{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T11:45:25Z","timestamp":1778759125785,"version":"3.51.4"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T00:00:00Z","timestamp":1664323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T00:00:00Z","timestamp":1664323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004744","name":"Innoviris","doi-asserted-by":"publisher","award":["2017-R-49a"],"award-info":[{"award-number":["2017-R-49a"]}],"id":[{"id":"10.13039\/501100004744","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Adv Data Anal Classif"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11634-022-00515-5","type":"journal-article","created":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T12:02:47Z","timestamp":1664366567000},"page":"193-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["The role of diversity and ensemble learning in credit card fraud detection"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8680-9403","authenticated-orcid":false,"given":"Gian Marco","family":"Paldino","sequence":"first","affiliation":[]},{"given":"Bertrand","family":"Lebichot","sequence":"additional","affiliation":[]},{"given":"Yann-A\u00ebl","family":"Le Borgne","sequence":"additional","affiliation":[]},{"given":"Wissam","family":"Siblini","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Obl\u00e9","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Boracchi","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Bontempi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,28]]},"reference":[{"key":"515_CR1","unstructured":"Accenture (2020) How covid-19 will permanently change consumer behavior"},{"key":"515_CR2","doi-asserted-by":"crossref","unstructured":"Alazizi A, Habrard A, Jacquenet F, He-Guelton L, Obl\u00e9 F, Siblini W (2019) Anomaly detection, consider your dataset first an illustration on fraud detection. In: 2019 IEEE 31st international conference on tools with artificial intelligence (ICTAI). IEEE, pp 1351\u20131355","DOI":"10.1109\/ICTAI.2019.00188"},{"issue":"4","key":"515_CR3","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TNNLS.2013.2239309","volume":"24","author":"C Alippi","year":"2013","unstructured":"Alippi C, Boracchi G, Roveri M (2013) Just-in-time classifiers for recurrent concepts. IEEE Trans Neural Netw Learn Syst 24(4):620\u2013634","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"515_CR4","unstructured":"Ba H (2019) Improving detection of credit card fraudulent transactions using generative adversarial networks. arXiv:1907.03355"},{"key":"515_CR5","volume-title":"Analytics in a big data world: the essential guide to data science and its applications","author":"B Baesens","year":"2014","unstructured":"Baesens B (2014) Analytics in a big data world: the essential guide to data science and its applications. Wiley, New York"},{"key":"515_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119146841","volume-title":"Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection","author":"B Baesens","year":"2015","unstructured":"Baesens B, Van Vlasselaer V, Verbeke W (2015) Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection. Wiley, New York"},{"key":"515_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113492","volume":"150","author":"B Baesens","year":"2021","unstructured":"Baesens B, H\u00f6ppner S, Verdonck T (2021) Data engineering for fraud detection. Decis Support Syst 150:113492","journal-title":"Decis Support Syst"},{"key":"515_CR8","doi-asserted-by":"crossref","unstructured":"Batista GE, Carvalho AC, Monard MC (2000) Applying one-sided selection to unbalanced datasets. In: Mexican international conference on artificial intelligence. Springer, pp 315\u2013325","DOI":"10.1007\/10720076_29"},{"key":"515_CR9","doi-asserted-by":"crossref","unstructured":"Benesty J, Chen J, Huang Y, Cohen I (2009) Pearson correlation coefficient. In: Noise reduction in speech processing. Springer, pp 1\u20134","DOI":"10.1007\/978-3-642-00296-0_5"},{"issue":"3","key":"515_CR10","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S Bhattacharyya","year":"2011","unstructured":"Bhattacharyya S, Jha S, Tharakunnel K, Westland JC (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602\u2013613","journal-title":"Decis Support Syst"},{"issue":"3","key":"515_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton RJ, Hand DJ (2002) Statistical fraud detection: a review. Stat Sci 17(3):235\u2013255","journal-title":"Stat Sci"},{"key":"515_CR12","unstructured":"Bolton RJ, Hand DJ et\u00a0al (2001) Unsupervised profiling methods for fraud detection. In: Credit scoring and