{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:56:51Z","timestamp":1773482211240,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s41060-025-00889-7","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T07:00:40Z","timestamp":1764313240000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Imbalanced learning in corruption detection: results explanations with SHAP"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8563-1404","authenticated-orcid":false,"given":"Marcelo Oliveira","family":"Vasconcelos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5590-1493","authenticated-orcid":false,"given":"Lu\u00eds","family":"Cavique","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"889_CR1","doi-asserted-by":"publisher","DOI":"10.1086\/517935","author":"BA Olken","year":"2007","unstructured":"Olken, B.A.: Monitoring corruption: evidence from a field experiment in Indonesia. J. Polit. Econ. (2007). https:\/\/doi.org\/10.1086\/517935","journal-title":"J. Polit. Econ."},{"issue":"3","key":"889_CR2","doi-asserted-by":"publisher","first-page":"681","DOI":"10.2307\/2946696","volume":"110","author":"P Mauro","year":"1995","unstructured":"Mauro, P.: Corruption and growth. Q. J. Econ. 110(3), 681\u2013712 (1995). https:\/\/doi.org\/10.2307\/2946696","journal-title":"Q. J. Econ."},{"issue":"4","key":"889_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1590\/S0034-759020180406","volume":"58","author":"AJA Padula","year":"2018","unstructured":"Padula, A.J.A., Albuquerque, P.H.M.: Government corruption on Brazilian capital markets: a study on Lava Jato (Car Wash) investigation. Rev. Adm. Empres. 58(4), 405\u2013417 (2018). https:\/\/doi.org\/10.1590\/S0034-759020180406","journal-title":"Rev. Adm. Empres."},{"issue":"4","key":"889_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s41060-018-0116-z","volume":"5","author":"F Carcillo","year":"2018","unstructured":"Carcillo, F., Le Borgne, Y.A., Caelen, O., Bontempi, G.: Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization. Int. J. Data Sci. Anal. 5(4), 285\u2013300 (2018). https:\/\/doi.org\/10.1007\/s41060-018-0116-z","journal-title":"Int. J. Data Sci. Anal."},{"key":"889_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/S0267-3649(04)00006-8","author":"J Grijpink","year":"2004","unstructured":"Grijpink, J.: Identity fraud as a challenge to the constitutional state. Comput. Law Secur. Rep. (2004). https:\/\/doi.org\/10.1016\/S0267-3649(04)00006-8","journal-title":"Comput. Law Secur. Rep."},{"issue":"3","key":"889_CR6","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.clsr.2007.03.001","volume":"23","author":"D Bainbridge","year":"2007","unstructured":"Bainbridge, D.: Criminal law tackles computer fraud and misuse. Comput. Law Secur. Rep. 23(3), 276\u2013281 (2007). https:\/\/doi.org\/10.1016\/j.clsr.2007.03.001","journal-title":"Comput. Law Secur. Rep."},{"key":"889_CR7","unstructured":"\u201cFraud Act 2006.\u201d Accessed: Jun. 07, 2024. [Online]. Available: https:\/\/www.legislation.gov.uk\/ukpga\/2006\/35\/contents"},{"issue":"1","key":"889_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s41060-019-00204-1","volume":"12","author":"J Wachs","year":"2021","unstructured":"Wachs, J., Fazekas, M., Kert\u00e9sz, J.: Corruption risk in contracting markets: a network science perspective. Int. J. Data Sci. Anal. 12(1), 45\u201360 (2021). https:\/\/doi.org\/10.1007\/s41060-019-00204-1","journal-title":"Int. J. Data Sci. Anal."},{"issue":"2","key":"889_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.clsr.2016.11.018","volume":"33","author":"S Mason","year":"2017","unstructured":"Mason, S., Bohm, N.: Banking and fraud. Comput. Law Secur. Rev. 33(2), 237\u2013241 (2017). https:\/\/doi.org\/10.1016\/j.clsr.2016.11.018","journal-title":"Comput. Law Secur. Rev."