{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:42:25Z","timestamp":1743018145915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783975"},{"type":"electronic","value":"9783031783982"}],"license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78398-2_7","type":"book-chapter","created":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T15:00:34Z","timestamp":1733065234000},"page":"105-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Event-Aware Multi-component (EMl) Loss for Fraud Detection"],"prefix":"10.1007","author":[{"given":"Tarun","family":"Somavarapu","sequence":"first","affiliation":[]},{"given":"Anand Vir","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Maneet","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Shraddha","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Shantanu","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Kushagra","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: A survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.007","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"AbdulSattar, K., Hammad, M.: Fraudulent transaction detection in fintech using machine learning algorithms. In: International Conference on Innovation and Intelligence for Informatics, Computing and Technologies. pp.\u00a01\u20136 (2020)","DOI":"10.1109\/3ICT51146.2020.9312025"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Altman, E.: Synthesizing credit card transactions. In: ACM International Conference on AI in Finance. pp.\u00a01\u20139 (2021)","DOI":"10.1145\/3490354.3494378"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Babaev, D., Savchenko, M., Tuzhilin, A., Umerenkov, D.: ET-RNN: Applying deep learning to credit loan applications. In: SIGKDD International Conference on Knowledge Discovery & Data Mining. pp. 2183\u20132190 (2019)","DOI":"10.1145\/3292500.3330693"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Beneish, M.D., Vorst, P.: The cost of fraud prediction errors. Kelley School of Business Research Paper (2020-55) (2021)","DOI":"10.2139\/ssrn.3529662"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton, R.J., Hand, D.J.: Statistical fraud detection: A review. Stat. Sci. 17(3), 235\u2013255 (2002)","journal-title":"Stat. Sci."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Branco, B., Abreu, P., Gomes, A.S., Almeida, M.S., Ascens\u00e3o, J.T., Bizarro, P.: Interleaved sequence rnns for fraud detection. In: ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. pp. 3101\u20133109 (2020)","DOI":"10.1145\/3394486.3403361"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Brause, R., Langsdorf, T., Hepp, M.: Neural data mining for credit card fraud detection. In: International Conference on Tools with Artificial Intelligence. pp. 103\u2013106 (1999)","DOI":"10.1109\/TAI.1999.809773"},{"issue":"02","key":"7_CR9","first-page":"101","volume":"3","author":"JIZ Chen","year":"2021","unstructured":"Chen, J.I.Z., Lai, K.L.: Deep convolution neural network model for credit-card fraud detection and alert. J. Artif. Intell. 3(02), 101\u2013112 (2021)","journal-title":"J. Artif. Intell."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, Z., Liu, Q., Yang, L., Meng, Y., Wang, P.: A method for online transaction fraud detection based on individual behavior. In: ACM Turing Celebration Conference - China (2019)","DOI":"10.1145\/3321408.3326647"},{"issue":"8","key":"7_CR11","doi-asserted-by":"publisher","first-page":"3800","DOI":"10.1109\/TKDE.2020.3025588","volume":"34","author":"D Cheng","year":"2020","unstructured":"Cheng, D., Wang, X., Zhang, Y., Zhang, L.: Graph neural network for fraud detection via spatial-temporal attention. IEEE Trans. Knowl. Data Eng. 34(8), 3800\u20133813 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cheng, D., Xiang, S., Shang, C., Zhang, Y., Yang, F., Zhang, L.: Spatio-temporal attention-based neural network for credit card fraud detection. AAAI Conference on Artificial Intelligence pp. 362\u2013369 (2020)","DOI":"10.1609\/aaai.v34i01.5371"},{"key":"7_CR13","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"issue":"10","key":"7_CR14","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Dal Pozzolo","year":"2014","unstructured":"Dal Pozzolo, A., Caelen, O., Le Borgne, Y.A., Waterschoot, S., Bontempi, G.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41(10), 4915\u20134928 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"PT De Boer","year":"2005","unstructured":"De Boer, P.T., Kroese, D.P., Mannor, S., Rubinstein, R.Y.: A tutorial on the cross-entropy method. Ann. Oper. Res. 134(1), 19\u201367 (2005)","journal-title":"Ann. Oper. Res."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Gramopadhye, M., Singh, S., Agarwal, K., Srivasatava, N., Singh, A.M., Asthana, S., Arora, A.: CuRL: Coupled representation learning of cards and merchants to detect transaction frauds. In: International Conference on Artificial Neural Networks. pp. 16\u201329 (2021)","DOI":"10.1007\/978-3-030-86383-8_2"},{"issue":"8","key":"7_CR17","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.eswa.2018.01.037","volume":"100","author":"J Jurgovsky","year":"2018","unstructured":"Jurgovsky, J., Granitzer, M., Ziegler, K., Calabretto, S., Portier, P.E., He-Guelton, L., Caelen, O.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234\u2013245 (2018)","journal-title":"Expert Syst. Appl."