{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:52:54Z","timestamp":1774540374991,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2022JJ30673"],"award-info":[{"award-number":["2022JJ30673"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s00521-024-09546-9","type":"journal-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T10:02:44Z","timestamp":1708941764000},"page":"8607-8623","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["CFTNet: a robust credit card fraud detection model enhanced by counterfactual data augmentation"],"prefix":"10.1007","volume":"36","author":[{"given":"Menglin","family":"Kong","sequence":"first","affiliation":[]},{"given":"Ruichen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xingquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shengzhong","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Wanying","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Muzhou","family":"Hou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6853-6421","authenticated-orcid":false,"given":"Cong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,26]]},"reference":[{"issue":"2","key":"9546_CR1","first-page":"57","volume":"4","author":"L Delamaire","year":"2009","unstructured":"Delamaire L, Abdou H, Pointon J (2009) Credit card fraud and detection techniques: a review. Banks Bank Syst 4(2):57\u201368","journal-title":"Banks Bank Syst"},{"issue":"3","key":"9546_CR2","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.3390\/app10031056","volume":"10","author":"R Song","year":"2020","unstructured":"Song R, Huang L, Cui W, Oskarsdottir M, Vanthienen J (2020) Fraud detection of bulk cargo theft in port using Bayesian network models. Appl Sci 10(3):1056","journal-title":"Appl Sci"},{"key":"9546_CR3","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1007\/s11277-021-08283-9","volume":"119","author":"KN Mishra","year":"2021","unstructured":"Mishra KN, Pandey SC (2021) Fraud prediction in smart societies using logistic regression and k-fold machine learning techniques. Wireless Pers Commun 119:1341\u20131367","journal-title":"Wireless Pers Commun"},{"key":"9546_CR4","doi-asserted-by":"publisher","first-page":"118878","DOI":"10.1016\/j.eswa.2022.118878","volume":"213","author":"C Jiang","year":"2023","unstructured":"Jiang C, Lu W, Wang Z, Ding Y (2023) Benchmarking state-of-the-art imbalanced data learning approaches for credit scoring. Expert Syst Appl 213:118878","journal-title":"Expert Syst Appl"},{"key":"9546_CR5","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.jbankfin.2016.07.015","volume":"72","author":"F Butaru","year":"2016","unstructured":"Butaru F, Chen Q, Clark B, Das S, Lo AW, Siddique A (2016) Risk and risk management in the credit card industry. J Bank Financ 72:218\u2013239","journal-title":"J Bank Financ"},{"key":"9546_CR6","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","volume":"513","author":"F Thabtah","year":"2020","unstructured":"Thabtah F, Hammoud S, Kamalov F, Gonsalves A (2020) Data imbalance in classification: experimental evaluation. Inf Sci 513:429\u2013441","journal-title":"Inf Sci"},{"key":"9546_CR7","doi-asserted-by":"crossref","unstructured":"Awoyemi JO, Adetunmbi AO, Oluwadare SA (2017) Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 international conference on computing networking and informatics (ICCNI), pp 1\u20139 . IEEE","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"9546_CR8","doi-asserted-by":"crossref","unstructured":"Khine AA, Khin HW (2020) Credit card fraud detection using online boosting with extremely fast decision tree. In: 2020 IEEE conference on computer applications (ICCA), pp 1\u20134. IEEE","DOI":"10.1109\/ICCA49400.2020.9022843"},{"key":"9546_CR9","first-page":"4699","volume":"34","author":"R Agarwal","year":"2021","unstructured":"Agarwal R, Melnick