{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:21:50Z","timestamp":1766578910231,"version":"3.44.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01971-4","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T09:37:51Z","timestamp":1747647471000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid optimization and deep learning for enhancing accuracy in fraud detection using big data techniques"],"prefix":"10.1007","volume":"18","author":[{"given":"Jingchao","family":"Hu","sequence":"first","affiliation":[]},{"given":"Yaodong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"1971_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00320-x","volume":"7","author":"S Thudumu","year":"2020","unstructured":"Thudumu S, Branch P, Jin J, Singh J (2020) A comprehensive survey of anomaly detection techniques for high dimensional big data. J Big Data 7:1\u201330","journal-title":"J Big Data"},{"issue":"2021","key":"1971_CR2","doi-asserted-by":"publisher","first-page":"100402","DOI":"10.1016\/j.cosrev.2021.100402","volume":"40","author":"KG Al-Hashedi","year":"2021","unstructured":"Al-Hashedi KG, Magalingam P (2021) Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019. Comput Sci Rev 40(2021):100402","journal-title":"Comput Sci Rev"},{"issue":"5","key":"1971_CR3","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","volume":"17","author":"X Zhou","year":"2020","unstructured":"Zhou X, Yiyong Hu, Liang W, Ma J, Jin Q (2020) Variational LSTM enhanced anomaly detection for big industrial data. IEEE Trans Industr Inf 17(5):3469\u20133477","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"1971_CR4","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jksuci.2022.11.008","volume":"35","author":"A Cherif","year":"2023","unstructured":"Cherif A, Badhib A, Ammar H, Alshehri S, Kalkatawi M, Imine A (2023) Credit card fraud detection in the era of disruptive technologies: A systematic review. J King Saud Univ-Comput Inform Sci 35(1):145\u2013174","journal-title":"J King Saud Univ-Comput Inform Sci"},{"issue":"1","key":"1971_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc5010001","volume":"5","author":"O Alghushairy","year":"2020","unstructured":"Alghushairy O, Alsini R, Soule T, Ma X (2020) A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn Comput 5(1):1","journal-title":"Big Data Cogn Comput"},{"issue":"8","key":"1971_CR6","doi-asserted-by":"publisher","first-page":"e3647","DOI":"10.1002\/ett.3647","volume":"33","author":"A Habeeb","year":"2022","unstructured":"Habeeb A, Ahamed R, Nasaruddin F, Gani A, Amanullah MA, Hashem IAT, Ahmed E, Imran M (2022) Clustering-based real-time anomaly detection\u2014A breakthrough in big data technologies. Trans Emerging Telecomm Technol 33(8):e3647","journal-title":"Trans Emerging Telecomm Technol"},{"key":"1971_CR7","doi-asserted-by":"publisher","first-page":"116429","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2022","unstructured":"Hilal W, Gadsden SA, Yawney J (2022) Financial fraud: a review of anomaly detection techniques and recent advances. Expert Syst Appl 193:116429","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1971_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40537-022-00573-8","volume":"9","author":"E Ileberi","year":"2022","unstructured":"Ileberi E, Sun Y, Wang Z (2022) A ML based credit card fraud detection using the GA algorithm for feature selection. J Big Data 9(1):24","journal-title":"J Big Data"},{"key":"1971_CR9","doi-asserted-by":"publisher","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi T, Ong K-L, Kam BH, Boo YL (2020) Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decision Support Systems 133:113303","journal-title":"Decision Support Systems"},{"issue":"12","key":"1971_CR10","doi-asserted-by":"publisher","first-page":"9027","DOI":"10.1109\/TII.2022.3164087","volume":"18","author":"Y Wang","year":"2022","unstructured":"Wang Y, Xin Du, Zhihui Lu, Duan Q, Jie Wu (2022) Improved LSTM-based time-series anomaly detection in rail transit operation environments. IEEE Trans Industr Inf 18(12):9027\u20139036","journal-title":"IEEE Trans Industr Inf"},{"key":"1971_CR11","doi-asserted-by":"crossref","unstructured":"Lebichot B, Le Borgne Y-A, He-Guelton L, Obl\u00e9 F, Bontempi G (2020) \"Deep-learning domain adaptation techniques for credit cards fraud detection.\" In: Recent Advances in Big Data and Deep Learning: Proceedings of the INNS Big Data and Deep Learning Conference INNSBDDL2019, held at Sestri Levante, Genova, Italy 16\u201318 April 2019, pp. 78\u201388. Springer International Publishing.","DOI":"10.1007\/978-3-030-16841-4_8"},{"key":"1971_CR12","doi-asserted-by":"crossref","unstructured":"Shaukat K, Alam TM, Luo S, Shabbir S, Hameed IA, Li J, Abbas SK, Javed U (2021) \"A review of time-series anomaly detection techniques: A step to future perspectives.\" In: Advances in Information and Communication: Proceedings of the 2021 Future of Information and Communication Conference (FICC), Volume 1, pp. 865\u2013877. Springer International Publishing.","DOI":"10.1007\/978-3-030-73100-7_60"},{"key":"1971_CR13","doi-asserted-by":"crossref","unstructured":"Zioviris G, Kolomvatsos K, Stamoulis G (2021) \"On the use of a sequential deep learning scheme for financial fraud detection.\" In Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 2, pp. 507\u2013523. Springer International Publishing.","DOI":"10.1007\/978-3-030-80126-7_37"},{"key":"1971_CR14","doi-asserted-by":"crossref","unstructured":"Karn AL, Ateeq K, Sengan S, Gandhi I, Ravi L, Sharma DK, Subramaniyaswamy V (2022) \"B-lstm-Nb based composite sequence Learning model for detecting fraudulent financial activities.