{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T06:29:27Z","timestamp":1749104967061,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355004"},{"type":"electronic","value":"9783031355011"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35501-1_36","type":"book-chapter","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T20:34:21Z","timestamp":1685738061000},"page":"358-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing the Credit Card Fraud Detection Using Decision Tree and Adaptive Boosting Techniques"],"prefix":"10.1007","author":[{"given":"K. R.","family":"Prasanna Kumar","sequence":"first","affiliation":[]},{"given":"S.","family":"Aravind","sequence":"additional","affiliation":[]},{"given":"K.","family":"Gopinath","sequence":"additional","affiliation":[]},{"given":"P.","family":"Navienkumar","sequence":"additional","affiliation":[]},{"given":"K.","family":"Logeswaran","sequence":"additional","affiliation":[]},{"given":"M.","family":"Gunasekar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Esenogho, E., Mienye, I. D.,\u00a0 Theo G. S.: A neural network ensemble with feature engineering for improved credit card fraud detection. IEEE Access 10, 16400\u201316407 (2022)","DOI":"10.1109\/ACCESS.2022.3148298"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"25579","DOI":"10.1109\/ACCESS.2020.2971354","volume":"8","author":"A A Taha","year":"2020","unstructured":"Taha, A. A., Malebary, S. J.: An intelligent approach to credit card fraud detection using an optimized light gradient boosting machine. IEEE Access 8, 25579\u201325587 (2020)","journal-title":"IEEE Access"},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"96852","DOI":"10.1109\/ACCESS.2022.3205416","volume":"10","author":"N Nguyen","year":"2022","unstructured":"Nguyen, N., et al.: A proposed model for card fraud detection based on Catboost and deep neural network. IEEE Access 10, 96852\u201396861 (2022)","journal-title":"IEEE Access"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"43378","DOI":"10.1109\/ACCESS.2021.3062467","volume":"9","author":"H Zhou","year":"2021","unstructured":"Zhou, H., Sun, G., Sha, F., Wang, L., Juan, H., Gao, Y.: Internet financial fraud detection based on a distributed big data approach with Node2vec. IEEE Access 9, 43378\u201343386 (2021)","journal-title":"IEEE Access"},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"39700","DOI":"10.1109\/ACCESS.2022.3166891","volume":"10","author":"F K Alarfaj","year":"2022","unstructured":"Alarfaj, F. K., Malik, I., Khan, H. U., Almusallam, N., Ramzan, M., Ahmed, M.: Credit card fraud detection using State-of-the-Art machine learning and deep learning Algorithms. IEEE Access 10, 39700\u201339715 (2022)","journal-title":"IEEE Access"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"149841","DOI":"10.1109\/ACCESS.2020.3015600","volume":"8","author":"H Tingfei","year":"2020","unstructured":"Tingfei, H., Guangquan, C., Kuihua, H.: Using variational auto encoding in credit card fraud detection. IEEE Access 8, 149841\u2013149853 (2020)","journal-title":"IEEE Access"},{"key":"36_CR7","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","volume":"29","author":"A Dal Pozzolo","year":"2017","unstructured":"Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., Bontempi, G.: Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE Trans. Neural Netw. Learn. Syst. 29, 3784\u20133797 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"36_CR8","doi-asserted-by":"publisher","first-page":"93010","DOI":"10.1109\/ACCESS.2019.2927266","volume":"7","author":"S Makki","year":"2019","unstructured":"Makki, S., Assaghir, Z., Taher, Y., Haque, R., Hacid, M.-S., Zeineddine, H.: An experimental study with imbalanced classification approaches for credit card fraud detection. IEEE Access 7, 93010\u201393022 (2019)","journal-title":"IEEE Access"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"75908","DOI":"10.1109\/ACCESS.2022.3190897","volume":"10","author":"H Wang","year":"2022","unstructured":"Wang, H., Wang, W., Liu, Y., Alidaee, B.: Integrating machine learning algorithms with quantum annealing solvers for online fraud detection. IEEE Access 10, 75908\u201375917 (2022)","journal-title":"IEEE Access"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"28210","DOI":"10.1109\/ACCESS.2020.2972009","volume":"8","author":"S N Kalid","year":"2020","unstructured":"Kalid, S. N., Ng, K.-H., Tong, G.-K., Khor, K.-C.: A multiple classifiers system for anomaly detection in credit card data with unbalanced and overlapped classes. IEEE Access 8, 28210\u201328221 (2020)","journal-title":"IEEE Access"},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"114754","DOI":"10.1109\/ACCESS.2021.3104472","volume":"9","author":"B Lebichot","year":"2021","unstructured":"Lebichot, B., Verhelst, T., Le, Y.-A., He-Guelton, L., Obl\u00e9, F., Bontempi, G.: Transfer learning strategies for credit card fraud detection. IEEE Access 9, 114754\u2013114766 (2021)","journal-title":"IEEE Access"},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"3637","DOI":"10.1109\/JIOT.2018.2816007","volume":"5","author":"C Jiang","year":"2018","unstructured":"Jiang, C., Song, J., Liu, G., Zheng, L., Luan, W.: Credit card fraud detection: a novel approach using aggregation strategy and feedback Mechanism. IEEE Internet Things J. 5, 3637\u20133647 (2018)","journal-title":"IEEE Internet Things J."},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Logeswaran K., Suresh P., Savitha S., Prasanna Kumar K.R.:\u00a0\u00a0Handbook of Research on Applications and Implementations of Machine Learning Techniques (US) Optimization of Evolutionary Algorithm Using Machine Learning Techniques for Pattern Mining in Transactional Database (2019)","DOI":"10.4018\/978-1-5225-9902-9.ch010"},{"key":"36_CR14","doi-asserted-by":"publisher","unstructured":"Logeswaran K., et al.: Discovery of potential high utility itemset from uncertain database using multi objective particle swarm optimization algorithm, In:\u00a0\u00a02022 International Conference on Advanced Computing Technologies and Applications (ICACTA), pp. 1\u20136 (2022).\u00a0https:\/\/doi.org\/10.1109\/ICACTA54488.2022.9753159","DOI":"10.1109\/ICACTA54488.2022.9753159"},{"issue":"10","key":"36_CR15","doi-asserted-by":"publisher","first-page":"5901","DOI":"10.1007\/s00521-019-04067-2","volume":"32","author":"KR Prasanna Kumar","year":"2019","unstructured":"Prasanna Kumar, K.R., Kousalya, K.: Amelioration of task scheduling in cloud computing using crow search algorithm. Neural Comput. Appl. 32(10), 5901\u20135907 (2019). https:\/\/doi.org\/10.1007\/s00521-019-04067-2","journal-title":"Neural Comput. Appl."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35501-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T19:04:25Z","timestamp":1729537465000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35501-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355004","9783031355011"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35501-1_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}