L, Frosst N, Zhang X, Lengerich B, Caruana R, Hinton GE (2021) Neural additive models: interpretable machine learning with neural nets. Adv Neural Inf Process Syst 34:4699\u20134711","journal-title":"Adv Neural Inf Process Syst"},{"key":"9546_CR10","doi-asserted-by":"crossref","unstructured":"Bockel-Rickermann C, Verdonck T, Verbeke W (2023) Fraud analytics: a decade of research organizing challenges and solutions in the field. Expert Syst Appl 120605","DOI":"10.1016\/j.eswa.2023.120605"},{"key":"9546_CR11","first-page":"13","volume":"46","author":"S Carta","year":"2019","unstructured":"Carta S, Fenu G, Recupero DR, Saia R (2019) Fraud detection for e-commerce transactions by employing a prudential multiple consensus model. J Inf Secur Appl 46:13\u201322","journal-title":"J Inf Secur Appl"},{"key":"9546_CR12","doi-asserted-by":"publisher","first-page":"119562","DOI":"10.1016\/j.eswa.2023.119562","volume":"217","author":"H Fanai","year":"2023","unstructured":"Fanai H, Abbasimehr H (2023) A novel combined approach based on deep autoencoder and deep classifiers for credit card fraud detection. Expert Syst Appl 217:119562","journal-title":"Expert Syst Appl"},{"key":"9546_CR13","doi-asserted-by":"publisher","first-page":"120144","DOI":"10.1016\/j.eswa.2023.120144","volume":"227","author":"SZ Aftabi","year":"2023","unstructured":"Aftabi SZ, Ahmadi A, Farzi S (2023) Fraud detection in financial statements using data mining and GAN models. Expert Syst Appl 227:120144","journal-title":"Expert Syst Appl"},{"key":"9546_CR14","doi-asserted-by":"publisher","first-page":"119259","DOI":"10.1016\/j.eswa.2022.119259","volume":"215","author":"L Settipalli","year":"2023","unstructured":"Settipalli L, Gangadharan G (2023) WMTDBC: an unsupervised multivariate analysis model for fraud detection in health insurance claims. Expert Syst Appl 215:119259","journal-title":"Expert Syst Appl"},{"issue":"3","key":"9546_CR15","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/TCSS.2021.3059286","volume":"8","author":"M Mirtaheri","year":"2021","unstructured":"Mirtaheri M, Abu-El-Haija S, Morstatter F, Ver Steeg G, Galstyan A (2021) Identifying and analyzing cryptocurrency manipulations in social media. IEEE Trans Comput Soc Syst 8(3):607\u2013617","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"9546_CR16","doi-asserted-by":"crossref","unstructured":"Wang X, Cui P, Zhu W (2021) Out-of-distribution generalization and its applications for multimedia. In: Proceedings of the 29th ACM international conference on multimedia, pp 5681\u20135682","DOI":"10.1145\/3474085.3478876"},{"key":"9546_CR17","doi-asserted-by":"crossref","unstructured":"Cui P, Shen Z, Li S, Yao L, Li Y, Chu Z, Gao J (2020) Causal inference meets machine learning. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 3527\u20133528","DOI":"10.1145\/3394486.3406460"},{"key":"9546_CR18","doi-asserted-by":"crossref","unstructured":"Kuang K, Cui P, Athey S, Xiong R, Li B (2018) Stable prediction across unknown environments. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 1617\u20131626","DOI":"10.1145\/3219819.3220082"},{"issue":"2","key":"9546_CR19","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1038\/s42256-022-00445-z","volume":"4","author":"P Cui","year":"2022","unstructured":"Cui P, Athey S (2022) Stable learning establishes some common ground between causal inference and machine learning. Nat Mach Intell 4(2):110\u2013115","journal-title":"Nat Mach Intell"},{"key":"9546_CR20","doi-asserted-by":"crossref","unstructured":"Mothilal RK, Sharma A, Tan C (2020) Explaining machine learning classifiers through diverse counterfactual explanations. In: Proceedings of the 2020 conference on fairness, accountability, and transparency, pp 607\u2013617","DOI":"10.1145\/3351095.3372850"},{"key":"9546_CR21","unstructured":"Karimi