{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:30Z","timestamp":1767339630417,"version":"3.41.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11334-025-00605-5","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T10:53:43Z","timestamp":1744973623000},"page":"333-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Advanced machine learning and deep learning approaches for fraud detection in mobile money transactions"],"prefix":"10.1007","volume":"21","author":[{"given":"Nouhaila","family":"Hanbali","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"El-Yahyaoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"605_CR1","doi-asserted-by":"crossref","unstructured":"El Hanine Mohamed, El-Yahyaoui Ahmed, and Redouane Es-Sadaoui, \u201cThe Internet of Drones: Evolution, Applications and Security Solutions,\u201d in Big Data and Internet of Things, K. and O. H. and H. M. Mahboub Oussama and Haddouch, Ed., Cham: Springer Nature Switzerland, 2024, pp. 955965.","DOI":"10.1007\/978-3-031-74491-4_73"},{"key":"605_CR2","doi-asserted-by":"publisher","unstructured":"M. El Hanine, A. El-Yahyaoui, and R. Es-Sadaoui, \u201cThree Layer IoT Architecture: Attacks and Security Mechanisms,\u201d in 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), 2024, pp. 32\u201338. doi: 10.1109\/FiCloud62933.2024.00014. https:\/\/doi.org\/10.1109\/FiCloud62933.2024.00014","DOI":"10.1109\/FiCloud62933.2024.00014"},{"key":"605_CR3","unstructured":"Hanbali Nouhaila, Ehbali Chaima, El-Yahyaoui Ahmed, and Ouacha Ali, \u201cIntroduction to QuantumResistant Cryptography in Payment Systems.\u201d"},{"key":"605_CR4","unstructured":"Ehbali Chaima, Hanbali Nouhaila, Ouacha Ali, and Elyahyaoui Ahmed, \u201cQuantum-Assisted Hyperparameter Tuning Challenge for Financial Fraud Detection.\u201d"},{"key":"605_CR5","doi-asserted-by":"publisher","unstructured":"Elgharbi SE, Ouchani S, Ait Wakrime A, Ouhammou Y (2024) \u2018Smart Mining and Consensus Protocols in Blockchain-enabled Industrial Cyber-Physical Systems: A Survey\u2019, in Proceedings of the 7th International Conference on Future Networks and Distributed Systems, in ICFNDS \u201923. New York, NY, USA: Association for Computing Machinery, pp. 769\u2013778. https:\/\/doi.org\/10.1145\/3644713.3644845","DOI":"10.1145\/3644713.3644845"},{"key":"605_CR6","doi-asserted-by":"publisher","unstructured":"Wu J, Liu C, Gardner D, \u2018A Study of Anonymous Purchasing Based on Mobile Payment System\u2019 (Jan. 2016) Procedia Comput Sci 83:685\u2013689. https:\/\/doi.org\/10.1016\/J.PROCS.2016.04.152","DOI":"10.1016\/J.PROCS.2016.04.152"},{"key":"605_CR7","doi-asserted-by":"crossref","unstructured":"Lahbib A, Wakrime AA, Laouiti A, Toumi K, Martin S (2020) \u2018An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts\u2019, in International Conference on Advanced Information Networking and Applications","DOI":"10.1007\/978-3-030-44041-1_111"},{"key":"605_CR8","doi-asserted-by":"publisher","unstructured":"Benoudifa O, Wakrime AA, Benaini R (2023) \u2018Autonomous solution for Controller Placement Problem of Software-Defined Networking using MuZero based intelligent agents\u2019, Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 10, p. 101842, Dec. https:\/\/doi.org\/10.1016\/J.JKSUCI.2023.101842","DOI":"10.1016\/J.JKSUCI.2023.101842"},{"issue":"5","key":"605_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MSP.2017.3681060","volume":"15","author":"P Traynor","year":"2017","unstructured":"Traynor P, Butler K, Bowers J, Reaves B (2017) FinTechSec: addressing the security challenges of digital financial services. IEEE Secur Priv 15(5):85\u201389. https:\/\/doi.org\/10.1109\/MSP.2017.3681060","journal-title":"IEEE Secur Priv"},{"key":"605_CR10","unstructured":"Ehbali C, Ouacha A \u2018Comparative study: The emerging of Quantum Cryptography\u2019"},{"key":"605_CR11","doi-asserted-by":"publisher","unstructured":"Botchey FE, Qin Z, Hughes-Lartey K (Aug. 2020) Mobile money fraud prediction-A cross-case analysis on the efficiency of support vector machines, gradient boosted decision trees, and Na\u00efve Bayes algorithms. Inform (Switzerland) 11(8). https:\/\/doi.org\/10.3390\/INFO11080383","DOI":"10.3390\/INFO11080383"},{"key":"605_CR12","doi-asserted-by":"publisher","unstructured":"Aron J (2018) \u2018Mobile money and the economy: A review of the evidence\u2019, World Bank Research Observer, vol. 33, no. 2, pp. 135\u2013188, Aug. https:\/\/doi.org\/10.1093\/wbro\/lky001","DOI":"10.1093\/wbro\/lky001"},{"key":"605_CR13","doi-asserted-by":"crossref","unstructured":"Luc Jacolin KMJ, Noah A (2019) \u2018Informal Sector and Mobile Financial Services in Developing Countries: Does Financial Innovation Matter?