{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:28:47Z","timestamp":1774938527565,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100018859","name":"Tamkeen","doi-asserted-by":"crossref","award":["CG008"],"award-info":[{"award-number":["CG008"]}],"id":[{"id":"10.13039\/501100018859","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100018859","name":"Tamkeen","doi-asserted-by":"crossref","award":["CG008"],"award-info":[{"award-number":["CG008"]}],"id":[{"id":"10.13039\/501100018859","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10489-026-07110-7","type":"journal-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:33:22Z","timestamp":1770798802000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparative performance analysis of quantum machine learning architectures for credit card fraud detection"],"prefix":"10.1007","volume":"56","author":[{"given":"Mansour","family":"El Alami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1014-3457","authenticated-orcid":false,"given":"Nouhaila","family":"Innan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-8135","authenticated-orcid":false,"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7364-5171","authenticated-orcid":false,"given":"Mohamed","family":"Bennai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,11]]},"reference":[{"key":"7110_CR1","doi-asserted-by":"crossref","unstructured":"Robinson J, Edwards M (2024) Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments. Security Journal, pp 1\u201324","DOI":"10.1057\/s41284-023-00410-4"},{"key":"7110_CR2","doi-asserted-by":"crossref","unstructured":"Byrne S, Byrne J (2023) Scams, cons, frauds, and deceptions, pp 1185\u20131193","DOI":"10.1080\/15564886.2023.2263756"},{"key":"7110_CR3","unstructured":"Authority EB, Bank EC (2024) 2024 report on payment fraud. www.ecb.europa.eu\/press\/pr\/date\/2024\/html\/ecb.pr240801~f21cc4a009.en.html"},{"issue":"20","key":"7110_CR4","doi-asserted-by":"publisher","first-page":"23 049","DOI":"10.1007\/s10489-023-04734-x","volume":"53","author":"Q Zhu","year":"2023","unstructured":"Zhu Q, Li Z, Kuang W, Ma H (2023) A multichannel location-aware interaction network for visual classification. Appl Intell 53(20):23 049-23 066","journal-title":"Appl Intell"},{"key":"7110_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112119","volume":"165","author":"X Yang","year":"2024","unstructured":"Yang X, Li Z, Kuang W, Zhang C, Ma H (2024) Object detection with a dynamic interactive network based on relational graph routing. Appl Soft Comput 165:112119","journal-title":"Appl Soft Comput"},{"issue":"6","key":"7110_CR6","doi-asserted-by":"publisher","first-page":"196","DOI":"10.3390\/fi16060196","volume":"16","author":"T Baabdullah","year":"2024","unstructured":"Baabdullah T, Alzahrani A, Rawat DB, Liu C (2024) Efficiency of federated learning and blockchain in preserving privacy and enhancing the performance of credit card fraud detection (ccfd) systems. Future Int 16(6):196","journal-title":"Future Int"},{"key":"7110_CR7","doi-asserted-by":"crossref","unstructured":"Mienye ID, Jere N (2024) Deep learning for credit card fraud detection: A review of algorithms, challenges, and solutions. IEEE Access","DOI":"10.1109\/ACCESS.2024.3426955"},{"key":"7110_CR8","doi-asserted-by":"crossref","unstructured":"Abbassi H, Mendili S, Gahi Y (2024) Real-time online banking fraud detection model by unsupervised learning fusion. HighTech Innov J 5(1)","DOI":"10.28991\/HIJ-2024-05-01-014"},{"key":"7110_CR9","doi-asserted-by":"publisher","first-page":"2404","DOI":"10.28991\/ESJ-2024-08-06-016","volume":"8","author":"P Thanathamathee","year":"2024","unstructured":"Thanathamathee P, Sawangarreerak S, Chantamunee S, Nizam DNM (2024) Shap-instance weighted and anchor explainable ai: enhancing xgboost for financial fraud detection. Emerg Sci J 8:2404\u20132430","journal-title":"Emerg Sci J"},{"issue":"2","key":"7110_CR10","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1080\/00107514.2014.964942","volume":"56","author":"M Schuld","year":"2015","unstructured":"Schuld M, Sinayskiy I, Petruccione F (2015) An introduction to quantum machine learning. Contemp Phys 56(2):172\u2013185","journal-title":"Contemp Phys"},{"key":"7110_CR11","doi-asserted-by":"crossref","unstructured":"Dutta