AH, Barthe G, Balle B, Valera I (2020) Model-agnostic counterfactual explanations for consequential decisions. In: International conference on artificial intelligence and statistics, pp 895\u2013905. PMLR"},{"key":"9546_CR22","doi-asserted-by":"crossref","unstructured":"Chen Z, Silvestri F, Wang J, Zhu H, Ahn H, Tolomei G (2022) Relax: reinforcement learning agent explainer for arbitrary predictive models. In: Proceedings of the 31st ACM international conference on information & knowledge management, pp 252\u2013261","DOI":"10.1145\/3511808.3557429"},{"key":"9546_CR23","unstructured":"Xiong J, Wang Q, Yang Z, Sun P, Han L, Zheng Y, Fu H, Zhang T, Liu J, Liu H (2018) Parametrized deep q-networks learning: reinforcement learning with discrete-continuous hybrid action space. arXiv preprint arXiv:1810.06394"},{"key":"9546_CR24","doi-asserted-by":"crossref","unstructured":"Sailusha R, Gnaneswar V, Ramesh R, Rao GR (2020) Credit card fraud detection using machine learning. In: 2020 4th international conference on intelligent computing and control systems (ICICCS), pp 1264\u20131270 . IEEE","DOI":"10.1109\/ICICCS48265.2020.9121114"},{"issue":"1\u20132","key":"9546_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s44230-022-00004-0","volume":"2","author":"R Bin Sulaiman","year":"2022","unstructured":"Bin Sulaiman R, Schetinin V, Sant P (2022) Review of machine learning approach on credit card fraud detection. Human-Centric Intell Syst 2(1\u20132):55\u201368","journal-title":"Human-Centric Intell Syst"},{"key":"9546_CR26","doi-asserted-by":"crossref","unstructured":"Saia R(2018) Unbalanced data classification in fraud detection by introducing a multidimensional space analysis. In: IoTBDS, pp 29\u201340","DOI":"10.5220\/0006663000290040"},{"issue":"1","key":"9546_CR27","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s40537-023-00684-w","volume":"10","author":"Z Salekshahrezaee","year":"2023","unstructured":"Salekshahrezaee Z, Leevy JL, Khoshgoftaar TM (2023) The effect of feature extraction and data sampling on credit card fraud detection. J Big Data 10(1):6","journal-title":"J Big Data"},{"key":"9546_CR28","unstructured":"Harwani H, Jain J, Jadhav C, Hodavdekar M (2020) Credit card fraud detection technique using hybrid approach: an amalgamation of self organizing maps and neural networks. Int Res J Eng Technol (IRJET) 7(2020)"},{"key":"9546_CR29","doi-asserted-by":"crossref","unstructured":"Voican O (2021) Credit card fraud detection using deep learning techniques. Inf Econ 25(1)","DOI":"10.24818\/issn14531305\/25.1.2021.06"},{"key":"9546_CR30","unstructured":"Nguyen TT, Tahir H, Abdelrazek M, Babar A (2020) Deep learning methods for credit card fraud detection. arXiv preprint arXiv:2012.03754"},{"key":"9546_CR31","doi-asserted-by":"publisher","first-page":"113866","DOI":"10.1016\/j.dss.2022.113866","volume":"164","author":"R Van Belle","year":"2023","unstructured":"Van Belle R, Baesens B, De Weerdt J (2023) CATCHM: a novel network-based credit card fraud detection method using node representation learning. Decis Support Syst 164:113866","journal-title":"Decis Support Syst"},{"issue":"7","key":"9546_CR32","first-page":"1","volume":"3","author":"K RamaKalyani","year":"2012","unstructured":"RamaKalyani K, UmaDevi D (2012) Fraud detection of credit card payment system by genetic algorithm. Int J Sci Eng Res 3(7):1\u20136","journal-title":"Int J Sci Eng Res"},{"issue":"5","key":"9546_CR33","first-page":"402","volume":"7","author":"Y Jain","year":"2019","unstructured":"Jain Y, Tiwari N, Dubey S, Jain S (2019) A comparative analysis of various credit card fraud detection techniques. Int J Recent Technol Eng 7(5):402\u2013407","journal-title":"Int J Recent Technol Eng"},{"issue":"3","key":"9546_CR34","first-page":"229","volume":"33","author":"C Phua","year":"2010","unstructured":"Phua