},{"key":"7_CR19","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10729-007-9045-4","volume":"11","author":"J Li","year":"2008","unstructured":"Li, J., Huang, K., Jin, J., Shi, J.: A survey on statistical methods for health care fraud detection. Health Care Manag. Sci. 11(3), 275\u2013287 (2008). https:\/\/doi.org\/10.1007\/s10729-007-9045-4","journal-title":"Health Care Manag. Sci."},{"issue":"9","key":"7_CR21","first-page":"31","volume":"21","author":"KS Lim","year":"2021","unstructured":"Lim, K.S., Lee, L.H., Sim, Y.W.: A review of machine learning algorithms for fraud detection in credit card transaction. International Journal of Computer Science & Network Security 21(9), 31\u201340 (2021)","journal-title":"International Journal of Computer Science & Network Security"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Lin, W., Sun, L., Zhong, Q., Liu, C., Feng, J., Ao, X., Yang, H.: Online credit payment fraud detection via structure-aware hierarchical recurrent neural network. In: International Joint Conference on Artificial Intelligence. pp. 3670\u20133676 (2021). 10.24963\/ijcai.2021\/505","DOI":"10.24963\/ijcai.2021\/505"},{"key":"7_CR23","unstructured":"Lucas, Y., Jurgovsky, J.: Credit card fraud detection using machine learning: A survey. arXiv preprint arXiv:2010.06479 (2020)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Padhi, I., Schiff, Y., Melnyk, I., Rigotti, M., Mroueh, Y., Dognin, P., Ross, J., Nair, R., Altman, E.: Tabular transformers for modeling multivariate time series. In: IEEE International Conference on Acoustics, Speech and Signal Processing. pp. 3565\u20133569 (2021)","DOI":"10.1109\/ICASSP39728.2021.9414142"},{"key":"7_CR25","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., Desmaison, A., Kopf, A., Yang, E., DeVito, Z., Raison, M., Tejani, A., Chilamkurthy, S., Steiner, B., Fang, L., Bai, J., Chintala, S.: Pytorch: An imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, pp. 8024\u20138035 (2019)"},{"key":"7_CR26","unstructured":"Ruder, S.: An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based modeling for fraud and intrusion detection: Results from the jam project. In: Proceedings DARPA Information Survivability Conference and Exposition. DISCEX\u201900. vol.\u00a02, pp. 130\u2013144 (2000)","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"7_CR28","unstructured":"Viveros, M.S., Nearhos, J.P., Rothman, M.J.: Applying data mining techniques to a health insurance information system. In: International Conference on Very Large Data Bases. p. 286-294. Morgan Kaufmann Publishers Inc. (1996)"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, F., Zhang, H., Yang, M., Cao, S., Wen, Z., Zhang, Z.: \u2019Could You Describe the Reason for the Transfer?\u2019: A Reinforcement Learning Based Voice-Enabled Bot Protecting Customers from Financial Frauds, p. 4214-4223 (2021)","DOI":"10.1145\/3459637.3481906"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Xie, Y., Liu, G., Cao, R., Li, Z., Yan, C., Jiang, C.: A feature extraction method for credit card fraud detection. In: International Conference on Intelligent Autonomous Systems. pp. 70\u201375 (2019)","DOI":"10.1109\/ICoIAS.2019.00019"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wang, Q., Liu, T., Lu, X., Hong, J., Han, B., Gong, C.: Fraud Detection under Multi-Sourced Extremely Noisy Annotations, p. 2497-2506 (2021)","DOI":"10.1145\/3459637.3482433"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"25210","DOI":"10.1109\/ACCESS.2020.2970614","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Chen, L., Liu, Q., Wang, P.: A fraud detection method for low-frequency transaction. IEEE Access 8, 25210\u201325220 (2020)","journal-title":"IEEE Access"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhou, X., Zhang, X., Wang, L., Wang, P.: A model based on convolutional neural network for online transaction fraud detection. Security and Communication Networks (2018)","DOI":"10.1155\/2018\/5680264"},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TCSS.2018.2856910","volume":"5","author":"L Zheng","year":"2018","unstructured":"Zheng, L., Liu, G., Yan, C., Jiang, C.: Transaction fraud detection based on total order relation and behavior diversity. IEEE Transactions on Computational Social Systems 5(3), 796\u2013806 (2018)","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"5","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/TCSS.2020.3017013","volume":"7","author":"L Zheng","year":"2020","unstructured":"Zheng, L., Liu, G., Yan, C., Jiang, C., Zhou, M., Li, M.: Improved tradaboost and its application to transaction fraud detection. IEEE Transactions on Computational Social Systems 7(5), 1304\u20131316 (2020)","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Xi, D., Song, B., Zhuang, F., Chen, S., Gu, X., He, Q.: Modeling users\u2019 behavior sequences with hierarchical explainable network for cross-domain fraud detection. In: Proceedings of The Web Conference. pp. 928\u2013938 (2020)","DOI":"10.1145\/3366423.3380172"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78398-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T15:04:24Z","timestamp":1733065464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78398-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"ISBN":["9783031783975","9783031783982"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78398-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}