S, Innan N, Marchisio A, Yahia SB, Shafique M (2024) QADQN: Quantum attention deep q-network for financial market prediction. In: 2024 IEEE International Conference on Quantum Computing and Engineering (QCE). IEEE, vol 2, pp 341\u2013346","DOI":"10.1109\/QCE60285.2024.10303"},{"key":"7110_CR12","doi-asserted-by":"crossref","unstructured":"Innan N, Marchisio A, Bennai M, Shafique M (2024) LEP-QNN: Loan eligibility prediction using quantum neural networks. arXiv:2412.03158","DOI":"10.1109\/QCE65121.2025.00204"},{"key":"7110_CR13","doi-asserted-by":"crossref","unstructured":"Innan N, Behera BK, Al-Kuwari S, Farouk A (2025) QNN-VRCS: A quantum neural network for vehicle road cooperation systems. IEEE Trans Intell Trans Syst","DOI":"10.1109\/TITS.2025.3538786"},{"key":"7110_CR14","unstructured":"Chen I, Innan N, Roy SK, Saroni J (2024) Crossing the gap using variational quantum eigensolver: A comparative study. arXiv:2405.11687"},{"key":"7110_CR15","doi-asserted-by":"publisher","first-page":"107760","DOI":"10.1016\/j.mtcomm.2023.107760","volume":"38","author":"N Innan","year":"2024","unstructured":"Innan N, Khan MA-Z, Bennai M (2024) Quantum computing for electronic structure analysis: Ground state energy and molecular properties calculations. Mater Today Commun 38:107760","journal-title":"Mater Today Commun"},{"key":"7110_CR16","doi-asserted-by":"crossref","unstructured":"El\u00a0Maouaki W, Innan N, Marchisio A, Said T, Bennai M, Shafique M (2024) Quantum clustering for cybersecurity. In: 2024 IEEE international conference on quantum computing and engineering (QCE). IEEE, vol\u00a02, pp 5\u201310","DOI":"10.1109\/QCE60285.2024.10243"},{"key":"7110_CR17","doi-asserted-by":"crossref","unstructured":"Pathak P, Oad V, Prajapati A, Innan N (2024) Resource allocation optimization in 5g networks using variational quantum regressor. In: 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, pp 101\u2013105","DOI":"10.1109\/QCNC62729.2024.00025"},{"issue":"1","key":"7110_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s42484-024-00162-3","volume":"6","author":"N Innan","year":"2024","unstructured":"Innan N, Siddiqui OI, Arora S, Ghosh T, Ko\u00e7ak YP, Paragas D, Galib AAO, Khan MA-Z, Bennai M (2024) Quantum state tomography using quantum machine learning. Quantum Mach Intell 6(1):28","journal-title":"Quantum Mach Intell"},{"issue":"10","key":"7110_CR19","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/s11128-023-04138-3","volume":"22","author":"N Innan","year":"2023","unstructured":"Innan N, Khan MA-Z, Panda B, Bennai M (2023) Enhancing quantum support vector machines through variational kernel training. Quantum Inf Process 22(10):374","journal-title":"Quantum Inf Process"},{"issue":"5","key":"7110_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad3e38","volume":"99","author":"N Innan","year":"2024","unstructured":"Innan N, Bennai M (2024) A variational quantum perceptron with grover\u2019s algorithm for efficient classification. Phys Scr 99(5):055120","journal-title":"Phys Scr"},{"key":"7110_CR21","doi-asserted-by":"crossref","unstructured":"Innan N, Khan MA-Z, Marchisio A, Shafique M, Bennai M (2024) FedQNN: Federated learning using quantum neural networks. In: 2024 International joint conference on neural networks (IJCNN), pp 1\u20139","DOI":"10.1109\/IJCNN60899.2024.10651123"},{"issue":"02","key":"7110_CR22","doi-asserted-by":"publisher","first-page":"2350044","DOI":"10.1142\/S0219749923500442","volume":"22","author":"N Innan","year":"2024","unstructured":"Innan N, Khan MA-Z, Bennai M (2024) Financial fraud detection: a comparative study of quantum machine learning models. Int J Quantum Inf 22(02):2350044","journal-title":"Int J Quantum Inf"},{"key":"7110_CR23","doi-asserted-by":"crossref","unstructured":"Alenzi HZ, Aljehane NO (2020) Fraud detection in credit cards using logistic regression. Int J Adv Comput Sci Appl 11(12)","DOI":"10.14569\/IJACSA.2020.0111265"},{"key":"7110_CR24","doi-asserted-by":"crossref","unstructured":"Kumar S, Gunjan VK, Ansari MD, Pathak R (2022) Credit card fraud detection using support vector machine. In: Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2021. Springer, pp 27\u201337","DOI":"10.1007\/978-981-16-6407-6_3"},{"key":"7110_CR25","doi-asserted-by":"crossref","unstructured":"Xuan