{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T19:28:47Z","timestamp":1776454127863,"version":"3.51.2"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the scientific research project of the Czech Sciences Foundation","award":["19-15498S"],"award-info":[{"award-number":["19-15498S"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10796-022-10346-6","type":"journal-article","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:02:15Z","timestamp":1665705735000},"page":"1985-2003","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":133,"title":["Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework"],"prefix":"10.1007","volume":"25","author":[{"given":"Petr","family":"Hajek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4688-0619","authenticated-orcid":false,"given":"Mohammad Zoynul","family":"Abedin","sequence":"additional","affiliation":[]},{"given":"Uthayasankar","family":"Sivarajah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"key":"10346_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","volume":"55","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278\u2013288.","journal-title":"Future Generation Computer Systems"},{"key":"10346_CR2","doi-asserted-by":"publisher","first-page":"102065","DOI":"10.1016\/j.cose.2020.102065","volume":"99","author":"O Akanfe","year":"2020","unstructured":"Akanfe, O., Valecha, R., & Rao, H. R. (2020). Assessing country-level privacy risk for digital payment systems. Computers & Security, 99, 102065.","journal-title":"Computers & Security"},{"key":"10346_CR3","doi-asserted-by":"crossref","unstructured":"Awoyemi, J. O., Adetunmbi, A. O., & Oluwadare, S. A. (2017). Credit card fraud detection using machine learning techniques: A comparative analysis. IEEE international conference on computing, networking and informatics, ICCNI 2017\u00a0(pp. 1\u20139). IEEE.","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"10346_CR4","unstructured":"Bansal, S., Bruno, P., Denecker, O., & Niederkorn, M. (2019). Global Payments Report 2019: Amid Sustained Growth, Accelerating Challenges Demand Bold Actions."},{"key":"10346_CR5","unstructured":"Bernard, P., De Freitas, N. E. M., & Maillet, B. B. (2021). A financial fraud detection indicator for investors: an IDeA. Annals of Operations Research, 1\u201324."},{"key":"10346_CR6","first-page":"1","volume":"13.7.2020","author":"J Blumenstock","year":"2020","unstructured":"Blumenstock, J. (2020). Machine learning can help get COVID-19 aid to those who need it most. Nature, 13.7.2020, 1\u20133.","journal-title":"Nature"},{"key":"10346_CR7","doi-asserted-by":"crossref","unstructured":"Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: Identifying density-based local outliers. In 2000 ACM SIGMOD international conference on management of data - SIGMOD \u201900 (pp. 93\u2013104) New York, New York, USA.","DOI":"10.1145\/342009.335388"},{"key":"10346_CR8","unstructured":"Burgess, C. P., Higgins, I., Pal, A., Matthey, L., Watters, N., Desjardins, G., & Lerchner, A. (2018). Understanding disentangling in $$\\beta$$-VAE. In Proc. of the 31st conference on neural information processing systems\u00a0(pp. 1\u201311)."},{"key":"10346_CR9","unstructured":"Buschj\u00e4ger, S., Honysz, P. J., & Morik, K. (2021). Randomized outlier detection with trees. International Journal of Data Science and Analytics, 1\u201314."},{"key":"10346_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2021","unstructured":"Carcillo, F., Le Borgne, Y. A., Caelen, O., Kessaci, Y., Obl\u00e9, F., & Bontempi, G. (2021). Combining unsupervised and supervised learning in credit card fraud detection. Information Sciences, 557, 317\u2013331.","journal-title":"Information Sciences"},{"key":"10346_CR11","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.cose.2015.04.002","volume":"53","author":"M Carminati","year":"2015","unstructured":"Carminati, M., Caron, R., Maggi, F., Epifani, I., & Zanero, S. (2015). BankSealer: A decision support system for online banking fraud analysis and investigation. Computers & Security, 53, 