C, Lee V, Smith K, Gayler R (2010) A comprehensive survey of data mining-based fraud detection research. Artif Intell Revi 33(3):229\u2013246","journal-title":"Artif Intell Revi"},{"key":"9546_CR35","unstructured":"Pearl J (2000) Models reasoning and inference. vol 19, Cambridge University Press, Cambridge, p 3"},{"key":"9546_CR36","volume-title":"The book of why: the new science of cause and effect","author":"J Pearl","year":"2018","unstructured":"Pearl J, Mackenzie D (2018) The book of why: the new science of cause and effect. Basic Books, New York"},{"key":"9546_CR37","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"9546_CR38","unstructured":"Chen T, Kornblith S, Norouzi M, Hinton G (2020) A simple framework for contrastive learning of visual representations. In: International conference on machine learning, pp 1597\u20131607. PMLR"},{"key":"9546_CR39","doi-asserted-by":"crossref","unstructured":"Dal\u00a0Pozzolo A, Caelen O, Johnson RA, Bontempi G (2015) Calibrating probability with undersampling for unbalanced classification. In: 2015 IEEE symposium series on computational intelligence, pp 159\u2013166. IEEE","DOI":"10.1109\/SSCI.2015.33"},{"key":"9546_CR40","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"9546_CR41","doi-asserted-by":"crossref","unstructured":"Prusti D, Rath SK (2019) Fraudulent transaction detection in credit card by applying ensemble machine learning techniques. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT), pp 1\u20136. IEEE","DOI":"10.1109\/ICCCNT45670.2019.8944867"},{"issue":"4","key":"9546_CR42","doi-asserted-by":"publisher","first-page":"391","DOI":"10.21917\/ijsc.2012.0061","volume":"2","author":"V Dheepa","year":"2012","unstructured":"Dheepa V, Dhanapal R (2012) Behavior based credit card fraud detection using support vector machines. ICTACT J Soft Comput 2(4):391\u2013397","journal-title":"ICTACT J Soft Comput"},{"key":"9546_CR43","doi-asserted-by":"crossref","unstructured":"Sasank JS, Sahith GR, Abhinav K, Belwal M (2019) Credit card fraud detection using various classification and sampling techniques: a comparative study. In: 2019 international conference on communication and electronics systems (ICCES), pp 1713\u20131718. IEEE","DOI":"10.1109\/ICCES45898.2019.9002289"},{"issue":"3","key":"9546_CR44","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.3390\/s22031154","volume":"22","author":"T-T-H Le","year":"2022","unstructured":"Le T-T-H, Kim H, Kang H, Kim H (2022) Classification and explanation for intrusion detection system based on ensemble trees and shap method. Sensors 22(3):1154","journal-title":"Sensors"},{"key":"9546_CR45","doi-asserted-by":"crossref","unstructured":"Zhang K, Xu P, Zhang J(2020) Explainable AI in deep reinforcement learning models: a shap method applied in power system emergency control. In: 2020 IEEE 4th conference on energy internet and energy system integration (EI2), pp 711\u2013716 . IEEE","DOI":"10.1109\/EI250167.2020.9347147"},{"key":"9546_CR46","doi-asserted-by":"crossref","unstructured":"Winter E (2002) The shapley value. Handbook of game theory with economic applications, vol 3, pp 2025\u20132054","DOI":"10.1016\/S1574-0005(02)03016-3"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09546-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09546-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09546-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T21:08:40Z","timestamp":1731445720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09546-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":46,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["9546"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09546-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,26]]},"assertion":[{"value":"9 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}