},{"issue":"4","key":"889_CR10","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.clsr.2019.04.006","volume":"35","author":"R Clarke","year":"2019","unstructured":"Clarke, R.: Why the world wants controls over artificial intelligence. Comput. Law Secur. Rev. 35(4), 423\u2013433 (2019). https:\/\/doi.org\/10.1016\/j.clsr.2019.04.006","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"889_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s41060-021-00247-3","volume":"12","author":"V Shumovskaia","year":"2021","unstructured":"Shumovskaia, V., Fedyanin, K., Sukharev, I., Berestnev, D., Panov, M.: Linking bank clients using graph neural networks powered by rich transactional data. Int. J. Data Sci. Anal. 12(2), 135\u2013145 (2021). https:\/\/doi.org\/10.1007\/s41060-021-00247-3","journal-title":"Int. J. Data Sci. Anal."},{"issue":"2","key":"889_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s41060-021-00257-1","volume":"12","author":"KY Wong","year":"2021","unstructured":"Wong, K.Y., Wong, R.K.: Big data quality prediction informed by banking regulation. Int. J. Data Sci. Anal. 12(2), 147\u2013164 (2021). https:\/\/doi.org\/10.1007\/s41060-021-00257-1","journal-title":"Int. J. Data Sci. Anal."},{"key":"889_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-024-00524-x","author":"H Abadlia","year":"2024","unstructured":"Abadlia, H., Smairi, N.: Enhanced particle swarm optimization-based hyperparameter optimized stacked autoencoder for credit card fraud detection. Int. J. Data Sci. Anal. (2024). https:\/\/doi.org\/10.1007\/s41060-024-00524-x","journal-title":"Int. J. Data Sci. Anal."},{"key":"889_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-024-00594-x","volume-title":"A review of sentiment analysis: tasks, applications, and deep learning techniques","author":"NA Sharma","year":"2024","unstructured":"Sharma, N.A., Ali, A.B.M.S., Kabir, M.A.: A review of sentiment analysis: tasks, applications, and deep learning techniques. Springer, Berlin (2024). https:\/\/doi.org\/10.1007\/s41060-024-00594-x"},{"key":"889_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-021-00278-w","volume-title":"Data science and AI in FinTech: an overview","author":"L Cao","year":"2021","unstructured":"Cao, L., Yang, Q., Yu, P.S.: Data science and AI in FinTech: an overview. Springer, Berlin (2021). https:\/\/doi.org\/10.1007\/s41060-021-00278-w"},{"key":"889_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-022-00312-5","volume-title":"A survey on machine learning methods for churn prediction","author":"L Geiler","year":"2022","unstructured":"Geiler, L., Affeldt, S., Nadif, M.: A survey on machine learning methods for churn prediction. Springer, Berlin (2022). https:\/\/doi.org\/10.1007\/s41060-022-00312-5"},{"issue":"3","key":"889_CR17","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1162\/DAED_a_00508","volume":"147","author":"SF Moro","year":"2018","unstructured":"Moro, S.F.: Preventing systemic corruption in Brazil. Daedalus 147(3), 157\u2013168 (2018). https:\/\/doi.org\/10.1162\/DAED_a_00508","journal-title":"Daedalus"},{"key":"889_CR18","doi-asserted-by":"publisher","unstructured":"Vasconcelos, M.O., Chaim, R.M., Cavique, L.: Imbalanced learning in assessing the risk of corruption in public administration. In: G. Marreiros et al. (eds.) Progress in Artificial Intelligence, 1st ed., vol. 1, 2021. EPIA 2021, LNAI 12981, pp. 1\u201314. Springer. https:\/\/doi.org\/10.1007\/978-3-030-86230-5_40.","DOI":"10.1007\/978-3-030-86230-5_40"},{"key":"889_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2021.107768","volume":"40","author":"MO