175\u2013186.","journal-title":"Computers & Security"},{"key":"10346_CR12","doi-asserted-by":"crossref","unstructured":"Chen, T., & Guestrin, C. (2016). Xgboost: A scalable tree boosting system. In Proc. of the 22nd ACM SIGKDD int. conf. on knowledge discovery and data mining\u00a0(pp. 785\u2013794)","DOI":"10.1145\/2939672.2939785"},{"key":"10346_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Y., & Sivakumar, V. (2021). Invesitigation of finance industry on risk awareness model and digital economic growth. Annals of Operations Research, 1\u201322.","DOI":"10.1007\/s10479-021-04287-7"},{"key":"10346_CR14","doi-asserted-by":"publisher","first-page":"102217","DOI":"10.1016\/j.cose.2021.102217","volume":"104","author":"S Chen","year":"2021","unstructured":"Chen, S., Yuan, Y., Luo, X. R., Jian, J., & Wang, Y. (2021). Discovering group-based transnational cyber fraud actives: A polymethodological view. Computers & Security, 104, 102217.","journal-title":"Computers & Security"},{"key":"10346_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10796-020-10080-x","volume":"24","author":"AG Chin","year":"2022","unstructured":"Chin, A. G., Harris, M. A., & Brookshire, R. (2022). An empirical investigation of intent to adopt mobile payment systems using a trust-based extended valence framework. Information Systems Frontiers, 24, 329\u2013347.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10346_CR16","first-page":"12","volume":"5","author":"D Choi","year":"2017","unstructured":"Choi, D., & Lee, K. (2017). Machine learning based approach to financial fraud detection process in mobile payment system. IT CoNvergence PRActice (INPRA), 5(4), 12\u201324.","journal-title":"IT CoNvergence PRActice (INPRA)"},{"key":"10346_CR17","doi-asserted-by":"publisher","first-page":"5483472","DOI":"10.1155\/2018\/5483472","volume":"2018","author":"D Choi","year":"2018","unstructured":"Choi, D., & Lee, K. (2018). An artificial intelligence approach to financial fraud detection under IoT environment: A survey and implementation. Security and Communication Networks, 2018, 5483472.","journal-title":"Security and Communication Networks"},{"issue":"6","key":"10346_CR18","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s12652-015-0276-9","volume":"6","author":"L Coppolino","year":"2015","unstructured":"Coppolino, L., D\u2019Antonio, S., Formicola, V., Massei, C., & Romano, L. (2015). Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. Journal of Ambient Intelligence and Humanized Computing, 6(6), 753\u2013762.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"10346_CR19","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/TCSS.2021.3052950","volume":"8","author":"J Cui","year":"2021","unstructured":"Cui, J., Yan, C., & Wang, C. (2021). ReMEMBeR: Ranking metric embedding-based multicontextual behavior profiling for online banking fraud detection. IEEE Transactions on Computational Social Systems, 8(3), 643\u2013654.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10346_CR20","first-page":"1","volume":"198","author":"S Davidovic","year":"2020","unstructured":"Davidovic, S., Nunhuck, S., Prady, D., Tourpe, H., & Anderson, E. (2020). Beyond the COVID-19 crisis: a framework for sustainable government-to-person mobile money transfers. IMF Working Papers, 198, 1\u201338.","journal-title":"IMF Working Papers"},{"key":"10346_CR21","doi-asserted-by":"crossref","unstructured":"David-West, O., Oni, O., & Ashiru, F. (2022). Diffusion of innovations: Mobile money utility and financial inclusion in Nigeria. Insights from agents and unbanked poor end users. Information Systems Frontiers, 1\u201321.","DOI":"10.1007\/s10796-021-10196-8"},{"key":"10346_CR22","doi-asserted-by":"crossref","unstructured":"Delecourt, S., & Guo, L. (2019). Building a robust mobile payment fraud detection system with adversarial examples. In 2019 IEEE 2nd int. conf. on artificial intelligence and knowledge engineering (AIKE)\u00a0(pp. 103\u2013106). IEEE.","DOI":"10.1109\/AIKE.2019.00026"},{"key":"10346_CR23","doi-asserted-by":"crossref","unstructured":"Dhieb, N., Ghazzai, H., Besbes, H., & Massoud, Y. (2019). Extreme