{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T16:34:29Z","timestamp":1779294869308,"version":"3.51.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09549-7","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T11:12:47Z","timestamp":1746097967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic quantification anti-fraud machine learning model for real-time transaction fraud detection in banking"],"prefix":"10.1007","volume":"28","author":[{"given":"Falai","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zaidie","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,1]]},"reference":[{"issue":"3","key":"9549_CR1","first-page":"813","volume":"8","author":"X Ma","year":"2024","unstructured":"Ma X. Research on the problem of network fraud crime in the era of big data\u2014taking \u201ckilling pig plate\u201d type network dating software as an example. J Hum Arts Soc Sci. 2024;8(3):813.","journal-title":"J Hum Arts Soc Sci"},{"key":"9549_CR2","first-page":"51","volume":"17","author":"L Yu","year":"2024","unstructured":"Yu L, Cong Q, Li S. Study on international cooperation to address cross-border telecommunication network fraud offence. J Pol & L. 2024;17:51.","journal-title":"J Pol & L"},{"issue":"03","key":"9549_CR3","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.30574\/wjarr.2024.23.3.2739","volume":"23","author":"P Iheonunekwu","year":"2024","unstructured":"Iheonunekwu P. The trifecta against financial crimes: a collaborative analysis of the roles of banks, consulting firms and governments. World J Adv Res Rev. 2024;23(03):1445\u201368.","journal-title":"World J Adv Res Rev"},{"key":"9549_CR4","unstructured":"Alex-Omiogbemi AA, Sule AK, Omowole BM, Owoade SJ. Advances in cybersecurity strategies for financial institutions: a focus on combating E-Channel fraud in the Digital era. 2024."},{"issue":"1","key":"9549_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1186\/s13677-023-00437-3","volume":"12","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Dong H. Criminal law regulation of cyber fraud crimes\u2014from the perspective of citizens\u2019 personal information protection in the era of edge computing. J Cloud Comput. 2023;12(1):64.","journal-title":"J Cloud Comput"},{"key":"9549_CR6","unstructured":"Feng G. The influence of third-party payment on the intermediary business of commercial banks and countermeasures analysis. Int J Hum Soc Sci. 43."},{"key":"9549_CR7","doi-asserted-by":"crossref","unstructured":"Aggarwal M, et al. Federated learning on internet of things: extensive and systematic review. Comput Mater Continua. 2024; 79(2).","DOI":"10.32604\/cmc.2024.049846"},{"key":"9549_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117706","volume":"206","author":"E Hossain","year":"2022","unstructured":"Hossain E, Hossain MS, Zander P-O, Andersson K. Machine learning with Belief Rule-Based Expert Systems to predict stock price movements. Expert Syst Appl. 2022;206: 117706.","journal-title":"Expert Syst Appl"},{"issue":"19","key":"9549_CR9","doi-asserted-by":"publisher","first-page":"9637","DOI":"10.3390\/app12199637","volume":"12","author":"A Ali","year":"2022","unstructured":"Ali A, et al. Financial fraud detection based on machine learning: a systematic literature review. Appl Sci. 2022;12(19):9637.","journal-title":"Appl Sci"},{"key":"9549_CR10","doi-asserted-by":"crossref","unstructured":"Priya GJ, Saradha S. Fraud detection and prevention using machine learning algorithms: a review. in 2021 7th International Conference on Electrical Energy Systems (ICEES), 2021: IEEE, pp. 564\u2013568.","DOI":"10.1109\/ICEES51510.2021.9383631"},{"issue":"9","key":"9549_CR11","doi-asserted-by":"publisher","first-page":"3951","DOI":"10.1007\/s13042-024-02129-z","volume":"15","author":"S Wang","year":"2024","unstructured":"Wang S, Wang P, Wu B, Zhu Y, Luo W, Pan Y. Structural entropy minimization combining graph representation for money laundering identification. Int J Mach Learn Cybern. 