{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T22:21:08Z","timestamp":1778624468478,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,1,20]],"date-time":"2024-01-20T00:00:00Z","timestamp":1705708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,20]],"date-time":"2024-01-20T00:00:00Z","timestamp":1705708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004503","name":"Benha University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004503","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, credit card transaction fraud has resulted in massive losses for both consumers and banks. Subsequently, both cardholders and banks need a strong fraud detection system to reduce cardholder losses. Credit card fraud detection (CCFD) is an important method of fraud prevention. However, there are many challenges in developing an ideal fraud detection system for banks. First off, due to data security and privacy concerns, various banks and other financial institutions are typically not permitted to exchange their transaction datasets. These issues make traditional systems find it difficult to learn and detect fraud depictions. Therefore, this paper proposes federated learning for CCFD over different frameworks (TensorFlow federated, PyTorch). Second, there is a significant imbalance in credit card transactions across all banks, with a small percentage of fraudulent transactions outweighing the majority of valid ones. In order to demonstrate the urgent need for a comprehensive investigation of class imbalance management techniques to develop a powerful model to identify fraudulent transactions, the dataset must be balanced. In order to address the issue of class imbalance, this study also seeks to give a comparative analysis of several individual and hybrid resampling techniques. In several experimental studies, the effectiveness of various resampling techniques in combination with classification approaches has been compared. In this study, it is found that the hybrid resampling methods perform well for machine learning classification models compared to deep learning classification models. The experimental results show that the best accuracy for the Random Forest (RF); Logistic Regression; K-Nearest Neighbors (KNN); Decision Tree (DT), and Gaussian Naive Bayes (NB) classifiers are 99,99%; 94,61%; 99.96%; 99,98%, and 91,47%, respectively. The comparative results show that the RF outperforms with high performance parameters (accuracy, recall, precision and f score) better than NB; RF; DT and KNN. RF achieve the minimum loss values with all resampling techniques, and the results, when utilizing the proposed models on the entire skewed dataset, achieved preferable outcomes to the unbalanced dataset. Furthermore, the PyTorch framework achieves higher prediction accuracy for the federated learning model than the TensorFlow federated framework but with more computational time.<\/jats:p>","DOI":"10.1007\/s00521-023-09410-2","type":"journal-article","created":{"date-parts":[[2024,1,20]],"date-time":"2024-01-20T19:02:14Z","timestamp":1705777334000},"page":"6231-6256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":94,"title":["Federated learning model for credit card fraud detection with data balancing techniques"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1673-6947","authenticated-orcid":false,"given":"Mustafa","family":"Abdul Salam","sequence":"first","affiliation":[]},{"given":"Khaled M.","family":"Fouad","sequence":"additional","affiliation":[]},{"given":"Doaa L.","family":"Elbably","sequence":"additional","affiliation":[]},{"given":"Salah M.","family":"Elsayed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,20]]},"reference":[{"key":"9410_CR1","unstructured":"NilsonReport.Card Fraud Losses Reach $27.85 Billion (2019) https:\/\/nilsonreport.com\/mention\/407\/1link\/ Accessed 16 Jun 2021"},{"key":"9410_CR2","doi-asserted-by":"publisher","first-page":"93010","DOI":"10.1109\/ACCESS.2019.2927266","volume":"7","author":"S Makki","year":"2019","unstructured":"Makki S et al (2019) An experimental study with imbalanced classification approaches for credit card fraud detection. IEEE Access 7:93010\u201393022","journal-title":"IEEE Access"},{"key":"9410_CR3","doi-asserted-by":"crossref","unstructured":"Awoyemi JO, Adetunmbi AO, Oluwadare SA (2017) Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 international conference on computing networking and informatics (ICCNI). IEEE. Johar Town, Lahore, Punjab 54770, Pakistan