gradient boosting machine learning algorithm for safe auto insurance operations. In 2019 IEEE international conference on vehicular electronics and safety, ICVES 2019, (p. 1\u20135), IEEE","DOI":"10.1109\/ICVES.2019.8906396"},{"key":"10346_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eswa.2018.02.006","volume":"102","author":"JZ Du","year":"2018","unstructured":"Du, J. Z., Lu, W. G., Wu, X. H., Dong, J. Y., & Zuo, W. M. (2018). L-SVM: A radius-margin-based SVM algorithm with LogDet regularization. Expert Systems with Applications, 102, 113\u2013125.","journal-title":"Expert Systems with Applications"},{"key":"10346_CR25","doi-asserted-by":"crossref","unstructured":"Franque, F. B., Oliveira, T., & Tam, C. (2022). Continuance intention of mobile payment: TTF model with Trust in an African context. Information Systems Frontiers, 1\u201319.","DOI":"10.1007\/s10796-022-10263-8"},{"issue":"4","key":"10346_CR26","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"M Galar","year":"2012","unstructured":"Galar, M., Fernandez, A., Barrenechea, E., Bustince, H., & Herrera, F. (2012). A review on ensembles for the class imbalance problem: Bagging-, boosting-, and hybrid-based approaches. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(4), 463\u2013484.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews"},{"key":"10346_CR27","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.eswa.2016.12.035","volume":"73","author":"G Haixiang","year":"2017","unstructured":"Haixiang, G., Yijing, L., Shang, J., Mingyun, G., Yuanyue, H., & Bing, G. (2017). Learning from class-imbalanced data: Review of methods and applications. Expert Systems with Applications, 73, 220\u2013239.","journal-title":"Expert Systems with Applications"},{"key":"10346_CR28","doi-asserted-by":"crossref","unstructured":"Hajek, P. (2019). Interpretable fuzzy rule-based systems for detecting financial statement fraud. In IFIP international conference on artificial intelligence applications and innovations, AIAI 2019\u00a0(pp. 425\u2013436). Springer.","DOI":"10.1007\/978-3-030-19823-7_36"},{"key":"10346_CR29","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.knosys.2017.05.001","volume":"128","author":"P Hajek","year":"2017","unstructured":"Hajek, P., & Henriques, R. (2017). Mining corporate annual reports for intelligent detection of financial statement fraud - A comparative study of machine learning methods. Knowledge-Based Systems, 128, 139\u2013152.","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"10346_CR30","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/S0167-9473(02)00280-3","volume":"44","author":"J Hardin","year":"2004","unstructured":"Hardin, J., & Rocke, D. M. (2004). Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator. Computational Statistics and Data Analysis, 44(4), 625\u2013638.","journal-title":"Computational Statistics and Data Analysis"},{"issue":"9\u201310","key":"10346_CR31","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., & Deng, S. (2003). Discovering cluster-based local outliers. Pattern Recognition Letters, 24(9\u201310), 1641\u20131650.","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"10346_CR32","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s10796-016-9647-9","volume":"19","author":"SY Huang","year":"2017","unstructured":"Huang, S. Y., Lin, C. C., Chiu, A. A., & Yen, D. C. (2017). Fraud detection using fraud triangle risk factors. Information Systems Frontiers, 19(6), 1343\u20131356.","journal-title":"Information Systems Frontiers"},{"key":"10346_CR33","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.elerap.2018.05.009","volume":"30","author":"N Iman","year":"2018","unstructured":"Iman, N. (2018). Is mobile payment still relevant in the fintech era? Electronic Commerce Research and Applications, 30, 72\u201382.","journal-title":"Electronic Commerce Research and Applications"},{"key":"10346_CR34","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10796-020-10077-6","volume":"24","author":"L