S, Liu G, Li Z (2018) Refined weighted random forest and its application to credit card fraud detection. In: 2018 Computational Data and Social Networks: 7th International Conference, CSoNet Shanghai, China, December 18\u201320, 2018, Proceedings 7. Springer, pp 343\u2013355","DOI":"10.1007\/978-3-030-04648-4_29"},{"key":"7110_CR26","doi-asserted-by":"crossref","unstructured":"Xuan S, Liu G, Li Z, Zheng L, Wang S, Jiang C (2018) Random forest for credit card fraud detection. In: 2018 IEEE 15th international conference on networking, sensing and control (ICNSC). IEEE, pp 1\u20136","DOI":"10.1109\/ICNSC.2018.8361343"},{"key":"7110_CR27","doi-asserted-by":"publisher","first-page":"25 579","DOI":"10.1109\/ACCESS.2020.2971354","volume":"8","author":"AA Taha","year":"2020","unstructured":"Taha AA, Malebary SJ (2020) An intelligent approach to credit card fraud detection using an optimized light gradient boosting machine. IEEE Access 8:25 579-25 587","journal-title":"IEEE Access"},{"key":"7110_CR28","doi-asserted-by":"crossref","unstructured":"Pumsirirat A, Liu Y (2018) Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine. Int J Adv Comput Sci Appl 9(1)","DOI":"10.14569\/IJACSA.2018.090103"},{"issue":"12","key":"7110_CR29","doi-asserted-by":"publisher","first-page":"12 012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma X, Wu J, Xue S, Yang J, Zhou C, Sheng QZ, Xiong H, Akoglu L (2021) A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans Knowl Data Eng 35(12):12 012-12 038","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"7110_CR30","doi-asserted-by":"publisher","first-page":"100619","DOI":"10.1016\/j.cosrev.2024.100619","volume":"51","author":"D Peral-Garc\u00eda","year":"2024","unstructured":"Peral-Garc\u00eda D, Cruz-Benito J, Garc\u00eda-Pe\u00f1alvo FJ (2024) Systematic literature review: Quantum machine learning and its applications. Comput Sci Rev 51:100619","journal-title":"Comput Sci Rev"},{"key":"7110_CR31","doi-asserted-by":"crossref","unstructured":"Tudisco A, Volpe D, Ranieri G, Curato G, Ricossa D, Graziano M, Corbelletto D (2024) Evaluating the computational advantages of the variational quantum circuit model in financial fraud detection. IEEE Access","DOI":"10.1109\/ACCESS.2024.3432312"},{"key":"7110_CR32","unstructured":"Qiskit: An open-source framework for quantum computing. https:\/\/qiskit.org\/ accessed: 06-Dec-2024"},{"key":"7110_CR33","unstructured":"Pennylane: A software library for quantum machine learning, quantum computing, and quantum chemistry. https:\/\/pennylane.ai\/ accessed: 06-Dec-2024"},{"issue":"5","key":"7110_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.052310","volume":"99","author":"J-M Liang","year":"2019","unstructured":"Liang J-M, Shen S-Q, Li M, Li L (2019) Quantum anomaly detection with density estimation and multivariate gaussian distribution. Phys Rev A 99(5):052310","journal-title":"Phys Rev A"},{"key":"7110_CR35","doi-asserted-by":"crossref","unstructured":"Zheng J, Gao Q, L\u00fc Y (2021) Quantum graph convolutional neural networks. In: 2021 40th Chinese Control Conference (CCC). IEEE pp 6335\u20136340","DOI":"10.23919\/CCC52363.2021.9550372"},{"key":"7110_CR36","unstructured":"Kyriienko O, Magnusson EB (2022) Unsupervised quantum machine learning for fraud detection. arXiv:2208.01203"},{"key":"7110_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2022.3213474","volume":"3","author":"M Grossi","year":"2022","unstructured":"Grossi M, Ibrahim N, Radescu V, Loredo R, Voigt K, Von Altrock C, Rudnik A (2022) Mixed quantum-classical method for fraud detection with quantum feature selection. IEEE Trans Quantum Eng 3:1\u201312","journal-title":"IEEE Trans Quantum Eng"},{"issue":"9","key":"7110_CR38","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.3390\/math12091391","volume":"12","author":"N Schetakis","year":"2024","unstructured":"Schetakis N, Aghamalyan D, Boguslavsky M, Rees A, Rakotomalala M, Griffin PR (2024) Quantum machine learning for credit scoring. Mathematics 12(9):1391","journal-title":"Mathematics"},{"issue":"1","key":"7110_CR39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.108.012410","volume":"108","author":"K Beer","year":"2023","unstructured":"Beer K, Khosla M, K\u00f6hler J, Osborne TJ, Zhao T (2023) Quantum