pp 1\u20139","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"9410_CR4","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.procs.2020.01.057","volume":"165","author":"VN Dornadula","year":"2019","unstructured":"Dornadula VN, Geetha S (2019) Credit card fraud detection using machine learning algorithms. Procedia Comput Sci 165:631\u2013641","journal-title":"Procedia Comput Sci"},{"issue":"44","key":"9410_CR5","first-page":"8","volume":"182","author":"H Naik","year":"2019","unstructured":"Naik H, Kanikar P (2019) Credit card fraud detection based on machine learning algorithms. Int J Comput Appl 182(44):8\u201312","journal-title":"Int J Comput Appl"},{"issue":"20","key":"9410_CR6","first-page":"825","volume":"118","author":"N Khare","year":"2018","unstructured":"Khare N, Sait SY (2018) Credit card fraud detection using machine learning models and collating machine learning models. Int J Pure Appl Math 118(20):825\u2013838","journal-title":"Int J Pure Appl Math"},{"key":"9410_CR7","doi-asserted-by":"crossref","unstructured":"Banal A, Garg H (2021) An efficient techniques for fraudulent detection in credit card dataset: a comprehensive study. In: IOP conference series: materials science and engineering. Mathura, India, 1116(1). IOP Publishing","DOI":"10.1088\/1757-899X\/1116\/1\/012181"},{"issue":"21","key":"9410_CR8","doi-asserted-by":"publisher","first-page":"15884","DOI":"10.1109\/JIOT.2021.3056185","volume":"8","author":"W Zhang","year":"2021","unstructured":"Zhang W, Weishan T et al (2021) Dynamic fusion-based federated learning for COVID-19 detection. IEEE Internet Things J 8(21):15884\u201315891","journal-title":"IEEE Internet Things J"},{"key":"9410_CR9","unstructured":"Lian X et al. (2017) Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent. Adv Neural Inf Process Syst 30"},{"issue":"2013","key":"9410_CR10","first-page":"332","volume":"1","author":"SM Abd Elrahman","year":"2013","unstructured":"Abd Elrahman SM, Abraham A (2013) A review of class imbalance problem. J Netw Innov Comput 1(2013):332\u2013340","journal-title":"J Netw Innov Comput"},{"key":"9410_CR11","volume-title":"Class processing and systems","author":"G Bejjanki","year":"2018","unstructured":"Bejjanki G, Jayadev G, Narsimha G (2018) Class processing and systems. Springer"},{"key":"9410_CR12","doi-asserted-by":"crossref","unstructured":"Liu Y, Li X, Chen X, Wang X, Li H (2020) High-performance machine learning for large-scale data classification considering class imbalance. Sci Program","DOI":"10.1155\/2020\/1953461"},{"issue":"2","key":"9410_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-0074-0","volume":"1","author":"W Zheng","year":"2020","unstructured":"Zheng W, Jin M (2020) The effects of class imbalance and training data size on classifier learning: an empirical study. SN Comput Sci 1(2):1\u201313","journal-title":"SN Comput Sci"},{"key":"9410_CR14","unstructured":"Sweers T, Heskes T, Krijthe J (2018) Autoencoding credit card fraud. Bachelor Thesis"},{"key":"9410_CR15","doi-asserted-by":"crossref","unstructured":"Xuan S et al. (2018) Random forest for credit card fraud detection. In: 2018 IEEE 15th international conference on networking, sensing, and control (ICNSC). IEEE, China","DOI":"10.1109\/ICNSC.2018.8361343"},{"issue":"3","key":"9410_CR16","first-page":"192","volume":"1","author":"G Singh","year":"2012","unstructured":"Singh G et al (2012) A machine learning approach for detection of fraud based on svm. Int J Sci Eng Technol 1(3):192\u2013196","journal-title":"Int J Sci Eng Technol"},{"key":"9410_CR17","unstructured":"Sonawane YB, Gadgil AS, More AE, Jathar NK (2016) Credit card fraud detection using clustering based approach. Int J Adv Res Innov Ideas Educ 2(6)"},{"key":"9410_CR18","doi-asserted-by":"crossref","unstructured":"Xie X et al. (2018) Generative adversarial network-based credit card fraud detection. In: International conference in communications, signal processing and systems. Springer, Singapore","DOI":"10.1007\/978-981-13-6508-9_122"},{"key":"9410_CR19","unstructured":"Niu X, Wang L, Yang X (2019) A comparison study of credit card fraud detection: supervised versus unsupervised. arXiv preprint arXiv:1904.10604"},{"key":"9410_CR20","unstructured":"Fahmi M, Hamdy A, Nagati K (2016) Data mining techniques for credit card fraud detection: empirical study. Sustain Vital Technol Eng Inf, pp 1\u20139"},{"key":"9410_CR21","doi-asserted-by":"crossref","unstructured":"Chen K, Seshadri S, Zhang LJ (2019) Big Data\u2013BigData 