Jia","year":"2022","unstructured":"Jia, L., Song, X., & Hall, D. (2022). Influence of habits on mobile payment acceptance: An ecosystem perspective. Information Systems Frontiers, 24, 247\u2013266.","journal-title":"Information Systems Frontiers"},{"key":"10346_CR35","doi-asserted-by":"publisher","first-page":"100908","DOI":"10.1016\/j.elerap.2019.100908","volume":"40","author":"M Jocevski","year":"2020","unstructured":"Jocevski, M., Ghezzi, A., & Arvidsson, N. (2020). Exploring the growth challenge of mobile payment platforms: A business model perspective. Electronic Commerce Research and Applications, 40, 100908.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1","key":"10346_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-018-0155-4","volume":"8","author":"J Kang","year":"2018","unstructured":"Kang, J. (2018). Mobile payment in Fintech environment: trends, security challenges, and services. Human-Centric Computing and Information Sciences, 8(1), 1\u201316.","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"5","key":"10346_CR37","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1007\/s10796-020-10045-0","volume":"23","author":"AK Kar","year":"2021","unstructured":"Kar, A. K. (2021). What affects usage satisfaction in mobile payments? Modelling user generated content to develop the \u201cdigital service usage satisfaction model\u2019\u2019. Information Systems Frontiers, 23(5), 1341\u20131361.","journal-title":"Information Systems Frontiers"},{"key":"10346_CR38","doi-asserted-by":"crossref","unstructured":"Kriegel, H. P., Schubert, M., & Zimek, A. (2008). Angle-based outlier detection in high-dimensional data. In Proc. of the 14th ACM SIGKDD international conference on knowledge discovery and data mining\u00a0(pp. 444\u2013452).","DOI":"10.1145\/1401890.1401946"},{"issue":"1","key":"10346_CR39","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2013.15","volume":"11","author":"Q Li","year":"2013","unstructured":"Li, Q., & Clark, G. (2013). Mobile security: A look ahead. IEEE Security and Privacy, 11(1), 78\u201381.","journal-title":"IEEE Security and Privacy"},{"key":"10346_CR40","doi-asserted-by":"crossref","unstructured":"Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008). Isolation forest. In IEEE int. conf. on data mining, ICDM (pp. 413\u2013422). IEEE","DOI":"10.1109\/ICDM.2008.17"},{"issue":"8","key":"10346_CR41","first-page":"1517","volume":"32","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Li, Z., Zhou, C., Jiang, Y., Sun, J., Wang, M., & He, X. (2019). Generative adversarial active learning for unsupervised outlier detection. IEEE Transactions on Knowledge and Data Engineering, 32(8), 1517\u20131528.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10346_CR42","doi-asserted-by":"crossref","unstructured":"Lopez-Rojas, E. A., & Axelsson, S. (2014). Banksim: A bank payments simulator for fraud detection research. In the 26th European Modeling and Simulation Symposium (EMSS)\u00a0(pp. 144\u2013152).","DOI":"10.1504\/IJSPM.2015.070465"},{"key":"10346_CR43","unstructured":"Lopez-Rojas, E., Elmir, A., & Axelsson, S. (2016). Paysim: A financial mobile money simulator for fraud detection. In 28th European modeling and simulation symposium, EMSS 2016, Dime University of Genoa, Larnaca (pp. 249\u2013255)."},{"key":"10346_CR44","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/978-3-030-22868-2_51","volume":"998","author":"EA Lopez-Rojas","year":"2019","unstructured":"Lopez-Rojas, E. A., & Barneaud, C. (2019). Advantages of the PaySim simulator for improving financial fraud controls. Advances in Intelligent Systems and Computing, 998, 727\u2013736.","journal-title":"Advances in Intelligent Systems and Computing"},{"issue":"4","key":"10346_CR45","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1504\/IJSPM.2018.093756","volume":"13","author":"EA Lopez-Rojas","year":"2018","unstructured":"Lopez-Rojas, E. A., Axelsson, S., & Baca, D. (2018). Analysis of fraud controls using the PaySim financial simulator. International Journal of Simulation