2024;15(9):3951\u201368.","journal-title":"Int J Mach Learn Cybern"},{"key":"9549_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2022","unstructured":"Hilal W, Gadsden SA, Yawney J. Financial fraud: a review of anomaly detection techniques and recent advances. Expert Syst Appl. 2022;193: 116429.","journal-title":"Expert Syst Appl"},{"issue":"1","key":"9549_CR13","doi-asserted-by":"publisher","first-page":"787","DOI":"10.56028\/aetr.10.1.787.2024","volume":"10","author":"D Jiang","year":"2024","unstructured":"Jiang D. A novel financial anti-fraud method based on machine learning algorithms. Adv Eng Technol Res. 2024;10(1):787\u2013787.","journal-title":"Adv Eng Technol Res"},{"issue":"1","key":"9549_CR14","doi-asserted-by":"publisher","first-page":"759","DOI":"10.11591\/ijece.v14i1.pp759-771","volume":"14","author":"S Islam","year":"2024","unstructured":"Islam S, Haque MM, Karim ANMR. A rule-based machine learning model for financial fraud detection. Int J Electric Comput Eng. 2024;14(1):759.","journal-title":"Int J Electric Comput Eng"},{"issue":"3","key":"9549_CR15","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.3390\/app15031555","volume":"15","author":"F Yang","year":"2025","unstructured":"Yang F, Hu G, Zhu H. A novel ensemble belief rule-based model for online payment fraud detection. Appl Sci. 2025;15(3):1555.","journal-title":"Appl Sci"},{"key":"9549_CR16","doi-asserted-by":"crossref","unstructured":"Kurshan E, Shen H, Yu H. Financial crime & fraud detection using graph computing: Application considerations & outlook. in 2020 second international conference on transdisciplinary AI (transAI), 2020: IEEE, pp. 125\u2013130.","DOI":"10.1109\/TransAI49837.2020.00029"},{"issue":"02","key":"9549_CR17","doi-asserted-by":"publisher","first-page":"021","DOI":"10.30574\/wjaets.2024.12.2.0266","volume":"12","author":"HO Bello","year":"2024","unstructured":"Bello HO, Ige AB, Ameyaw MN. Adaptive machine learning models: concepts for real-time financial fraud prevention in dynamic environments. World J Adv Eng Technol Sci. 2024;12(02):021\u201334.","journal-title":"World J Adv Eng Technol Sci"},{"key":"9549_CR18","doi-asserted-by":"publisher","first-page":"39700","DOI":"10.1109\/ACCESS.2022.3166891","volume":"10","author":"FK Alarfaj","year":"2022","unstructured":"Alarfaj FK, Malik I, Khan HU, Almusallam N, Ramzan M, Ahmed M. Credit card fraud detection using state-of-the-art machine learning and deep learning algorithms. IEEE Access. 2022;10:39700\u201315.","journal-title":"IEEE Access"},{"issue":"9","key":"9549_CR19","first-page":"31","volume":"21","author":"KS Lim","year":"2021","unstructured":"Lim KS, Lee LH, Sim Y-W. A review of machine learning algorithms for fraud detection in credit card transaction. Int J Comput Sci Netw Secur. 2021;21(9):31\u201340.","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"10","key":"9549_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.14445\/22312803\/IJCTT-V71I10P109","volume":"71","author":"K Patel","year":"2023","unstructured":"Patel K. Credit card analytics: a review of fraud detection and risk assessment techniques. Int J Comput Trends Technol. 2023;71(10):69\u201379.","journal-title":"Int J Comput Trends Technol"},{"issue":"6","key":"9549_CR21","first-page":"103","volume":"11","author":"O Bello","year":"2023","unstructured":"Bello O, Folorunso A, Onwuchekwa J, Ejiofor O, Budale F, Egwuonwu M. Analysing the impact of advanced analytics on fraud detection: a machine learning perspective. Eur J Comput Sci Inf Technol. 2023;11(6):103\u201326.","journal-title":"Eur J Comput Sci Inf Technol"},{"issue":"5","key":"9549_CR22","first-page":"786","volume":"26","author":"H You","year":"2024","unstructured":"You H, Shi T. Identifying and intercepting telecommunications fraud numbers on the internet through big data technology. Int J Netw Secur. 