Vasconcelos","year":"2022","unstructured":"Vasconcelos, M.O., Cavique, L.: Dataset for corruption risk assessment in a public administration. Data Brief 40, 107768 (2022). https:\/\/doi.org\/10.1016\/j.dib.2021.107768","journal-title":"Data Brief"},{"key":"889_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2022.105765","author":"PT Kramcs\u00e1k","year":"2023","unstructured":"Kramcs\u00e1k, P.T.: Can legitimate interest be an appropriate lawful basis for processing artificial intelligence training datasets? Comput. Law Secur. Rev. (2023). https:\/\/doi.org\/10.1016\/j.clsr.2022.105765","journal-title":"Comput. Law Secur. Rev."},{"issue":"3","key":"889_CR21","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1257\/pol.20150029","volume":"9","author":"R Hanna","year":"2017","unstructured":"Hanna, R., Wang, S.Y.: Dishonesty and selection into public service: evidence from India. Am. Econ. J. Econ. Policy 9(3), 262\u2013290 (2017). https:\/\/doi.org\/10.1257\/pol.20150029","journal-title":"Am. Econ. J. Econ. Policy"},{"key":"889_CR22","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.worlddev.2017.12.015","volume":"105","author":"J Gans-morse","year":"2018","unstructured":"Gans-morse, J., Borges, M., Makarin, A., Mannah-blankson, T., Nickow, A.: Reducing bureaucratic corruption: interdisciplinary perspectives on what works. World Dev. 105, 171\u2013188 (2018). https:\/\/doi.org\/10.1016\/j.worlddev.2017.12.015","journal-title":"World Dev."},{"key":"889_CR23","doi-asserted-by":"publisher","DOI":"10.1177\/0734371X12438241","author":"KT Liou","year":"2012","unstructured":"Liou, K.T., Xue, L., Dong, K.: China\u2019s administration and civil service reform: an introduction. Rev. Public Personnel Adm. (2012). https:\/\/doi.org\/10.1177\/0734371X12438241","journal-title":"Rev. Public Personnel Adm."},{"issue":"2","key":"889_CR24","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1177\/0734371x13484829","volume":"33","author":"O Poocharoen","year":"2013","unstructured":"Poocharoen, O., Brillantes, A.: Meritocracy in Asia Pacific. Rev. Public Personnel Adm. 33(2), 140\u2013163 (2013). https:\/\/doi.org\/10.1177\/0734371x13484829","journal-title":"Rev. Public Personnel Adm."},{"key":"889_CR25","doi-asserted-by":"crossref","unstructured":"Van Rijckeghem, C., Weder, B.: Bureaucratic corruption and the rate of temptation: do wages in the civil service affect corruption, and by how much? (2001). www.elsevier.comrlocatereconbase","DOI":"10.1016\/S0304-3878(01)00139-0"},{"issue":"1","key":"889_CR26","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/gove.12196","volume":"30","author":"K Bersch","year":"2017","unstructured":"Bersch, K., Pra\u00e7a, S., Taylor, M.M.: State capacity, bureaucratic politicization, and corruption in the Brazilian state. Governance 30(1), 105\u2013124 (2017). https:\/\/doi.org\/10.1111\/gove.12196","journal-title":"Governance"},{"issue":"4","key":"889_CR27","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1111\/padm.12276","volume":"94","author":"JH Meyer-Sahling","year":"2016","unstructured":"Meyer-Sahling, J.H., Mikkelsen, K.S.: Civil service laws, merit, politicization, and corruption: the perspective of public officials from five east european countries. Public Adm. 94(4), 1105\u20131123 (2016). https:\/\/doi.org\/10.1111\/padm.12276","journal-title":"Public Adm."