and Process Modelling, 13(4), 377\u2013386.","journal-title":"International Journal of Simulation and Process Modelling"},{"key":"10346_CR46","doi-asserted-by":"crossref","unstructured":"Mahbobi, M., Kimiagari, S., & Vasudevan, M. (2021). Credit risk classification: an integrated predictive accuracy algorithm using artificial and deep neural networks. Annals of Operations Research, 1\u201329.","DOI":"10.1007\/s10479-021-04114-z"},{"key":"10346_CR47","doi-asserted-by":"crossref","unstructured":"Mendelson, S., & Lerner, B. (2020). Online cluster drift detection for novelty detection in data streams. In Proc. of the 19th IEEE international conference on machine learning and applications, ICMLA 2020\u00a0(pp. 171\u2013178).","DOI":"10.1109\/ICMLA51294.2020.00036"},{"key":"10346_CR48","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2020.03.219","volume":"167","author":"S Misra","year":"2020","unstructured":"Misra, S., Thakur, S., Ghosh, M., & Saha, S. K. (2020). An autoencoder based model for detecting fraudulent credit card transaction. Procedia Computer Science, 167, 254\u2013262.","journal-title":"Procedia Computer Science"},{"key":"10346_CR49","doi-asserted-by":"crossref","unstructured":"Mubalaike, A. M., & Adali, E. (2018). Deep learning approach for intelligent financial fraud detection system. In UBMK 2018 3rd int. conf. on computer science and engineering\u00a0(pp. 598\u2013603).","DOI":"10.1109\/UBMK.2018.8566574"},{"key":"10346_CR50","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.eswa.2018.06.011","volume":"110","author":"S Nami","year":"2018","unstructured":"Nami, S., & Shajari, M. (2018). Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors. Expert Systems with Applications, 110, 381\u2013392.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"10346_CR51","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","volume":"50","author":"EWT Ngai","year":"2011","unstructured":"Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559\u2013569.","journal-title":"Decision Support Systems"},{"key":"10346_CR52","doi-asserted-by":"publisher","first-page":"101900","DOI":"10.1016\/j.cose.2020.101900","volume":"96","author":"C Onwubiko","year":"2020","unstructured":"Onwubiko, C. (2020). Fraud matrix: a morphological and analysis-based classification and taxonomy of fraud. Computers & Security, 96, 101900.","journal-title":"Computers & Security"},{"issue":"3","key":"10346_CR53","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10796-020-09982-7","volume":"22","author":"A Pal","year":"2020","unstructured":"Pal, A., De, R., & Herath, T. (2020). The role of mobile payment technology in sustainable and human-centric development: evidence from the post-demonetization period in India. Information Systems Frontiers, 22(3), 607\u2013631.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10346_CR54","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s10796-020-10070-z","volume":"23","author":"A Pal","year":"2021","unstructured":"Pal, A., Herath, T., De, R., & Rao, H. R. (2021). Is the convenience worth the risk? An investigation of mobile payment usage. Information Systems Frontiers, 23(4), 941\u2013961.","journal-title":"Information Systems Frontiers"},{"key":"10346_CR55","doi-asserted-by":"crossref","unstructured":"Pambudi, B. N., Hidayah, I., & Fauziati, S. (2019). Improving money laundering detection using optimized support vector machine. In 2019 2nd international seminar on research of information technology and intelligent systems, ISRITI 2019\u00a0(pp. 273\u2013278).","DOI":"10.1109\/ISRITI48646.2019.9034655"},{"key":"10346_CR56","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.dss.2019.01.002","volume":"118","author":"M Papouskova","year":"2019","unstructured":"Papouskova, M., & Hajek, P. (2019). Two-stage consumer credit risk modelling using heterogeneous ensemble learning. Decision Support Systems, 118, 33\u201345.","journal-title":"Decision Support Systems"},{"issue":"2","key":"10346_CR57","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevny","year":"2016","unstructured":"Pevny, T. (2016). Loda: Lightweight on-line detector of anomalies. Machine Learning, 102(2), 275\u2013304.","journal-title":"Machine Learning"},{"key":"10346_CR58","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., & Shim, K. (2000). Efficient algorithms for mining outliers from large data sets. In Proc. of the 2000 ACM SIGMOD int. conf. on management of data\u00a0(pp. 427\u2013438).","DOI":"10.1145\/342009.335437"},{"key":"10346_CR59","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s41060-020-00222-4","volume":"10","author":"N Reunanen","year":"2020","unstructured":"Reunanen, N., R\u00e4ty, T., & Lintonen, T. (2020). Automatic optimization of outlier detection ensembles using a limited number of outlier examples. International Journal of Data Science and Analytics, 10, 377\u2013394.","journal-title":"International Journal of Data Science and Analytics"},{"key":"10346_CR60","doi-asserted-by":"crossref","unstructured":"Rieke, R., Zhdanova, M., Repp, J., Giot, R., & Gaber, C. (2013). Fraud detection in mobile payments utilizing process behavior analysis. In 2013 int. conf. on availability, reliability and security, ARES 2013\u00a0(pp. 662\u2013669).","DOI":"10.1109\/ARES.2013.87"},{"key":"10346_CR61","doi-asserted-by":"crossref","unstructured":"Sakurada, M., & Yairi, T. (2014). Anomaly detection using autoencoders with nonlinear dimensionality reduction. In Proc. of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis\u00a0(pp. 4\u201311).","DOI":"10.1145\/2689746.2689747"},{"key":"10346_CR62","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-030-66981-2_4","volume":"12591","author":"D Schl\u00f6r","year":"2021","unstructured":"Schl\u00f6r, D., Ring, M., Krause, A., & Hotho, A. (2021). Financial fraud detection with improved neural arithmetic logic units. Lecture Notes in Computer Science, 12591, 40\u201354.","journal-title":"Lecture Notes in Computer Science"},{"key":"10346_CR63","unstructured":"Sch\u00f6lkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., Platt, J., & Holloway, R. (2000). Support vector method for novelty detection. In Advances in neural information processing systems\u00a0(pp. 582\u2013588). MIT Press"},{"key":"10346_CR64","doi-asserted-by":"crossref","unstructured":"Seera, M., Lim, C. P., Kumar, A., Dhamotharan, L., & Tan, K. H. (2021). An intelligent payment card fraud detection system. Annals of Operations Research, 1\u201323.","DOI":"10.1007\/s10479-021-04149-2"},{"key":"10346_CR65","doi-asserted-by":"crossref","unstructured":"Sethia, A., Patel, R., & Raut, P. (2018). Data augmentation using generative models for credit card fraud detection. In 4th international conference on computing communication and automation (ICCCA)\u00a0(pp. 1\u20136). IEEE","DOI":"10.1109\/CCAA.2018.8777628"},{"key":"10346_CR66","doi-asserted-by":"crossref","unstructured":"Shajalal, M., Hajek, P., & Abedin, M. Z. (2021). Product backorder prediction using deep neural network on imbalanced data. International Journal of Production Research, 1\u201318.","DOI":"10.1080\/00207543.2021.1901153"},{"key":"10346_CR67","doi-asserted-by":"crossref","unstructured":"Turner, A., Mccombie, S., & Uhlmann, A. (2021). Follow the money: Revealing risky nodes in a Ransomware-Bitcoin network. In Proc. of the 54th Hawaii int. conf. on system sciences\u00a0(pp. 1560\u20131572).","DOI":"10.24251\/HICSS.2021.189"},{"issue":"3","key":"10346_CR68","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1016\/j.ijforecast.2018.03.002","volume":"36","author":"G Vaughan","year":"2020","unstructured":"Vaughan, G. (2020). Efficient big data model selection with applications to fraud detection. International Journal of Forecasting, 36(3), 1116\u20131127.","journal-title":"International Journal of Forecasting"},{"key":"10346_CR69","doi-asserted-by":"publisher","first-page":"100905","DOI":"10.1016\/j.elerap.2019.100905","volume":"39","author":"SF Verkijika","year":"2020","unstructured":"Verkijika, S. F. (2020). An affective response model for understanding the acceptance of mobile payment