\u2019, Banque de France Working Paper, pp. 1\u201329, May","DOI":"10.2139\/ssrn.3396046"},{"key":"605_CR14","doi-asserted-by":"publisher","unstructured":"Katusiime L (2021) \u2018Mobile money use: The impact of macroeconomic policy and regulation\u2019, Economies, vol. 9, no. 2, Jun. https:\/\/doi.org\/10.3390\/economies9020051","DOI":"10.3390\/economies9020051"},{"key":"605_CR15","doi-asserted-by":"crossref","unstructured":"Jack W, Suri T \u2018Mobile Money: The Economics of M-Pesa\u2019, Emerging Markets Economics: Macroeconomic Issues & Challenges eJournal, 2011, [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:167981497","DOI":"10.3386\/w16721"},{"key":"605_CR16","doi-asserted-by":"crossref","unstructured":"Schebesch Klaus R B. and, Stecking \u2018Using, Multiple SVM (2008) In: Applications H and S.-T (ed) L. and D. R. Preisach Christine and Burkhardt. Springer Berlin Heidelberg, Ed., Berlin, Heidelberg, pp 515\u2013522. Models for Unbalanced Credit Scoring Data Sets\u2019, in Data Analysis, Machine Learning","DOI":"10.1007\/978-3-540-78246-9_61"},{"key":"605_CR17","doi-asserted-by":"crossref","unstructured":"Randhawa K, Loo CK, Seera M, Lim CP, Nandi AK (2018) Credit card fraud detection using adaboost and majority voting. 6:14277\u201314284. IEEE Access10.1109\/ACCESS.2018.2806420","DOI":"10.1109\/ACCESS.2018.2806420"},{"key":"605_CR18","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-031-68660-3_27","volume-title":"Digital technologies and applications, B. Motahhir Saad and Bossoufi","author":"C EHBALI","year":"2024","unstructured":"EHBALI C, HANBALI N, OUACHA A, EL-YAHYAOUI A (2024) Comparative study: the emerging of quantum cryptography. Digital technologies and applications, B. Motahhir Saad and Bossoufi. Springer Nature Switzerland, Ed., Cham, pp 291\u2013300"},{"key":"605_CR19","doi-asserted-by":"publisher","unstructured":"Niu X, Wang L, Yang X, \u2018A Comparison Study of Credit Card Fraud Detection (2019): Supervised versus Unsupervised\u2019, ArXiv, vol. abs\/1904.10604, Apr. https:\/\/doi.org\/10.48550\/arXiv.2312.13896","DOI":"10.48550\/arXiv.2312.13896"},{"key":"605_CR20","doi-asserted-by":"publisher","unstructured":"Sadgali N, Sael, Benabbou F (2019) \u2018Fraud detection in credit card transaction using neural networks\u2019, in Proceedings of the 4th International Conference on Smart City Applications, in SCA \u201919. New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3368756.3369082. https:\/\/www.kaggle.com\/datasets\/ealaxi\/paysim1\/versions\/2?resource=download","DOI":"10.1145\/3368756.3369082"},{"key":"605_CR21","doi-asserted-by":"crossref","unstructured":"Mubalaike AM, Adali E (2018) \u2018Deep Learning Approach for Intelligent Financial Fraud Detection System\u2019, 2018 3rd International Conference on Computer Science and Engineering (UBMK), pp. 598\u2013603","DOI":"10.1109\/UBMK.2018.8566574"},{"key":"605_CR22","doi-asserted-by":"crossref","unstructured":"Lopez-Rojas EA, Barneaud C (2019) Advantages of the PaySim simulator for improving financial fraud controls. Advances in Intelligent Systems and Computing","DOI":"10.1007\/978-3-030-22868-2_51"},{"key":"605_CR23","doi-asserted-by":"crossref","unstructured":"Schl\u00f6r D, Ring M, Krause A, Hotho A (2020) \u2018Financial Fraud Detection with Improved Neural Arithmetic Logic Units\u2019, in MIDAS@PKDD\/ECML","DOI":"10.3389\/frai.2020.00071"},{"key":"605_CR24","doi-asserted-by":"publisher","unstructured":"Li T, Li J, Liu Z, Li P, Jia C (May 2018) Differentially private Naive Bayes learning over multiple data sources. Inf Sci (N Y) 444:89\u2013104. https:\/\/doi.org\/10.1016\/J.INS.2018.02.056","DOI":"10.1016\/J.INS.2018.02.056"},{"key":"605_CR25","doi-asserted-by":"crossref","unstructured":"Hssina B, Merbouha A, Ezzikouri H, Erritali M (2014) A comparative study of decision tree ID3 and C4.5\u2019, IJACSA) international journal of