2024;26(5):786\u201393.","journal-title":"Int J Netw Secur"},{"key":"9549_CR23","doi-asserted-by":"crossref","unstructured":"Deepthi YP, Kalaga P, Sahu SK, Jacob JJ, S KP, Ma Q. AI-based machine learning prediction for optimization of copper coating process on graphite powder for green composite fabrication. Int J Interactive Design Manuf (IJIDeM). 2024; 1\u20138.","DOI":"10.1007\/s12008-024-02032-5"},{"issue":"1","key":"9549_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.70267\/1cc7aw07","volume":"1","author":"G Liu","year":"2024","unstructured":"Liu G. Leveraging machine learning for telecom banking card fraud detection: a comparative analysis of logistic regression, random forest, and XGBoost models. Comput Artif Intell. 2024;1(1):13\u201327.","journal-title":"Comput Artif Intell"},{"key":"9549_CR25","doi-asserted-by":"crossref","unstructured":"Yu C, Jin Y, Xing Q, Zhang Y, Guo S, Meng S. Advanced user credit risk prediction model using lightgbm, xgboost and tabnet with smoteenn. in 2024 IEEE 6th International Conference on Power, Intelligent Computing and Systems (ICPICS), 2024: IEEE, pp. 876\u2013883.","DOI":"10.1109\/ICPICS62053.2024.10796247"},{"key":"9549_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100163","volume":"6","author":"JK Afriyie","year":"2023","unstructured":"Afriyie JK, et al. A supervised machine learning algorithm for detecting and predicting fraud in credit card transactions. Decision Anal J. 2023;6: 100163.","journal-title":"Decision Anal J"},{"key":"9549_CR27","doi-asserted-by":"crossref","unstructured":"Rane N, Choudhary S, Rane J. Machine learning and deep learning: a comprehensive review on methods, techniques, applications, challenges, and future directions. Techniques, Applications, Challenges, and Future Directions (May 31, 2024), 2024.","DOI":"10.2139\/ssrn.4850451"},{"key":"9549_CR28","doi-asserted-by":"crossref","unstructured":"Manoharan G, Dharmaraj A, Sheela SC, Naidu K, Chavva M, Chaudhary JK. Machine learning-based real-time fraud detection in financial transactions. in 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), 2024: IEEE, pp. 1\u20136.","DOI":"10.1109\/ACCAI61061.2024.10602350"},{"key":"9549_CR29","first-page":"218","volume":"77","author":"J Xu","year":"2024","unstructured":"Xu J, Yang T, Zhuang S, Li H, Lu W. AI-based financial transaction monitoring and fraud prevention with behaviour prediction. Appl Comput Eng. 2024;77:218\u201324.","journal-title":"Appl Comput Eng"},{"issue":"3","key":"9549_CR30","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1108\/ARA-02-2023-0062","volume":"32","author":"M Riskiyadi","year":"2024","unstructured":"Riskiyadi M. Detecting future financial statement fraud using a machine learning model in Indonesia: a comparative study. Asian Rev Account. 2024;32(3):394\u2013422.","journal-title":"Asian Rev Account"},{"key":"9549_CR31","first-page":"1","volume":"2","author":"D Almhaithawi","year":"2020","unstructured":"Almhaithawi D, Jafar A, Aljnidi M. Example-dependent cost-sensitive credit cards fraud detection using SMOTE and Bayes minimum risk. SN Appl Sci. 2020;2:1\u201312.","journal-title":"SN Appl Sci"},{"issue":"1","key":"9549_CR32","doi-asserted-by":"publisher","first-page":"6086","DOI":"10.1038\/s41598-024-56706-x","volume":"14","author":"O Rainio","year":"2024","unstructured":"Rainio O, Teuho J, Kl\u00e9n R. Evaluation metrics and statistical tests for machine learning. Sci Rep. 2024;14(1):6086.","journal-title":"Sci Rep"},{"issue":"12","key":"9549_CR33","doi-asserted-by":"publisher","first-page":"14571","DOI":"10.1007\/s11227-022-04465-9","volume":"78","author":"G Zioviris","year":"2022","unstructured":"Zioviris G, Kolomvatsos K, Stamoulis G. Credit card fraud detection using a deep learning multistage model. J Supercomput. 