{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T04:34:46Z","timestamp":1775622886309,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>All financial sectors are facing the most common frauds, which are digital transactional frauds. Fraudsters have always engaged in illegal activities such as stealing personal information and logging in with unauthorised credentials. Many machine learning algorithms predict whether the transaction is factual or nonfactual but fail to decrease the processing time. Hybrid models are used in this case to identify the fraud in a quick and efficient manner. This article demarcates to construct a novel model, RDQN, i.e., deep reinforcement learning, that combines with the rough set theory. This article has three steps, including data pre-processing to determine the quality of the data, which affects the learning ability of the model, determining the structural relationship and gaining useful features from the data set using rough set theory, and doing a hybridization of DNN (deep neural network) and Q learning, which is called DQN. It uses the MISH activation function and the ReLU activation function in different layers for training dynamics in the neural network. The proposed model classifies and predicts that the transaction belongs to the category implemented by the agents by activating the reward function. The reinforcement-learning agent\u2019s performance improves based on reward assessment. This reward function gives a more precise value for each transaction, and no fraudster can escape from the agent\u2019s sight. This novel approach improves accuracy and reduces processing time by considering the best feature selection during the process.<\/jats:p>","DOI":"10.1007\/s40747-023-01016-4","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:49:40Z","timestamp":1679878180000},"page":"5313-5332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["RDQN: ensemble of deep neural network with reinforcement learning in classification based on rough set theory for digital transactional fraud detection"],"prefix":"10.1007","volume":"9","author":[{"given":"Chandana Gouri","family":"Tekkali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6700-583X","authenticated-orcid":false,"given":"Karthika","family":"Natarajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,17]]},"reference":[{"key":"1016_CR1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.649","volume":"7","author":"M Ahmed","year":"2021","unstructured":"Ahmed M, Ansar K, Muckley CB, Khan A, Anjum A, Talha M (2021) A semantic rule based digital fraud detection. PeerJ Comput Sci 7:e649","journal-title":"PeerJ Comput Sci"},{"key":"1016_CR2","doi-asserted-by":"crossref","unstructured":"Thennakoon A, Bhagyani C, Premadasa S, Mihiranga S, Kuruwitaarachchi N (2019) Real-time credit card fraud detection using machine learning. In: 2019 9th international conference on cloud computing, data science & engineering (confluence). IEEE, pp\u00a0488\u2013493","DOI":"10.1109\/CONFLUENCE.2019.8776942"},{"key":"1016_CR3","doi-asserted-by":"crossref","unstructured":"Varmedja D, Karanovic M, Sladojevic S, Arsenovic M, Anderla A (2019) Credit card fraud detection-machine learning methods. In: 2019 18th international symposium INFOTEH-JAHORINA (INFOTEH). IEEE, pp\u00a01\u20135","DOI":"10.1109\/INFOTEH.2019.8717766"},{"key":"1016_CR4","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.procs.2020.01.057","volume":"165","author":"VN Dornadula","year":"2019","unstructured":"Dornadula VN, Geetha S (2019) Credit card fraud detection using machine learning algorithms. Procedia Comput Sci 165:631\u2013641","journal-title":"Procedia Comput Sci"},{"key":"1016_CR5","doi-asserted-by":"crossref","unstructured":"Sailusha R, Gnaneswar V, Ramesh R, Rao GR (2020) Credit card fraud detection using machine learning. In: 2020 4th international conference on intelligent computing and control systems (ICICCS). IEEE, pp\u00a01264\u20131270","DOI":"10.1109\/ICICCS48265.2020.9121114"},{"issue":"2","key":"1016_CR6","first-page":"149","volume":"8","author":"S Beigi","year":"2020","unstructured":"Beigi S, AminNaseri M (2020) Credit card fraud detection using data mining and statistical methods. J AI Data Min 