{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:22:05Z","timestamp":1773804125817,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031258909","type":"print"},{"value":"9783031258916","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25891-6_25","type":"book-chapter","created":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T14:03:34Z","timestamp":1678370614000},"page":"326-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Tree-Based Credit Card Fraud Detection Using Isolation Forest, Spectral Residual, and\u00a0Knowledge Graph"],"prefix":"10.1007","author":[{"given":"Phat Loi","family":"Tang","sequence":"first","affiliation":[]},{"given":"Thuy-Dung","family":"Le Pham","sequence":"additional","affiliation":[]},{"given":"Tien Ba","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Agarwal, S., Driscoll, J.C., Gabaix, X., Laibson, D.: Learning in the credit card market. Tech. rep., National Bureau of Economic Research (2008). https:\/\/doi.org\/10.3386\/w13822","DOI":"10.3386\/w13822"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Ar\u0131k, S.O., Pfister, T.: TabNet: attentive interpretable tabular learning. In: AAAI, vol. 35, pp. 6679\u20136687 (2021)","DOI":"10.1609\/aaai.v35i8.16826"},{"key":"25_CR3","unstructured":"Baldi, P.: Autoencoders, unsupervised learning, and deep architectures. In: Guyon, I., Dror, G., Lemaire, V., Taylor, G., Silver, D. (eds.) Proceedings of ICML Workshop on Unsupervised and Transfer Learning. Proceedings of Machine Learning Research, vol. 27, pp. 37\u201349. PMLR, Bellevue, Washington, USA (2012)"},{"issue":"6","key":"25_CR4","first-page":"1","volume":"1","author":"TP Bhatla","year":"2003","unstructured":"Bhatla, T.P., Prabhu, V., Dua, A.: Understanding credit card frauds. Cards Bus. Rev. 1(6), 1\u201315 (2003)","journal-title":"Cards Bus. Rev."},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2021","unstructured":"Carcillo, F., Le Borgne, Y.A., Caelen, O., Kessaci, Y., Obl\u00e9, F., Bontempi, G.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. 557, 317\u2013331 (2021)","journal-title":"Inf. Sci."},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"25_CR8","unstructured":"Chen, T., et al.: Xgboost: extreme gradient boosting. R package version 0.4-2 1(4), 1\u20134 (2015)"},{"issue":"1","key":"25_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W., et al.: A note on two problems in connexion with graphs. Numer. Math. 1(1), 269\u2013271 (1959)","journal-title":"Numer. Math."},{"issue":"6","key":"25_CR10","first-page":"262","volume":"10","author":"K Divakar","year":"2019","unstructured":"Divakar, K., Chitharanjan, K.: Performance evaluation of credit card fraud transactions using boosting algorithms. Int. J. Electron. Commun. Comput. Eng. 10(6), 262\u2013270 (2019)","journal-title":"Int. J. Electron. Commun. Comput. Eng."},{"issue":"4","key":"25_CR11","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1086\/208776","volume":"6","author":"G Garcia","year":"1980","unstructured":"Garcia, G.: Credit cards: an interdisciplinary survey. J. Consum. Res. 6(4), 327\u2013337 (1980). https:\/\/doi.org\/10.1086\/208776","journal-title":"J. Consum. Res."},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"John, H., Naaz, S.: Credit card fraud detection using local outlier factor and isolation forest. Int. J. Comput. Sci. Eng. 7(4), 1060\u20131064 (2019). https:\/\/doi.org\/10.26438\/ijcse\/v7i4.10601064","DOI":"10.26438\/ijcse\/v7i4.10601064"},{"issue":"1","key":"25_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF01164627","volume":"12","author":"DJ Klein","year":"1993","unstructured":"Klein, D.J., Randi\u0107, M.: Resistance distance. J. Math. Chem. 12(1), 81\u201395 (1993). https:\/\/doi.org\/10.1007\/BF01164627","journal-title":"J. Math. Chem."},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"Li, Y., Sun, Y., Contractor, N.: Graph mining assisted semi-supervised learning for fraudulent cash-out detection. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 546\u2013553 (2017). https:\/\/doi.org\/10.1145\/3110025.3110099","DOI":"10.1145\/3110025.3110099"},{"key":"25_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114750","volume":"175","author":"Z Li","year":"2021","unstructured":"Li, Z., Huang, M., Liu, G., Jiang, C.: A hybrid method with dynamic weighted entropy for handling the problem of class imbalance with overlap in credit card fraud detection. Expert Syst. Appl. 175, 114750 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.114750","journal-title":"Expert Syst. Appl."},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 8th IEEE International Conference on Data Mining, pp. 413\u2013422 (2008). https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"25_CR17","doi-asserted-by":"publisher","DOI":"10.1108\/APJML-01-2017-0010","author":"ODY Nguyen","year":"2018","unstructured":"Nguyen, O.D.Y., Cassidy, J.F.: Consumer intention and credit card adoption in Vietnam. Asia Pac. J. Mark. Logist. (2018). https:\/\/doi.org\/10.1108\/APJML-01-2017-0010","journal-title":"Asia Pac. J. Mark. Logist."},{"key":"25_CR18","unstructured":"Niu, X., Wang, L., Yang, X.: A comparison study of credit card fraud detection: supervised versus unsupervised. arXiv preprint arXiv:1904.10604 (2019)"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Pang, G., Shen, C., van den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 353\u2013362 (2019). https:\/\/doi.org\/10.1145\/3292500.3330871","DOI":"10.1145\/3292500.3330871"},{"issue":"1","key":"25_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/234313.234346","volume":"28","author":"JR Quinlan","year":"1996","unstructured":"Quinlan, J.R.: Learning decision tree classifiers. ACM Comput. Surv. 28(1), 71\u201372 (1996). https:\/\/doi.org\/10.1145\/234313.234346","journal-title":"ACM Comput. Surv."},{"key":"25_CR21","doi-asserted-by":"publisher","unstructured":"Ren, H., et al.: Time-series anomaly detection service at Microsoft. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 3009\u20133017 (2019). https:\/\/doi.org\/10.1145\/3292500.3330680","DOI":"10.1145\/3292500.3330680"},{"key":"25_CR22","unstructured":"Report, N.: The Nilson report (2021)"},{"key":"25_CR23","unstructured":"Singhal, A.: Introducing the knowledge graph: things, not strings (2020)"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Trinh, N.H., TRan, H.H., Vuong, Q.D.H.: Perceived risk and intention to use credit cards: a case study in Vietnam. J. Asian Finance Econ. Bus. 8(4), 949\u2013958 (2021). https:\/\/doi.org\/10.13106\/JAFEB.2021.VOL8.NO4.0949","DOI":"10.13106\/JAFEB.2021.VOL8.NO4.0949"},{"key":"25_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113155","volume":"127","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Xu, Y., Li, J.: Feature construction for fraudulent credit card cash-out detection. Decis. Support Syst. 127, 113155 (2019). https:\/\/doi.org\/10.1016\/j.dss.2019.113155","journal-title":"Decis. Support Syst."},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Zamini, M., Montazer, G.: Credit card fraud detection using autoencoder based clustering. In: 2018 9th International Symposium on Telecommunications (IST), pp. 486\u2013491. IEEE (2018). https:\/\/doi.org\/10.1109\/ISTEL.2018.8661129","DOI":"10.1109\/ISTEL.2018.8661129"}],"container-title":["Lecture Notes in Computer Science","Machine Learning, Optimization, and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25891-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T10:19:24Z","timestamp":1680689964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25891-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031258909","9783031258916"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25891-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LOD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning, Optimization, and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Certosa di Pontignano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lod2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lod2022.icas.cc\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"226","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}