2022;78(12):14571\u201396.","journal-title":"J Supercomput"},{"issue":"3","key":"9549_CR34","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.32604\/cmc.2021.014445","volume":"66","author":"HJ Mohammed","year":"2021","unstructured":"Mohammed HJ, Daham HA. Analytic hierarchy process for evaluating flipped classroom learning. Comput Mater Continua. 2021;66(3):2229.","journal-title":"Comput Mater Continua"},{"issue":"3","key":"9549_CR35","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1108\/CI-04-2022-0083","volume":"24","author":"A Mohammed","year":"2024","unstructured":"Mohammed A, Zayed T, Nasiri F, Bagchi A. Asset management-based resilience index formulation for pavements via principal components analysis. Constr Innov. 2024;24(3):830\u201345.","journal-title":"Constr Innov"},{"key":"9549_CR36","doi-asserted-by":"crossref","unstructured":"Chernozhukov V, et al. Double\/debiased machine learning for treatment and structural parameters. ed: Oxford University Press Oxford, UK, 2018.","DOI":"10.3386\/w23564"},{"issue":"1","key":"9549_CR37","doi-asserted-by":"publisher","first-page":"e23395","DOI":"10.1016\/j.heliyon.2023.e23395","volume":"10","author":"TA Munshi","year":"2024","unstructured":"Munshi TA, Jahan LN, Howladar MF, Hashan M. Prediction of gross calorific value from coal analysis using decision tree-based bagging and boosting techniques. Heliyon. 2024;10(1):e23395.","journal-title":"Heliyon"},{"issue":"12","key":"9549_CR38","doi-asserted-by":"publisher","first-page":"5857","DOI":"10.1080\/03610918.2021.2001654","volume":"52","author":"B Paul","year":"2023","unstructured":"Paul B, De SK, Kundu D. A sequential sampling approach for discriminating log-normal, Weibull, and log-logistic distributions. Commun Stat-Simul Comput. 2023;52(12):5857\u201379.","journal-title":"Commun Stat-Simul Comput"},{"issue":"2","key":"9549_CR39","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13682","volume":"42","author":"EM Al-dahasi","year":"2025","unstructured":"Al-dahasi EM, Alsheikh RK, Khan FA, Jeon G. Optimizing fraud detection in financial transactions with machine learning and imbalance mitigation. Expert Syst. 2025;42(2): e13682.","journal-title":"Expert Syst"},{"issue":"1","key":"9549_CR40","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1186\/s12984-022-01075-7","volume":"19","author":"S Campagnini","year":"2022","unstructured":"Campagnini S, et al. Cross-validation of predictive models for functional recovery after post-stroke rehabilitation. J Neuroeng Rehabil. 2022;19(1):96.","journal-title":"J Neuroeng Rehabil"},{"key":"9549_CR41","first-page":"459","volume":"1","author":"M Lacu\u0161ka","year":"2021","unstructured":"Lacu\u0161ka M, Per\u00e1\u010dek T. Trends in global telecommunication fraud and its impact on business. Dev Inf Knowl Manag Bus Appl. 2021;1:459\u201385.","journal-title":"Dev Inf Knowl Manag Bus Appl"},{"key":"9549_CR42","doi-asserted-by":"crossref","unstructured":"Yu Q, Xu Z, Ke Z. Deep learning for cross-border transaction anomaly detection in anti-money laundering systems. in 2024 6th International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), 2024: IEEE, pp. 244\u2013248.","DOI":"10.1109\/MLBDBI63974.2024.10823769"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09549-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09549-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09549-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T11:12:57Z","timestamp":1746097977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09549-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,1]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9549"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09549-7","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,1]]},"assertion":[{"value":"28 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"59"}}