},{"key":"889_CR28","doi-asserted-by":"publisher","unstructured":"Carvalho, R.S., Carvalho, R.N., Ladeira, M., Monteiro, F.M., De Oliveira Mendes, G.L.: Using political party affiliation data to measure civil servants\u2019 risk of corruption. In: Proceedings\u20142014 Brazilian Conference on Intelligent Systems, BRACIS 2014, pp. 166\u2013171 (2014). https:\/\/doi.org\/10.1109\/BRACIS.2014.39","DOI":"10.1109\/BRACIS.2014.39"},{"issue":"1","key":"889_CR29","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1146\/annurev.polisci.10.081205.095418","volume":"10","author":"D Treisman","year":"2007","unstructured":"Treisman, D.: What have we learned about the causes of corruption from ten years of cross-national empirical research? Annu. Rev. Polit. Sci. 10(1), 211\u2013244 (2007). https:\/\/doi.org\/10.1146\/annurev.polisci.10.081205.095418","journal-title":"Annu. Rev. Polit. Sci."},{"key":"889_CR30","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.cpa.2015.10.006","volume":"36","author":"PJC Lassou","year":"2016","unstructured":"Lassou, P.J.C., Hopper, T.: Government accounting reform in an ex-French African colony: the political economy of neocolonialism. Crit. Perspect. Account. 36, 39\u201357 (2016). https:\/\/doi.org\/10.1016\/j.cpa.2015.10.006","journal-title":"Crit. Perspect. Account."},{"key":"889_CR31","doi-asserted-by":"publisher","unstructured":"Carvalho, R.S.: Modelos Preditivos para Avalia\u00e7\u00e3o de Risco de Corrup\u00e7\u00e3o de Servidores P\u00fablicos Federais (2015). https:\/\/doi.org\/10.26512\/2015.09.D.19361","DOI":"10.26512\/2015.09.D.19361"},{"issue":"1","key":"889_CR32","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s11135-016-0315-4","volume":"51","author":"PM Buscema","year":"2017","unstructured":"Buscema, P.M., et al.: The perception of corruption in health: autocm methods for an international comparison. Qual. Quant. 51(1), 459\u2013477 (2017). https:\/\/doi.org\/10.1007\/s11135-016-0315-4","journal-title":"Qual. Quant."},{"key":"889_CR33","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0041988","author":"A Rashidian","year":"2012","unstructured":"Rashidian, A., Joudaki, H., Vian, T.: No evidence of the effect of the interventions to combat health care fraud and abuse\u202f: a systematic review of literature. PLoS ONE (2012). https:\/\/doi.org\/10.1371\/journal.pone.0041988","journal-title":"PLoS ONE"},{"key":"889_CR34","doi-asserted-by":"publisher","unstructured":"Chen, Z., Van Khoa, L.D.: Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti-money laundering. In: 2014 IEEE Conference on Open Systems (ICOS), pp. 145\u2013149 (2014). https:\/\/doi.org\/10.1109\/ICOS.2014.7042645","DOI":"10.1109\/ICOS.2014.7042645"},{"key":"889_CR35","doi-asserted-by":"publisher","unstructured":"Tang, J.: On developing intelligent surveillant system of suspicious financial transaction. In: 2010 2nd International Conference on E-Business and Information System Security, EBISS2010, pp. 592\u2013595 (2010). https:\/\/doi.org\/10.1109\/EBISS.2010.5473748","DOI":"10.1109\/EBISS.2010.5473748"},{"issue":"14","key":"889_CR36","doi-asserted-by":"publisher","first-page":"11642","DOI":"10.1016\/j.eswa.2012.04.037","volume":"39","author":"C Ghedini Ralha","year":"2012","unstructured":"Ghedini Ralha, C., Sarmento Silva, C.V.: A multi-agent data mining system for cartel detection in Brazilian government procurement. Expert Syst. Appl. 39(14), 11642\u201311656 (2012). https:\/\/doi.org\/10.1016\/j.eswa.2012.04.037","journal-title":"Expert Syst. Appl."},{"key":"889_CR37","doi-asserted-by":"publisher","unstructured":"Balaniuk, R., Bessiere, P., Mazer, E.F., Cobbe, P.R.: Corruption risk analysis using semi-supervised na\u00efve bayes classifiers (2012). https:\/\/doi.org\/10.1504\/IJRIS.2013.058768","DOI":"10.1504\/IJRIS.2013.058768"},{"key":"889_CR38","doi-asserted-by":"publisher","unstructured":"Domingos, S.L., Carvalho, R.N., Carvalho, R.S., Ramos, G.N.: Identifying IT purchases anomalies in the Brazilian Government Procurement System using Deep Learning. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), no. Cic, pp. 722\u2013727 (2016). https:\/\/doi.org\/10.1109\/ICMLA.2016.0129","DOI":"10.1109\/ICMLA.2016.0129"},{"key":"889_CR39","doi-asserted-by":"publisher","unstructured":"Shehu, V., Mijushkovic, A., Besimi, A.: Empowering data driven journalism in Macedonia, no. 335, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1145\/2955129.2955187","DOI":"10.1145\/2955129.2955187"},{"key":"889_CR40","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.4028\/www.scientific.net\/AMM.513-517.2165","volume":"06","author":"J Su","year":"2014","unstructured":"Su, J., Dan, S.: Application of data mining in construction of corruption risks prevention system. Appl. Mech. Mater. 06, 2165\u20132169 (2014). https:\/\/doi.org\/10.4028\/www.scientific.net\/AMM.513-517.2165","journal-title":"Appl. Mech. Mater."},{"key":"889_CR41","doi-asserted-by":"publisher","unstructured":"Su, J., Dan, S.: Research on framework of corruption risks prevention system based on cloud computing. In: 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), pp. 141\u2013144 (2014). https:\/\/doi.org\/10.1109\/imsna.2013.6743236","DOI":"10.1109\/imsna.2013.6743236"},{"key":"889_CR42","doi-asserted-by":"publisher","unstructured":"Arief, H.A., Saptawati, G.A.P., Asnar, Y.D.W.: Fraud detection based-on data mining on Indonesian e-Procurement System (SPSE). In: 2016 International Conference on Data and Software Engineering (ICoDSE), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/ICODSE.2016.7936111","DOI":"10.1109\/ICODSE.2016.7936111"},{"key":"889_CR43","doi-asserted-by":"publisher","unstructured":"Rizki, A.A., Surjandari, I., Wayasti, R.A., Statement, A.F.: Data mining application to detect financial fraud in Indonesia\u2019s public companies, pp. 206\u2013211 (2017). https:\/\/doi.org\/10.1109\/ICSITech.2017.8257111","DOI":"10.1109\/ICSITech.2017.8257111"},{"key":"889_CR44","doi-asserted-by":"publisher","unstructured":"Islam, M.T., Yousuf, M.A.: Development of a corruption detection algorithm using K-means clustering. In: 2018 International Conference on Advancement in Electrical and Electronic Engineering, ICAEEE 2018, pp. 1\u20134 (2019). https:\/\/doi.org\/10.1109\/ICAEEE.2018.8642985","DOI":"10.1109\/ICAEEE.2018.8642985"},{"key":"889_CR45","doi-asserted-by":"publisher","unstructured":"Torgo, L., Ribeiro, R.: Utility-based regression, pp. 597\u2013604 (2007). https:\/\/doi.org\/10.1007\/978-3-540-74976-9_63","DOI":"10.1007\/978-3-540-74976-9_63"},{"key":"889_CR46","doi-asserted-by":"publisher","unstructured":"Torgo, L., Ribeiro, R.P., Pfahringer, B., Branco, P.: SMOTE for regression. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8154 LNAI, October 2015, pp. 378\u2013389 (2013). https:\/\/doi.org\/10.1007\/978-3-642-40669-0_33","DOI":"10.1007\/978-3-642-40669-0_33"},{"key":"889_CR47","doi-asserted-by":"publisher","unstructured":"Torgo, L., Ribeiro, R.: Precision and recall for regression. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5808 LNAI, October, pp. 332\u2013346 (2009). https:\/\/doi.org\/10.1007\/978-3-642-04747-3_26","DOI":"10.1007\/978-3-642-04747-3_26"},{"key":"889_CR48","doi-asserted-by":"publisher","unstructured":"Branco, P., Torgo, L., Ribeiro, R.: A survey of predictive modelling under imbalanced distributions (2015). https:\/\/doi.org\/10.1145\/2907070","DOI":"10.1145\/2907070"},{"key":"889_CR49","unstructured":"Rita P A Ribeiro: Utility-based regression (2011). Accessed 03 June 2024. https:\/\/www.dcc.fc.up.pt\/~rpribeiro\/publ\/rpribeiroPhD11.pdf"},{"key":"889_CR50","doi-asserted-by":"publisher","unstructured":"Cavique, L.: Causality: the next step in artificial intelligence. In: Philosophy of Artificial Intelligence and Its Place in Society. IGI Global, pp. 1\u201317 (2023). https:\/\/doi.org\/10.4018\/978-1-6684-9591-9.ch001","DOI":"10.4018\/978-1-6684-9591-9.ch001"},{"key":"889_CR51","doi-asserted-by":"crossref","unstructured":"Belle, V., Papantonis, I.: Principles and practice of explainable machine learning (2020). http:\/\/arxiv.org\/abs\/2009.11698","DOI":"10.3389\/fdata.2021.688969"},{"key":"889_CR52","doi-asserted-by":"publisher","unstructured":"Mas\u00eds, S.: Interpretable machine learning with Python: learn to build interpretable high-performance models with hands-on real-world examples, 1st ed (2021). https:\/\/doi.org\/10.1145\/2907070","DOI":"10.1145\/2907070"},{"key":"889_CR53","unstructured":"Lundberg, S.M., Allen, P.G., Lee, S.-I.: A unified approach to interpreting model predictions. In: 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach CA, 2017, pp. 1\u201310. https:\/\/github.com\/slundberg\/shap"},{"key":"889_CR54","volume-title":"Explainable AI for practitioners: designing and implementing explainable ML solutions","author":"M Munn","year":"2022","unstructured":"Munn, M., Pitman, D.: Explainable AI for practitioners: designing and implementing explainable ML solutions, 1st ed O\u2019Reilly Media, Boston (2022)","edition":"1st ed"},{"key":"889_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2018.05.001","volume-title":"Introduction to the Special Issue in Honor of Lloyd Shapley: Eight Topics in Game Theory","author":"DK Levine","year":"2018","unstructured":"Levine, D.K.: Introduction to the Special Issue in Honor of Lloyd Shapley: Eight Topics in Game Theory. Academic Press Inc., New York (2018). https:\/\/doi.org\/10.1016\/j.geb.2018.05.001"},{"key":"889_CR56","unstructured":"Rothman, D.: Hands-on explainable AI (XAI) with Python: interpret, visualize, explain, and integrate reliable AI for fair, secure, and trustworthy AI apps, 1st ed (2020)"},{"key":"889_CR57","doi-asserted-by":"publisher","unstructured":"Onyeoma, C.F., Rafiq, H., Jeremiah, D., Ta, V.T., Usman, M.: Credit card fraud detection using deep neural network with Shapley additive explanations. In: 2024 International Conference on Frontiers of Information Technology, FIT 2024, Institute of Electrical and Electronics Engineers Inc. (2024). https:\/\/doi.org\/10.1109\/FIT63703.2024.10838456","DOI":"10.1109\/FIT63703.2024.10838456"},{"key":"889_CR58","doi-asserted-by":"publisher","unstructured":"Kapale, R., Deshpande, P., Shukla, S., Kediya, S., Pethe, Y., Metre, S.: Explainable AI for fraud detection: enhancing transparency and trust in financial decision-making. In: 2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry, IDICAIEI 2024, Institute of Electrical and Electronics Engineers Inc. (2024). https:\/\/doi.org\/10.1109\/IDICAIEI61867.2024.10842874","DOI":"10.1109\/IDICAIEI61867.2024.10842874"},{"key":"889_CR59","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.13046","author":"RN Santos","year":"2021","unstructured":"Santos, R.N., et al.: Gradient boosting and Shapley additive explanations for fraud detection in electricity distribution grids. Int. Trans. Electr. Energy Syst. (2021). https:\/\/doi.org\/10.1002\/2050-7038.13046","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"889_CR60","unstructured":"Teixeira, M.: Feature Engineering: Techniques and Applications, Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering. Instituto Superior Tecnico & Universidade de Aberta (2023). Accessed 08 Apr 2024. https:\/\/scholar.tecnico.ulisboa.pt\/api\/records\/Wob_ZS_UGicY7UUKuVQvZbh-Y4_f7haVwBRQ\/file\/a81275698add4d82492fd7886bcc05fbee9911679b3745fca152afefbb90f495.pdf"},{"key":"889_CR61","doi-asserted-by":"publisher","first-page":"43","DOI":"10.34627\/rcc.v18i0.295","volume":"n. 18","author":"M Teixeira","year":"2023","unstructured":"Teixeira, M., Cavique, L.: Feature engineering: techniques and applications. Rev. Cienc. Comput. n. 18, 43\u201354 (2023). https:\/\/doi.org\/10.34627\/rcc.v18i0.295","journal-title":"Rev. Cienc. Comput."