advanced computer science and applications, special issue on. 13:2\u201310. Advances in Vehicular Ad Hoc Networking and Applications10.14569\/SPECIALISSUE.2014.040203","DOI":"10.14569\/SpecialIssue.2014.040203"},{"key":"605_CR26","unstructured":"Si S, Zhang H, Keerthi SS, Mahajan D, Dhillon IS, Hsieh C-J (2017) \u2018Gradient Boosted Decision Trees for High Dimensional Sparse Output\u2019, in Proceedings of the 34th International Conference on Machine Learning, D. Precup and Y. W. Teh, Eds., in Proceedings of Machine Learning Research, vol. 70. PMLR, Mar. pp. 3182\u20133190"},{"key":"605_CR27","doi-asserted-by":"publisher","unstructured":"Wen Z, He B, Kotagiri R, Lu S, Shi J (2018) \u2018Efficient Gradient Boosted Decision Tree Training on GPUs\u2019, in 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 234\u2013243. https:\/\/doi.org\/10.1109\/IPDPS.2018.00033","DOI":"10.1109\/IPDPS.2018.00033"},{"issue":"5","key":"605_CR28","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s10796-022-10346-6","volume":"25","author":"P Hajek","year":"2023","unstructured":"Hajek P, Abedin MZ, Sivarajah U (2023) Fraud detection in mobile payment systems using an XGBoost-based framework. Oct 25(5):1985\u20132003. Information Systems Frontiers10.1007\/s10796-022-10346-6","journal-title":"Oct"},{"key":"605_CR29","doi-asserted-by":"publisher","unstructured":"Shwartz-Ziv R, Goldblum M, Li YL, Bruss CB, Wilson AG (2023) \u2018Simplifying Neural Network Training Under Class Imbalance\u2019, ArXiv, vol. abs\/2312.02517, Dec. https:\/\/doi.org\/10.48550\/arXiv.2312.02517","DOI":"10.48550\/arXiv.2312.02517"},{"key":"605_CR30","doi-asserted-by":"publisher","unstructured":"Wongvorachan T, He S, Bulut O (2023) \u2018A Comparison of Undersampling, Oversampling, and SMOTE Methods for Dealing with Imbalanced Classification in Educational Data Mining\u2019, Information (Switzerland), vol. 14, no. 1, Jan. https:\/\/doi.org\/10.3390\/info14010054","DOI":"10.3390\/info14010054"},{"key":"605_CR31","doi-asserted-by":"publisher","unstructured":"Buda M, Maki A, Mazurowski MA (Oct. 2017) A systematic study of the class imbalance problem in convolutional neural networks. https:\/\/doi.org\/10.1016\/j.neunet.2018.07.011","DOI":"10.1016\/j.neunet.2018.07.011"},{"key":"605_CR32","doi-asserted-by":"publisher","unstructured":"Leevy L, Khoshgoftaar TM, Bauder RA, Seliya N (Dec. 2018) A survey on addressing high-class imbalance in big data. J Big Data 5(1). https:\/\/doi.org\/10.1186\/s40537-018-0151-6","DOI":"10.1186\/s40537-018-0151-6"},{"key":"605_CR33","doi-asserted-by":"publisher","unstructured":"Piyadasa TD, Gunawardana K (2023) \u2018A Review on Oversampling Techniques for Solving the Data Imbalance Problem in Classification\u2019, International Journal on Advances in ICT for Emerging Regions (ICTer), vol. 16, no. 1, pp. 22\u201331, Jun. https:\/\/doi.org\/10.4038\/icter.v16i1.7260","DOI":"10.4038\/icter.v16i1.7260"},{"key":"605_CR34","doi-asserted-by":"publisher","unstructured":"Cheng W-C, Mai T-H, Lin H-T (2023) \u2018From SMOTE to Mixup for Deep Imbalanced Classification\u2019, in nternational Conference on Technologies and Applications of Artificial Intelligence. https:\/\/doi.org\/10.48550\/arXiv.2308.15457","DOI":"10.48550\/arXiv.2308.15457"},{"key":"605_CR35","doi-asserted-by":"publisher","first-page":"129678","DOI":"10.1109\/ACCESS.2019.2940061","volume":"7","author":"Z Wang","year":"2019","unstructured":"Wang Z, Wu C, Zheng K, Niu X, Wang X (2019) SMOTETomek-Based resampling for personality recognition. IEEE Access 7:129678\u2013129689. https:\/\/doi.org\/10.1109\/ACCESS.2019.2940061","journal-title":"IEEE Access"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00605-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-025-00605-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00605-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:05:31Z","timestamp":1750316731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-025-00605-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,18]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["605"],"URL":"https:\/\/doi.org\/10.1007\/s11334-025-00605-5","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2025,4,18]]},"assertion":[{"value":"15 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}