machine learning of graph-structured data. Phys Rev A 108(1):012410","journal-title":"Phys Rev A"},{"issue":"1","key":"7110_CR40","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s42484-024-00143-6","volume":"6","author":"N Innan","year":"2024","unstructured":"Innan N, Sawaika A, Dhor A, Dutta S, Thota S, Gokal H, Patel N, Khan MA-Z, Theodonis I, Bennai M (2024) Financial fraud detection using quantum graph neural networks. Quantum Mach Intell 6(1):7","journal-title":"Quantum Mach Intell"},{"key":"7110_CR41","doi-asserted-by":"crossref","unstructured":"Innan N, Marchisio A, Bennai M, Shafique M (2025) Qfnn-ffd: Quantum federated neural network for financial fraud detection. In: 2025 IEEE International Conference on Quantum Software (QSW). IEEE, pp 41\u201347","DOI":"10.1109\/QSW67625.2025.00015"},{"key":"7110_CR42","doi-asserted-by":"crossref","unstructured":"Huot C, Heng S, Kim T-K, Han Y (2024) Quantum autoencoder for enhanced fraud detection in imbalanced credit card dataset. IEEE Access","DOI":"10.1109\/ACCESS.2024.3496901"},{"issue":"4","key":"7110_CR43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.122.040504","volume":"122","author":"M Schuld","year":"2019","unstructured":"Schuld M, Killoran N (2019) Quantum machine learning in feature hilbert spaces. Phys Rev Lett 122(4):040504","journal-title":"Phys Rev Lett"},{"key":"7110_CR44","doi-asserted-by":"crossref","unstructured":"Alomari A, Kumar SA (2023) DEQSVC: Dimensionality reduction and encoding technique for quantum support vector classifier approach to detect ddos attacks. IEEE Access","DOI":"10.1109\/ACCESS.2023.3322723"},{"key":"7110_CR45","unstructured":"Cheng J, Wang H, Liang Z, Shi Y, Han S, Qian X (2022) Topgen: Topology-aware bottom-up generator for variational quantum circuits. arXiv:2210.08190"},{"key":"7110_CR46","unstructured":"Ealaxi (2017) Synthetic data from a financial payment system. https:\/\/www.kaggle.com\/datasets\/ealaxi\/banksim1"},{"key":"7110_CR47","unstructured":"Lopez-Rojas EA, Axelsson S (2014) Banksim: A bank payments simulator for fraud detection research. In: 26th European modeling and simulation symposium, EMSS"},{"key":"7110_CR48","unstructured":"ULB, et al (2013) Credit card fraud detection. https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud"},{"key":"7110_CR49","doi-asserted-by":"crossref","unstructured":"Dave K, Innan N, Behera BK, Mumtaz S Al-Kuwari, S, Farouk A et\u00a0al (2025) Optimizing low-energy carbon iiot systems with quantum algorithms: Performance evaluation and noise robustness. IEEE Internet Things J","DOI":"10.1109\/JIOT.2025.3540949"},{"issue":"2","key":"7110_CR50","doi-asserted-by":"publisher","first-page":"025014","DOI":"10.1088\/2058-9565\/ac4f30","volume":"7","author":"H Cai","year":"2022","unstructured":"Cai H, Ye Q, Deng D-L (2022) Sample complexity of learning parametric quantum circuits. Quantum Sci Technol 7(2):025014","journal-title":"Quantum Sci Technol"},{"issue":"4","key":"7110_CR51","first-page":"041038","volume":"10","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Stoudenmire EM, Waintal X (2020) What limits the simulation of quantum computers? Phys Rev X 10(4):041038","journal-title":"Phys Rev X"},{"key":"7110_CR52","doi-asserted-by":"crossref","unstructured":"Miller M, G\u00fcnther J, Witteveen F, Teynor MS, Erakovic M, Reiher M, Solomon GC, Christandl M (2025) phase2: Full-state vector simulation of quantum time evolution at scale. arXiv:2504.17881","DOI":"10.21203\/rs.3.rs-6620681\/v1"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-026-07110-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-026-07110-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-026-07110-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:01:09Z","timestamp":1774933269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-026-07110-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["7110"],"URL":"https:\/\/doi.org\/10.1007\/s10489-026-07110-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"28 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This study did not involve human participants, animal subjects, or sensitive data requiring ethical approval or informed consent.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Informed Consent"}}],"article-number":"83"}}