credit control VII, pp 235\u2013255"},{"key":"515_CR13","doi-asserted-by":"crossref","unstructured":"Brause R, Langsdorf T, Hepp M (1999) Neural data mining for credit card fraud detection. In: Proceedings 11th international conference on tools with artificial intelligence. IEEE, pp 103\u2013106","DOI":"10.1109\/TAI.1999.809773"},{"key":"515_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman L, Friedman JH, Olshen RA, Stone CJ (2017) Classification and regression trees. Routledge, London"},{"key":"515_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2019","unstructured":"Carcillo F, Le Borgne YA, Caelen O, Kessaci Y, Obl\u00e9 F, Bontempi G (2019) Combining unsupervised and supervised learning in credit card fraud detection. Inf Sci 557:317\u2013331","journal-title":"Inf Sci"},{"issue":"15","key":"515_CR16","doi-asserted-by":"publisher","first-page":"2997","DOI":"10.1080\/00949655.2017.1351564","volume":"87","author":"A Cerasa","year":"2017","unstructured":"Cerasa A, Cerioli A (2017) Outlier-free merging of homogeneous groups of pre-classified observations under contamination. J Stat Comput Simul 87(15):2997\u20133020. https:\/\/doi.org\/10.1080\/00949655.2017.1351564","journal-title":"J Stat Comput Simul"},{"issue":"1","key":"515_CR17","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1073\/pnas.1806617115","volume":"116","author":"A Cerioli","year":"2018","unstructured":"Cerioli A, Barabesi L, Cerasa A, Menegatti M, Perrotta D (2018) Newcomb\u2013benford law and the detection of frauds in international trade. Proc Natl Acad Sci 116(1):106\u2013115. https:\/\/doi.org\/10.1073\/pnas.1806617115","journal-title":"Proc Natl Acad Sci"},{"issue":"6","key":"515_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/5254.809570","volume":"14","author":"PK Chan","year":"1999","unstructured":"Chan PK, Fan W, Prodromidis AL, Stolfo SJ (1999) Distributed data mining in credit card fraud detection. IEEE Intell Syst Their Appl 14(6):67\u201374","journal-title":"IEEE Intell Syst Their Appl"},{"key":"515_CR19","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"4","key":"515_CR20","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/BF00116835","volume":"3","author":"P Clark","year":"1989","unstructured":"Clark P, Niblett T (1989) The cn2 induction algorithm. Mach Learn 3(4):261\u2013283","journal-title":"Mach Learn"},{"key":"515_CR21","doi-asserted-by":"crossref","unstructured":"Cunningham P, Carney J (2000) Diversity versus quality in classification ensembles based on feature selection. In: European conference on machine learning. Springer, pp 109\u2013116","DOI":"10.1007\/3-540-45164-1_12"},{"key":"515_CR22","unstructured":"Dal\u00a0Pozzolo A (2015) Adaptive machine learning for credit card fraud detection"},{"key":"515_CR23","doi-asserted-by":"crossref","unstructured":"Dal\u00a0Pozzolo A, Caelen O, Waterschoot S, Bontempi G (2013) Racing for unbalanced methods selection. In: International conference on intelligent data engineering and automated learning. Springer, pp 24\u201331","DOI":"10.1007\/978-3-642-41278-3_4"},{"issue":"10","key":"515_CR24","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Dal Pozzolo","year":"2014","unstructured":"Dal Pozzolo A, Caelen O, Le Borgne YA, Waterschoot S, Bontempi G (2014a) Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst Appl 41(10):4915\u20134928","journal-title":"Expert Syst Appl"},{"key":"515_CR25","doi-asserted-by":"crossref","unstructured":"Dal\u00a0Pozzolo A, Johnson R, Caelen O, Waterschoot S, Chawla NV, Bontempi G (2014b) Using hddt to avoid instances propagation in unbalanced and evolving data streams. In: 2014 International joint conference on neural networks (IJCNN). IEEE, pp 588\u2013594","DOI":"10.1109\/IJCNN.2014.6889638"},{"key":"515_CR26","doi-asserted-by":"crossref","unstructured":"Dal\u00a0Pozzolo A, Boracchi G, Caelen O, Alippi C, Bontempi G (2015a) Credit card fraud detection and concept-drift adaptation with delayed supervised information. In: 2015 international joint conference on Neural networks. IEEE","DOI":"10.1109\/IJCNN.2015.7280527"},{"key":"515_CR27","doi-asserted-by":"crossref","unstructured":"Dal\u00a0Pozzolo A, Caelen O, Bontempi G (2015b) When is undersampling effective in unbalanced classification tasks? In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 200\u2013215","DOI":"10.1007\/978-3-319-23528-8_13"},{"issue":"8","key":"515_CR28","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","volume":"29","author":"A Dal Pozzolo","year":"2017","unstructured":"Dal Pozzolo A, Boracchi G, Caelen O, Alippi C, Bontempi G (2017) Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE Trans Neural Netw Learn Syst 29(8):3784\u20133797","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"Jan","key":"515_CR29","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7(Jan):1\u201330","journal-title":"J Mach Learn Res"},{"issue":"2","key":"515_CR30","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1014091514039","volume":"6","author":"C Domingo","year":"2002","unstructured":"Domingo C, Gavalda R, Watanabe O (2002) Adaptive sampling methods for scaling up knowledge discovery algorithms. Data Min Knowl Disc 6(2):131\u2013152","journal-title":"Data Min Knowl Disc"},{"issue":"4","key":"515_CR31","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/72.595879","volume":"8","author":"JR Dorronsoro","year":"1997","unstructured":"Dorronsoro JR, Ginel F, Sgnchez C, Cruz CS (1997) Neural fraud detection in credit card operations. IEEE Trans Neural Netw 8(4):827\u2013834","journal-title":"IEEE Trans Neural Netw"},{"key":"515_CR32","unstructured":"Drummond C, Holte RC, et al (2003) C4. 5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling. Workshop on learning from imbalanced datasets II, Citeseer 11, pp 1\u20138"},{"issue":"212\u2013236","key":"515_CR33","first-page":"22","volume":"2","author":"JL Fleiss","year":"1981","unstructured":"Fleiss JL, Levin B, Paik MC et al (1981) The measurement of interrater agreement. Stat Methods Rates Proportions 2(212\u2013236):22\u201323","journal-title":"Stat Methods Rates Proportions"},{"key":"515_CR34","doi-asserted-by":"crossref","unstructured":"Gama J, Medas P, Castillo G, Rodrigues P (2004) Learning with drift detection. In: Brazilian symposium on artificial intelligence. Springer, pp 286\u2013295","DOI":"10.1007\/978-3-540-28645-5_29"},{"issue":"4","key":"515_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017dliobaite I, Bifet A, Pechenizkiy M, Bouchachia A (2014a) A survey on concept drift adaptation. ACM Comput Surv 46(4):1\u201337. https:\/\/doi.org\/10.1145\/2523813","journal-title":"ACM Comput Surv"},{"issue":"4","key":"515_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017dliobaite I, Bifet A, Pechenizkiy M, Bouchachia A (2014b) A survey on concept drift adaptation. ACM Comput Surv (CSUR) 46(4):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"9","key":"515_CR37","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1016\/S0031-3203(00)00150-3","volume":"34","author":"G Giacinto","year":"2001","unstructured":"Giacinto G, Roli F (2001) Dynamic classifier selection based on multiple classifier behaviour. Pattern Recogn 34(9):1879\u20131882","journal-title":"Pattern Recogn"},{"key":"515_CR38","first-page":"1322","volume":"8","author":"H Haibo","year":"2016","unstructured":"Haibo H, Yang B, Edwardo GA, Shutao L (2016) Adaptive synthetic sampling approach for imbalanced learning. IEEE Int Joint Conf Neural Netw IJCNN 8:1322\u20131328","journal-title":"IEEE Int Joint Conf Neural Netw IJCNN"},{"key":"515_CR39","unstructured":"Hand DJ (1981) Discrimination and classification. Wiley Series in Probability and Mathematical Statistics"},{"issue":"9","key":"515_CR40","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"8","key":"515_CR41","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"TK Ho","year":"1998","unstructured":"Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832\u2013844","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"515_CR42","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22(2):85\u2013126","journal-title":"Artif Intell Rev"},{"key":"515_CR43","first-page":"813","volume":"89","author":"RC Holte","year":"1989","unstructured":"Holte RC, Acker L, Porter BW et al (1989) Concept learning and the problem of small disjuncts. IJCAI Citeseer 89:813\u2013818","journal-title":"IJCAI Citeseer"},{"issue":"16","key":"515_CR44","doi-asserted-by":"publisher","first-page":"12650","DOI":"10.1016\/j.eswa.2012.05.018","volume":"39","author":"S Jha","year":"2012","unstructured":"Jha S, Guillen M, Westland JC (2012) Employing transaction aggregation strategy to detect credit card fraud. Expert Syst Appl 39(16):12650\u201312657","journal-title":"Expert Syst Appl"},{"issue":"9","key":"515_CR45","doi-asserted-by":"publisher","first-page":"4521","DOI":"10.1016\/j.csda.2008.03.014","volume":"52","author":"P Juszczak","year":"2008","unstructured":"Juszczak P, Adams NM, Hand DJ, Whitrow C, Weston DJ (2008) Off-the-peg and bespoke classifiers for fraud detection. Comput Stat Data Anal 52(9):4521\u20134532","journal-title":"Comput Stat Data Anal"},{"issue":"13","key":"515_CR46","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1073\/pnas.1611835114","volume":"114","author":"J