\" Malaysian J Comput Sci 30\u201349.","DOI":"10.22452\/mjcs.sp2022no1.3"},{"issue":"1","key":"1971_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3390\/app13010057","volume":"13","author":"A Razaque","year":"2022","unstructured":"Razaque A, Frej MBH, Bektemyssova G, Amsaad F, Almiani M, Aziz Alotaibi NZ, Jhanjhi SA, Alshammari M (2022) Credit card-not-present fraud detection and prevention using big data analytics algorithms. Appl Sci 13(1):57","journal-title":"Appl Sci"},{"key":"1971_CR16","doi-asserted-by":"crossref","unstructured":"Shahzadi S, Shahzad U, Emam W, Tashkandy Y, Iftikhar S (2023) \"Fraud Detection by Using Deep Learning in Mining the Information Technology for Artificial and Business Intelligence.\"","DOI":"10.2139\/ssrn.4513126"},{"key":"1971_CR17","doi-asserted-by":"crossref","unstructured":"Ghosh C, Chowdhury A, Das N, Sadhukhan B (2023) \"Enhancing Financial Fraud Detection in Bitcoin Networks Using Ensemble Deep Learning.\" In: 2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), pp. 1\u20136. IEEE","DOI":"10.1109\/ICBDS58040.2023.10346590"},{"issue":"10","key":"1971_CR18","first-page":"23200","volume":"8","author":"A Taha","year":"2023","unstructured":"Taha A (2023) A novel deep learning-based hybrid Harris hawks with sine cosine approach for credit card fraud detection. Am Institute Math Sci (AIMS) Math 8(10):23200\u201323217","journal-title":"Am Institute Math Sci (AIMS) Math"},{"key":"1971_CR19","unstructured":"Waghela A, Makadia D, Mangla M (2023) \"Utilizing ML and Big Data Analysis for Risk Mitigation and Fraud Detection in Finance\"."},{"issue":"1","key":"1971_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.37934\/araset.32.1.315331","volume":"32","author":"VC Maheshwari","year":"2023","unstructured":"Maheshwari VC, Osman NA, Aziz N (2023) A Hybrid Approach Adopted for Credit Card Fraud Detection Based on Deep Neural Networks and Attention Mechanism. J Adv Res Appl Sci Eng Technol 32(1):315\u2013331","journal-title":"J Adv Res Appl Sci Eng Technol"},{"issue":"14","key":"1971_CR21","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.3390\/math12142195","volume":"12","author":"X Li","year":"2024","unstructured":"Li X, Chu L, Li Y, Xing Z, Ding F, Li J, Ma B (2024) An Intelligent Financial Fraud Detection Support System Based on Three-Level Relationship Penetration. Mathematics 12(14):2195","journal-title":"Mathematics"},{"key":"1971_CR22","unstructured":"Adhikari P, Hamal P, Jnr Baidoo F (2024) \"Artificial Intelligence in fraud detection: Revolutionizing financial security.\""},{"key":"1971_CR23","unstructured":"Dorlikar R, Mohod SW (2024) \"A Review on Robust Credit Card Fraud Detection System Leveraging Big Data and ML.\""},{"key":"1971_CR24","doi-asserted-by":"crossref","unstructured":"Wang Y, Liu Y, Wang N, Li P, Hu J, Fu X, Wang W, Sun K, Li Q, Xu K (2024) \"Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records.\" In: 2024 IEEE\/ACM 32nd International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE","DOI":"10.1109\/IWQoS61813.2024.10682918"},{"key":"1971_CR25","doi-asserted-by":"crossref","unstructured":"Sharma R, Sharma A (2024) \"Combatting Digital Financial Fraud through Strategic Deep Learning Approaches.\" In: 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 824\u2013828. IEEE","DOI":"10.1109\/ICSCSS60660.2024.10625249"},{"issue":"06","key":"1971_CR26","doi-asserted-by":"publisher","first-page":"8","DOI":"10.37547\/tajmei\/Volume06Issue06-02","volume":"6","author":"FT Johora","year":"2024","unstructured":"Johora FT, Hasan R, Farabi SF, Akter J, Al Mahmud A (2024) AI-Powered Fraud Detection in Banking: Safeguarding Financial Transactions. Am J Manage Econ Innov 6(06):8\u201322","journal-title":"Am J Manage Econ Innov"},{"key":"1971_CR27","doi-asserted-by":"crossref","unstructured":"Adil M, Yinjun Z, Jamjoom MM, Ullah Z (2024) \"Potente: An Optimized Deep Event-based Network Framework for Credit Card Fraud Detection.\" IEEE Access","DOI":"10.1109\/ACCESS.2024.3458944"},{"key":"1971_CR28","doi-asserted-by":"crossref","unstructured":"Saheed YK, Hambali MA, Arowolo MO, Olasupo YA (2020) \"Application of GA feature selection on Naive Bayes, random forest and SVM for credit card fraud detection.\" In 2020 international conference on decision aid sciences and application (DASA), pp. 1091\u20131097. IEEE","DOI":"10.1109\/DASA51403.2020.9317228"},{"key":"1971_CR29","unstructured":"Kaggle Credit Card Fraud Detection Dataset. Available at: https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud"},{"key":"1971_CR30","unstructured":"Synthetic Financial Datasets for Fraud Detection. Available at: https:\/\/www.kaggle.com\/datasets\/ealaxi\/paysim1"},{"key":"1971_CR31","unstructured":"IEEE-CIS Fraud Detection. Available at: https:\/\/www.kaggle.com\/competitions\/ieee-fraud-detection"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01971-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01971-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01971-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:23Z","timestamp":1758986483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01971-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1971"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01971-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"16 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"179"}}