8(2):149\u2013160","journal-title":"J AI Data Min"},{"key":"1016_CR7","doi-asserted-by":"crossref","unstructured":"Hilal W, Gadsden SA, Yawney J (2021) A review of anomaly detection techniques and applications in financial fraud. Expert Syst Appl 116429","DOI":"10.1016\/j.eswa.2021.116429"},{"key":"1016_CR8","unstructured":"Najem S, Kadhem S (2021) A survey on fraud detection techniques in e-commerce, vol\u00a01, p\u00a02021"},{"key":"1016_CR9","doi-asserted-by":"crossref","unstructured":"Roy A, Sun J, Mahoney R, Alonzi L, Adams S, Beling P (2018) Deep learning detecting fraud in credit card transactions. In: 2018 systems and information engineering design symposium (SIEDS). IEEE, pp\u00a0129\u2013134","DOI":"10.1109\/SIEDS.2018.8374722"},{"issue":"02","key":"1016_CR10","first-page":"101","volume":"3","author":"JI-Z Chen","year":"2021","unstructured":"Chen JI-Z, Lai K-L (2021) Deep convolution neural network model for credit-card fraud detection and alert. J Artif Intell 3(02):101\u2013112","journal-title":"J Artif Intell"},{"issue":"1","key":"1016_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.35877\/454RI.jinav274","volume":"2","author":"AA Ojugo","year":"2021","unstructured":"Ojugo AA, Nwankwo O (2021) Spectral-cluster solution for credit-card fraud detection using a genetic algorithm trained modular deep learning neural network. JINAV J Inf Vis 2(1):15\u201324","journal-title":"JINAV J Inf Vis"},{"key":"1016_CR12","unstructured":"Nguyen TT, Tahir H, Abdelrazek M, Babar A (2020) Deep learning methods for credit card fraud detection. arXiv preprint arXiv:2012.03754"},{"issue":"8","key":"1016_CR13","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1007\/s00607-018-0633-6","volume":"100","author":"J Vijaya","year":"2018","unstructured":"Vijaya J, Sivasankar E (2018) Computing efficient features using rough set theory combined with ensemble classification techniques to improve the customer churn prediction in telecommunication sector. Computing 100(8):839\u2013860","journal-title":"Computing"},{"key":"1016_CR14","doi-asserted-by":"crossref","unstructured":"Minz S, Jain R (2003) Rough set based decision tree model for classification. In: International conference on data warehousing and knowledge discovery. Springer, pp\u00a0172\u2013181","DOI":"10.1007\/978-3-540-45228-7_18"},{"issue":"1","key":"1016_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ijar.2013.04.006","volume":"55","author":"B Zhou","year":"2014","unstructured":"Zhou B (2014) Multi-class decision-theoretic rough sets. Int J Approx Reason 55(1):211\u2013224","journal-title":"Int J Approx Reason"},{"key":"1016_CR16","doi-asserted-by":"crossref","unstructured":"Dong W, Wozniak M, Wu J, Li W, Bai Z (2022) De-noising aggregation of graph neural networks by using principal component analysis. IEEE Trans Ind Inform","DOI":"10.1109\/TII.2022.3156658"},{"key":"1016_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109616","volume":"254","author":"W Dong","year":"2022","unstructured":"Dong W, Wu J, Zhang X, Bai Z, Wang P, Wo\u017aniak M (2022) Improving performance and efficiency of graph neural networks by injective aggregation. Knowl-Based Syst 254:109616","journal-title":"Knowl-Based Syst"},{"key":"1016_CR18","doi-asserted-by":"publisher","first-page":"186421","DOI":"10.1109\/ACCESS.2020.3026222","volume":"8","author":"RSM Carrasco","year":"2020","unstructured":"Carrasco RSM, Sicilia-Urb\u00e1n M-\u00c1 (2020) Evaluation of deep neural networks for reduction of credit card fraud alerts. IEEE Access 8:186421\u2013186432","journal-title":"IEEE Access"},{"key":"1016_CR19","doi-asserted-by":"crossref","unstructured":"Dighe D, Patil S, Kokate S (2018) Detection of credit card fraud transactions using machine learning algorithms and neural networks: a comparative study. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA). IEEE, pp\u00a01\u20136","DOI":"10.1109\/ICCUBEA.2018.8697799"},{"key":"1016_CR20","doi-asserted-by":"crossref","unstructured":"Forough J, Momtazi S (2021) Sequential credit card fraud detection: a joint deep neural network and probabilistic graphical model approach. Expert Syst e12795","DOI":"10.1111\/exsy.12795"},{"key":"1016_CR21","unstructured":"Mbunge E, Makuyana R, Chirara N, Chingosho A (2015) Fraud detection in e-transactions using deep neural networks-a case of financial institutions in zimbabwe. Int J Sci Res"},{"key":"1016_CR22","doi-asserted-by":"crossref","unstructured":"Pillai TR, Hashem IAT, Brohi SN, Kaur S, Marjani M (2018) Credit card fraud detection using deep learning technique. In: 2018 fourth international conference on advances in computing, communication & automation (ICACCA). IEEE, pp\u00a01\u20136","DOI":"10.1109\/ICACCAF.2018.8776797"},{"key":"1016_CR23","unstructured":"Misra D (2019) Mish: a self regularized non-monotonic neural activation function, vol\u00a04, p\u00a02. arXiv preprint arXiv:1908.08681"},{"key":"1016_CR24","volume":"21","author":"W Tan","year":"2021","unstructured":"Tan W, Huang L, Kataev MY, Sun Y, Zhao L, Zhu H, Guo K, Xie N (2021) Method towards reconstructing collaborative business processes with cloud services using evolutionary deep q-learning. J Ind Inf Integr 21:100189","journal-title":"J Ind Inf Integr"},{"key":"1016_CR25","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.jmsy.2021.02.014","volume":"59","author":"M Neves","year":"2021","unstructured":"Neves M, Vieira M, Neto P (2021) A study on a q-learning algorithm application to a manufacturing assembly problem. J Manuf Syst 59:426\u2013440","journal-title":"J Manuf Syst"},{"key":"1016_CR26","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.eswa.2017.11.011","volume":"100","author":"A Martinez-Tenor","year":"2018","unstructured":"Martinez-Tenor A, Fern\u00e1ndez-Madrigal JA, Cruz-Mart\u00edn A, Gonz\u00e1lez-Jim\u00e9nez J (2018) Towards a common implementation of reinforcement learning for multiple robotic tasks. Expert Syst Appl 100:246\u2013259","journal-title":"Expert Syst Appl"},{"key":"1016_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113761","volume":"163","author":"JB Chakole","year":"2021","unstructured":"Chakole JB, Kolhe MS, Mahapurush GD, Yadav A, Kurhekar MP (2021) A q-learning agent for automated trading in equity stock markets. Expert Syst Appl 163:113761","journal-title":"Expert Syst Appl"},{"key":"1016_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115537","volume":"184","author":"W Jiang","year":"2021","unstructured":"Jiang W (2021) Applications of deep learning in stock market prediction: recent progress. Expert Syst Appl 184:115537","journal-title":"Expert Syst Appl"},{"key":"1016_CR29","doi-asserted-by":"crossref","unstructured":"Chatterjee M, Namin AS (2019) Detecting phishing websites through deep reinforcement learning. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC), vol\u00a02. IEEE, pp\u00a0227\u2013232","DOI":"10.1109\/COMPSAC.2019.10211"},{"key":"1016_CR30","first-page":"279","volume":"1","author":"L Zhinin-Vera","year":"2020","unstructured":"Zhinin-Vera L, Chang O, Valencia-Ramos R, Velastegui R, Pilliza GE, Quinga-Socasi F (2020) Q-credit card fraud detector for imbalanced classification using reinforcement learning. ICAART 1:279\u2013286","journal-title":"ICAART"},{"key":"1016_CR31","unstructured":"Zhinin-Vera L (2020) Credit card fraud detector using artificial intelligence. PhD thesis"},{"key":"1016_CR32","doi-asserted-by":"crossref","unstructured":"Mead A, Lewris T, Prasanth S, Adams S, Alonzi P, Beling P (2018) Detecting fraud in adversarial environments: a reinforcement learning approach. In: 2018 systems and information engineering design symposium (SIEDS). IEEE, pp\u00a0118\u2013122","DOI":"10.1109\/SIEDS.2018.8374720"},{"issue":"11","key":"1016_CR33","doi-asserted-by":"publisher","first-page":"4948","DOI":"10.3390\/app11114948","volume":"11","author":"L Canese","year":"2021","unstructured":"Canese L, Cardarilli GC, Di Nunzio L, Fazzolari R, Giardino D, Re M, Span\u00f2 S (2021) Multi-agent reinforcement learning: a review of challenges and applications. Appl Sci 11(11):4948","journal-title":"Appl Sci"},{"key":"1016_CR34","doi-asserted-by":"publisher","first-page":"77371","DOI":"10.1109\/ACCESS.2021.3082186","volume":"9","author":"S-H Huang","year":"2021","unstructured":"Huang S-H, Miao Y-H, Hsiao Y-T (2021) Novel deep reinforcement algorithm with adaptive sampling strategy for continuous portfolio optimization. IEEE Access 9:77371\u201377385","journal-title":"IEEE