Kirkpatrick","year":"2017","unstructured":"Kirkpatrick J, Pascanu R, Rabinowitz N, Veness J, Desjardins G, Rusu AA, Milan K, Quan J, Ramalho T, Grabska-Barwinska A et al (2017) Overcoming catastrophic forgetting in neural networks. Proc Natl Acad Sci 114(13):3521\u20133526","journal-title":"Proc Natl Acad Sci"},{"issue":"7","key":"515_CR47","first-page":"231","volume":"7","author":"A Krogh","year":"1995","unstructured":"Krogh A, Vedelsby J (1995) Validation, and active learning. Adv Neural Inf Process Syst 7(7):231","journal-title":"Adv Neural Inf Process Syst"},{"key":"515_CR48","doi-asserted-by":"crossref","unstructured":"Kuncheva LI (2004) Classifier ensembles for changing environments. In: International workshop on multiple classifier systems. Springer, pp 1\u201315","DOI":"10.1007\/978-3-540-25966-4_1"},{"key":"515_CR49","unstructured":"Le\u00a0Borgne YA, Siblini W, Lebichot B, Bontempi G (2022) Reproducible machine learning for credit card fraud detection-practical handbook. Universit\u00e9 Libre de Bruxelles. https:\/\/github.com\/Fraud-Detection-Handbook\/fraud-detection-handbook"},{"key":"515_CR50","doi-asserted-by":"crossref","unstructured":"Lebichot B, Braun F, Caelen O, Saerens M (2016) A graph-based, semi-supervised, credit card fraud detection system. In: International workshop on complex networks and their applications. Springer, pp 721\u2013733","DOI":"10.1007\/978-3-319-50901-3_57"},{"key":"515_CR51","doi-asserted-by":"crossref","unstructured":"Lebichot B, Le\u00a0Borgne YA, He-Guelton L, Obl\u00e9 F, Bontempi G (2019) Deep-learning domain adaptation techniques for credit cards fraud detection. In: INNS big data and deep learning conference. Springer, pp 78\u201388","DOI":"10.1007\/978-3-030-16841-4_8"},{"key":"515_CR52","doi-asserted-by":"publisher","unstructured":"Lebichot B, Paldino G, Bontempi G, Siblini W, He-Guelton L, Obl\u00e9 F (2020) Incremental learning strategies for credit cards fraud detection: extended abstract. In: 2020 IEEE 7th international conference on data science and advanced analytics (DSAA), pp 785\u2013786. https:\/\/doi.org\/10.1109\/DSAA49011.2020.00116","DOI":"10.1109\/DSAA49011.2020.00116"},{"issue":"2","key":"515_CR53","first-page":"539","volume":"39","author":"XY Liu","year":"2008","unstructured":"Liu XY, Wu J, Zhou ZH (2008) Exploratory undersampling for class-imbalance learning. IEEE Trans Syst Man Cybern Part B (Cybern) 39(2):539\u2013550","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybern)"},{"key":"515_CR54","doi-asserted-by":"publisher","first-page":"504","DOI":"10.3389\/fpsyg.2013.00504","volume":"4","author":"M Mermillod","year":"2013","unstructured":"Mermillod M, Bugaiska A, Bonin P (2013) The stability-plasticity dilemma: investigating the continuum from catastrophic forgetting to age-limited learning effects. Front Psychol 4:504","journal-title":"Front Psychol"},{"key":"515_CR55","doi-asserted-by":"crossref","unstructured":"Mullick SS, Datta S, Das S (2019) Generative adversarial minority oversampling. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 1695\u20131704","DOI":"10.1109\/ICCV.2019.00178"},{"key":"515_CR56","unstructured":"Phua C, Lee V, Smith K, Gayler R (2010) A comprehensive survey of data mining-based fraud detection research. arXiv:1009.6119"},{"key":"515_CR57","doi-asserted-by":"publisher","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi T, Ong KL, Kam BH, Boo YL (2020) Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis Support Syst 133:113303","journal-title":"Decis Support Syst"},{"key":"515_CR58","volume-title":"Dataset shift in machine learning","author":"J Quionero-Candela","year":"2009","unstructured":"Quionero-Candela J, Sugiyama M, Schwaighofer A, Lawrence ND (2009) Dataset shift in machine learning. The MIT Press, New York"},{"key":"515_CR59","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.ecosta.2018.05.001","volume":"9","author":"P Rousseeuw","year":"2019","unstructured":"Rousseeuw P, Perrotta D, Riani M, Hubert M (2019) Robust monitoring of time series with application to fraud detection. Econom Stat 9:108\u2013121. https:\/\/doi.org\/10.1016\/j.ecosta.2018.05.001","journal-title":"Econom Stat"},{"issue":"3","key":"515_CR60","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/BF00116895","volume":"1","author":"JC Schlimmer","year":"1986","unstructured":"Schlimmer JC, Granger RH (1986) Incremental learning from noisy data. Mach Learn 1(3):317\u2013354","journal-title":"Mach Learn"},{"key":"515_CR61","doi-asserted-by":"crossref","unstructured":"Siblini