systems. Electronic Commerce Research and Applications, 39, 100905.","journal-title":"Electronic Commerce Research and Applications"},{"key":"10346_CR70","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.patrec.2020.05.035","volume":"136","author":"C Wang","year":"2020","unstructured":"Wang, C., Deng, C., & Wang, S. (2020). Imbalance-XGBoost: leveraging weighted and focal losses for binary label-imbalanced classification with XGBoost. Pattern Recognition Letters, 136, 190\u2013197.","journal-title":"Pattern Recognition Letters"},{"key":"10346_CR71","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West, J., & Bhattacharya, M. (2016). Intelligent financial fraud detection: A comprehensive review. Computers & Security, 57, 47\u201366.","journal-title":"Computers & Security"},{"key":"10346_CR72","doi-asserted-by":"publisher","first-page":"112918","DOI":"10.1016\/j.eswa.2019.112918","volume":"141","author":"ML Wong","year":"2020","unstructured":"Wong, M. L., Seng, K., & Wong, P. K. (2020). Cost-sensitive ensemble of stacked denoising autoencoders for class imbalance problems in business domain. Expert Systems with Applications, 141, 112918.","journal-title":"Expert Systems with Applications"},{"key":"10346_CR73","doi-asserted-by":"crossref","unstructured":"Xenopoulos, P. (2017). Introducing DeepBalance: Random deep belief network ensembles to address class imbalance. In 2017 IEEE Int. Conf. on Big Data, Big Data 2017\u00a0(pp. 3684\u20133689).","DOI":"10.1109\/BigData.2017.8258364"},{"issue":"3","key":"10346_CR74","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","volume":"8","author":"K Yamanishi","year":"2004","unstructured":"Yamanishi, K., Takeuchi, J. I., Williams, G., & Milne, P. (2004). On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Mining and Knowledge Discovery, 8(3), 275\u2013300.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10346_CR75","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.elerap.2018.10.004","volume":"32","author":"X Ye","year":"2018","unstructured":"Ye, X., Dong, L. A., & Ma, D. (2018). Loan evaluation in P2P lending based on random forest optimized by genetic algorithm with profit score. Electronic Commerce Research and Applications, 32, 23\u201336.","journal-title":"Electronic Commerce Research and Applications"},{"key":"10346_CR76","doi-asserted-by":"crossref","unstructured":"Zhao, Y., & Hryniewicki, M. K. (2018). XGBOD: Improving supervised outlier detection with unsupervised representation learning. In Proc. of the int. joint conf. on neural networks\u00a0(pp. 1\u20138).","DOI":"10.1109\/IJCNN.2018.8489605"},{"issue":"96","key":"10346_CR77","first-page":"1","volume":"20","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Nasrullah, Z., & Li, Z. (2019). PyOD: A Python toolbox for scalable outlier detection. Journal of Machine Learning Research, 20(96), 1\u20137.","journal-title":"Journal of Machine Learning Research"},{"issue":"12","key":"10346_CR78","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1631\/FITEE.1800580","volume":"19","author":"H Zhou","year":"2018","unstructured":"Zhou, H., Chai, H. F., & Qiu, M. L. (2018). Fraud detection within bankcard enrollment on mobile device based payment using machine learning. Frontiers of Information Technology and Electronic Engineering, 19(12), 1537\u20131545.","journal-title":"Frontiers of Information Technology and Electronic Engineering"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10346-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10346-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10346-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:04:07Z","timestamp":1744207447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10346-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,14]]},"references-count":78,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10346"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10346-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,14]]},"assertion":[{"value":"23 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}