2019: 8th international congress, Held as part of the services conference federation, SCF 2019, San Diego, CA, USA, June 25\u201330, Proceedings. Vol. 11514. Springer","DOI":"10.1007\/978-3-030-23551-2"},{"key":"9410_CR22","doi-asserted-by":"crossref","unstructured":"Y. Wensi et al. (2019) Ffd: a federated learning based method for credit card fraud detection. J Big Data, LNCS 11514, pp 18\u201332","DOI":"10.1007\/978-3-030-23551-2_2"},{"issue":"3","key":"9410_CR23","first-page":"356","volume":"7","author":"R Suvarna","year":"2020","unstructured":"Suvarna R, Meena Kowshalya A (2020) Credit card fraud detection using federated learning techniques. J Web Eng Technol 7(3):356\u2013367","journal-title":"J Web Eng Technol"},{"key":"9410_CR24","unstructured":"Albertio C (2019) Towards Efficient and Privacy-preserving Federated Deep Learning. In: International conference on science and technology on communication security laboratory, 978-I-5386\u20138088- 9\/19@IEEE"},{"issue":"3","key":"9410_CR25","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","volume":"22","author":"WYB Lim","year":"2020","unstructured":"Lim WYB et al (2020) Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun Surv Tutor 22(3):2031\u20132063","journal-title":"IEEE Commun Surv Tutor"},{"key":"9410_CR26","doi-asserted-by":"crossref","unstructured":"Yao X, Huang T, Wu C, Zhang R, Sun L (2019) Towards faster and better federated learning: a feature fusion approach. In: 2019 IEEE international conference on image processing (ICIP). IEEE, Taipei, Taiwan, pp175\u2013195","DOI":"10.1109\/ICIP.2019.8803001"},{"issue":"4","key":"9410_CR27","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","volume":"10","author":"S Panigrahi","year":"2009","unstructured":"Panigrahi S et al (2009) Credit card fraud detection: a fusion approach using Dempster-Shafer theory and Bayesian learning. Inf Fusion 10(4):354\u2013363","journal-title":"Inf Fusion"},{"issue":"2","key":"9410_CR28","first-page":"5458","volume":"3","author":"MZ Khan","year":"2014","unstructured":"Khan MZ, Pathan JD, Ahmed AHE (2014) Credit card fraud detection system using hidden markov Model and K-clustering. Int J Adv Res Comput Commun Eng 3(2):5458","journal-title":"Int J Adv Res Comput Commun Eng"},{"issue":"4","key":"9410_CR29","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/TDSC.2009.11","volume":"6","author":"A Kundu","year":"2009","unstructured":"Kundu A, Panigrahi S, Sural S, Majumdar AK (2009) Blast-ssaha hybridization for credit card fraud detection. IEEE Trans Dependable Secure Comput 6(4):309\u2013315","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"9410_CR30","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"M Galar","year":"2011","unstructured":"Galar M, Fernandez A, Barrenechea E, Bustince H, Herrera F (2011) A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Trans Syst Man Cybern Part C Appl Rev 42(4):463\u2013484","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"9410_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803","volume-title":"Evaluating learning algorithms: a classification perspective","author":"N Japkowicz","year":"2011","unstructured":"Japkowicz N, Shah M (2011) Evaluating learning algorithms: a classification perspective. Cambridge University Press"},{"issue":"11","key":"9410_CR32","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1109\/TPAMI.2019.2914680","volume":"42","author":"C Huang","year":"2019","unstructured":"Huang C, Li Y, Loy CC, Tang X (2019) Deep imbalanced learning for face recognition and attribute prediction. EEE Trans Pattern Anal Mach Intell 42(11):2781\u20132794","journal-title":"EEE Trans Pattern Anal Mach Intell"},{"key":"9410_CR33","first-page":"1","volume":"21","author":"X Ouyang","year":"2017","unstructured":"Ouyang X, Chen Y, Wei B (2017) Experimental study on unbalanced data problem using an oil spill training data set. J Adv Math Comput Sci 21:1\u20139","journal-title":"J Adv Math Comput Sci"},{"issue":"3","key":"9410_CR34","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TCYB.2013.2257480","volume":"44","author":"P Yang","year":"2013","unstructured":"Yang P et al (2013) Sample subset optimization techniques for imbalanced and ensemble learning problems in bioinformatics applications. IEEE Trans. Cybern. 