Access"},{"key":"1016_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113820","volume":"164","author":"S Carta","year":"2021","unstructured":"Carta S, Ferreira A, Podda AS, Recupero DR, Sanna A (2021) Multi-DQN: an ensemble of deep q-learning agents for stock market forecasting. Expert Syst Appl 164:113820","journal-title":"Expert Syst Appl"},{"key":"1016_CR36","doi-asserted-by":"crossref","unstructured":"Tekkali CG, Vijaya J (2021) A survey: methodologies used for fraud detection in digital transactions. In: 2021 second international conference on electronics and sustainable communication systems (ICESC). IEEE, pp\u00a01758\u20131765","DOI":"10.1109\/ICESC51422.2021.9532915"},{"key":"1016_CR37","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-14435-6_7","volume":"1","author":"L Bu\u015foniu","year":"2010","unstructured":"Bu\u015foniu L, Babu\u0161ka R, De Schutter B (2010) Multi-agent reinforcement learning: an overview. Innov Multi-agent Syst Appl 1:183\u2013221","journal-title":"Innov Multi-agent Syst Appl"},{"key":"1016_CR38","doi-asserted-by":"crossref","unstructured":"Naveen P, Diwan B (2020) Relative analysis of ml algorithm QDA, LR and SVM for credit card fraud detection dataset. In: 2020 fourth international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, pp\u00a0976\u2013981","DOI":"10.1109\/I-SMAC49090.2020.9243602"},{"key":"1016_CR39","doi-asserted-by":"crossref","unstructured":"Ahmed F, Shamsuddin R (2021) A comparative study of credit card fraud detection using the combination of machine learning techniques with data imbalance solution. In: 2021 2nd international conference on computing and data science (CDS). IEEE, pp\u00a0112\u2013118","DOI":"10.1109\/CDS52072.2021.00026"},{"key":"1016_CR40","volume":"52","author":"SMS Askari","year":"2020","unstructured":"Askari SMS, Hussain MA (2020) IFDTC4.5: intuitionistic fuzzy logic based decision tree for e-transactional fraud detection. J Inf Secur Appl 52:102469","journal-title":"J Inf Secur Appl"},{"key":"1016_CR41","doi-asserted-by":"crossref","unstructured":"Chen J, Shen Y, Ali R (2018) Credit card fraud detection using sparse autoencoder and generative adversarial network. In: 2018 IEEE 9th annual information technology, electronics and mobile communication conference (IEMCON). IEEE, pp\u00a01054\u20131059","DOI":"10.1109\/IEMCON.2018.8614815"},{"key":"1016_CR42","doi-asserted-by":"crossref","unstructured":"Raghavan P, Gayar N (2020) Fraud detection using machine learning and deep learning. In: 2019 international conference on computational intelligence and knowledge economy (ICCIKE), (United States). IEEE, pp\u00a0334\u2013339. 2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2019; Conference date: 11-12-2019 Through 12-12-2019","DOI":"10.1109\/ICCIKE47802.2019.9004231"},{"issue":"2","key":"1016_CR43","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/23080477.2020.1783491","volume":"8","author":"M Arya","year":"2020","unstructured":"Arya M, SastryG H (2020) Deal-\u2019deep ensemble algorithm framework for credit card fraud detection in real-time data stream with google tensorflow,. Smart Sci 8(2):71\u201383","journal-title":"Smart Sci"},{"key":"1016_CR44","unstructured":"MS Windows NT dataset description. https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud. Accessed: 2022-12-06"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01016-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01016-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01016-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:19:57Z","timestamp":1695403197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01016-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,17]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1016"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01016-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,17]]},"assertion":[{"value":"27 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"we believe that this data should be available for others to use and will provide the concerned material to anyone who contacts the corresponding author. Datasets used in this research work are publicly available and also cited in article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}}]}}