W, Fr\u00e9ry J, He-Guelton L, Obl\u00e9 F, Wang YQ (2020) Master your metrics with calibration. In: International symposium on intelligent data analysis. Springer, pp 457\u2013469","DOI":"10.1007\/978-3-030-44584-3_36"},{"issue":"10","key":"515_CR62","doi-asserted-by":"publisher","first-page":"4822","DOI":"10.1109\/TNNLS.2017.2775225","volume":"29","author":"Y Sun","year":"2018","unstructured":"Sun Y, Tang K, Zhu Z, Yao X (2018) Concept drift adaptation by exploiting historical knowledge. IEEE Trans Neural Netw Learn Syst 29(10):4822\u20134832","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"515_CR63","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","volume":"75","author":"V Van Vlasselaer","year":"2015","unstructured":"Van Vlasselaer V, Bravo C, Caelen O, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B (2015) Apate: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decis Support Syst 75:38\u201348","journal-title":"Decis Support Syst"},{"key":"515_CR64","doi-asserted-by":"crossref","unstructured":"Veeramachaneni K, Arnaldo I, Korrapati V, Bassias C, Li K (2016) Ai2: training a big data machine to defend. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), pp 49\u201354","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"issue":"1","key":"515_CR65","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/959242.959249","volume":"5","author":"T Washio","year":"2003","unstructured":"Washio T, Motoda H (2003) State of the art of graph-based data mining. ACM SIGKDD Explor Newsl 5(1):59\u201368","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"515_CR66","volume-title":"Statistical pattern recognition","author":"AR Webb","year":"2003","unstructured":"Webb AR (2003) Statistical pattern recognition. Wiley, New York"},{"issue":"19","key":"515_CR67","first-page":"4199","volume":"4","author":"JT Wei","year":"2010","unstructured":"Wei JT, Lin SY, Wu HH (2010) A review of the application of rfm model. Afr J Bus Manag 4(19):4199\u20134206","journal-title":"Afr J Bus Manag"},{"issue":"1","key":"515_CR68","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s11634-008-0021-8","volume":"2","author":"DJ Weston","year":"2008","unstructured":"Weston DJ, Hand DJ, Adams NM, Whitrow C, Juszczak P (2008) Plastic card fraud detection using peer group analysis. Adv Data Anal Classif 2(1):45\u201362","journal-title":"Adv Data Anal Classif"},{"issue":"1","key":"515_CR69","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s10618-008-0116-z","volume":"18","author":"C Whitrow","year":"2009","unstructured":"Whitrow C, Hand DJ, Juszczak P, Weston D, Adams NM (2009) Transaction aggregation as a strategy for credit card fraud detection. Data Min Knowl Disc 18(1):30\u201355","journal-title":"Data Min Knowl Disc"},{"issue":"1","key":"515_CR70","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF00116900","volume":"23","author":"G Widmer","year":"1996","unstructured":"Widmer G, Kubat M (1996) Learning in the presence of concept drift and hidden contexts. Mach Learn 23(1):69\u2013101","journal-title":"Mach Learn"},{"issue":"252\u2013261","key":"515_CR71","first-page":"257","volume":"194","author":"GU Yule","year":"1900","unstructured":"Yule GU (1900) Vii. on the association of attributes in statistics. Philos Trans Roy Soc Lond 194(252\u2013261):257\u2013319","journal-title":"Philos Trans Roy Soc Lond"},{"key":"515_CR72","first-page":"270","volume":"1","author":"ZH Zhou","year":"2009","unstructured":"Zhou ZH (2009) Ensemble learning. Encycl Biom 1:270\u2013273","journal-title":"Encycl Biom"},{"key":"515_CR73","unstructured":"\u017dliobaite I (2010) Learning under concept drift: an overview. arXiv:1010.4784"}],"container-title":["Advances in Data Analysis and Classification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11634-022-00515-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11634-022-00515-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11634-022-00515-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:58:39Z","timestamp":1744207119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11634-022-00515-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,28]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["515"],"URL":"https:\/\/doi.org\/10.1007\/s11634-022-00515-5","relation":{},"ISSN":["1862-5347","1862-5355"],"issn-type":[{"value":"1862-5347","type":"print"},{"value":"1862-5355","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,28]]},"assertion":[{"value":"31 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no conflicts of interest or competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}