44(3):445\u2013455","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"9410_CR35","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11704-016-5306-z","volume":"12","author":"B Sun","year":"2018","unstructured":"Sun B, Chen H, Wang J, Xie H (2018) Evolutionary under-sampling-based bagging ensemble method for imbalanced data classification. Front Comput Sci 12(2):331\u2013350","journal-title":"Front Comput Sci"},{"key":"9410_CR36","doi-asserted-by":"crossref","unstructured":"Kamaruddin S, Ravi V (2016) Credit card fraud detection using big data analytics: use of PSOAANN based one-class classification. In: Proceedings of the international conference on informatics and analytics, Pondicherry India, pp 1\u20138","DOI":"10.1145\/2980258.2980319"},{"issue":"4","key":"9410_CR37","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11280-012-0178-0","volume":"16","author":"W Wei","year":"2013","unstructured":"Wei W et al (2013) Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16(4):449\u2013475","journal-title":"World Wide Web"},{"key":"9410_CR38","unstructured":"N.D. Stout. Undersampling and Oversampling Statistics Visual Example. Pinterest. https:\/\/www.pinterest.it\/pin\/514958538641697615\/"},{"key":"9410_CR39","unstructured":"Ling CX, Li C (1998) Chenghui. Data mining for direct marketing: Problems and solutions. In: Kdd, pp 73\u201379"},{"key":"9410_CR40","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"9410_CR41","unstructured":"He et al H (2008) AdaSyn: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence). IEEE, Hong Kong, pp.1322\u20131328"},{"key":"9410_CR42","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1613\/jair.1.11192","volume":"61","author":"A Fern\u00e1ndez","year":"2018","unstructured":"Fern\u00e1ndez A et al (2018) SMOTE for learning from imbalanced data: progress and challenges, marking the 15th anniversary. J Artif Intell Res 61:863\u2013905","journal-title":"J Artif Intell Res"},{"key":"9410_CR43","unstructured":"Machine Learning Group\u2014ULB (2018) Credit card fraud detection anonymized credit card transactions labeled as fraudulent or genuine. https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud"},{"issue":"3","key":"9410_CR44","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S Bhattacharyya","year":"2011","unstructured":"Bhattacharyya S et al (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602\u2013613","journal-title":"Decis Support Syst"},{"key":"9410_CR45","doi-asserted-by":"crossref","unstructured":"Alowais MI, Soon LK (2012) Credit card fraud detection: Personalized or aggregated model. In: 2012 third FTRA international conference on mobile, ubiquitous, and intelligent computing. IEEE, Vancouver, Canada, pp 114\u2013116","DOI":"10.1109\/MUSIC.2012.27"},{"issue":"2","key":"9410_CR46","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12191","volume":"34","author":"Y K\u00fclt\u00fcr","year":"2017","unstructured":"K\u00fclt\u00fcr Y, Mehmet UC (2017) Hybrid approaches for detecting credit card fraud. Expert Syst 34(2):e12191","journal-title":"Expert Syst"},{"issue":"2","key":"9410_CR47","first-page":"618","volume":"27","author":"O Ata","year":"2020","unstructured":"Ata O, Hazim L (2020) Comparative analysis of different \u02d8distributions dataset by using data mining techniques on credit card fraud detection. Tehnicki vjesnik 27(2):618\u2013626","journal-title":"Tehnicki vjesnik"},{"key":"9410_CR48","first-page":"1","volume":"34","author":"A Singh","year":"2021","unstructured":"Singh A, Ranjan RK, Tiwari A (2021) Credit card fraud detection under extreme imbalanced data: a comparative study of data-level algorithms. J Exp Theor Artif Intell 34:1\u201328","journal-title":"J Exp Theor Artif Intell"},{"issue":"2","key":"9410_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106883","volume":"99","author":"J Forough","year":"2021","unstructured":"Forough J, Momtazi S (2021) Ensemble of deep sequential models for credit card fraud detection. Appl Soft Comput 99(2):106883","journal-title":"Appl Soft Comput"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09410-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09410-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09410-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T09:14:27Z","timestamp":1710580467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09410-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,20]]},"references-count":49,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["9410"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09410-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,20]]},"assertion":[{"value":"16 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}