},{"key":"889_CR62","doi-asserted-by":"publisher","unstructured":"Knapp, E.D., Langill, J.T.: Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems (2014). https:\/\/doi.org\/10.1016\/B978-0-12-420114-9.00018-6","DOI":"10.1016\/B978-0-12-420114-9.00018-6"},{"key":"889_CR63","doi-asserted-by":"publisher","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd ed. (2012). Morgan Kaufmann\/Elsevier. https:\/\/doi.org\/10.1016\/C2009-0-61819-5","DOI":"10.1016\/C2009-0-61819-5"},{"key":"889_CR64","doi-asserted-by":"publisher","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning with Applications in R (2013). https:\/\/doi.org\/10.1007\/978-1-4614-7138-7_2","DOI":"10.1007\/978-1-4614-7138-7_2"},{"key":"889_CR65","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.eswa.2018.04.008","volume":"106","author":"S Jain","year":"2018","unstructured":"Jain, S., Shukla, S., Wadhvani, R.: Dynamic selection of normalization techniques using data complexity measures. Expert Syst. Appl. 106, 252\u2013262 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.04.008","journal-title":"Expert Syst. Appl."},{"key":"889_CR66","doi-asserted-by":"publisher","unstructured":"Hosmer, D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 47, no. 4 (2013). https:\/\/doi.org\/10.2307\/2532419","DOI":"10.2307\/2532419"},{"key":"889_CR67","doi-asserted-by":"publisher","unstructured":"Kuhn, M., Johnson, K.: Applied Predictive Modeling, vol. 26. Groton, Connecticut, USA (2013). https:\/\/doi.org\/10.1007\/978-1-4614-6849-3","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"889_CR68","doi-asserted-by":"publisher","unstructured":"Cox, D.R., Snell, E.J.: Applied Statistics\u2014Principles and Examples (1981). Chapman & Hall Statistics Text Series. https:\/\/doi.org\/10.1201\/9781315137704","DOI":"10.1201\/9781315137704"},{"key":"889_CR69","unstructured":"Brownlee, J.: Imbalanced Classification with Python: Choose Better Metrics, Balance Skewed Classes, and Apply Cost-Sensitive Learning, 1.2., vol. 1 (2020)"},{"issue":"1","key":"889_CR70","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.ejor.2017.08.007","volume":"269","author":"W Zhu","year":"2018","unstructured":"Zhu, W., Yu, Y., Sun, P.: Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies\u2019 low-carbon investment to attain corporate sustainability. Eur. J. Oper. Res. 269(1), 99\u2013110 (2018). https:\/\/doi.org\/10.1016\/j.ejor.2017.08.007","journal-title":"Eur. J. Oper. Res."},{"key":"889_CR71","doi-asserted-by":"publisher","unstructured":"Spelmen, V.S., Porkodi, R.: A review on handling imbalanced data. In: Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies, ICCTCT 2018, pp. 1\u201311 (2018). https:\/\/doi.org\/10.1109\/ICCTCT.2018.8551020","DOI":"10.1109\/ICCTCT.2018.8551020"},{"issue":"9","key":"889_CR72","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1097\/JTO.0b013e3181ec173d","volume":"5","author":"JN Mandrekar","year":"2010","unstructured":"Mandrekar, J.N.: Receiver operating characteristic curve in diagnostic test assessment. J. Thorac. Oncol. 5(9), 1315\u20131316 (2010). https:\/\/doi.org\/10.1097\/JTO.0b013e3181ec173d","journal-title":"J. Thorac. Oncol."},{"key":"889_CR73","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.knosys.2014.01.012","volume":"59","author":"M Maalouf","year":"2014","unstructured":"Maalouf, M., Siddiqi, M.: Weighted logistic regression for large-scale imbalanced and rare events data. Knowl. Based Syst. 59, 142\u2013148 (2014). https:\/\/doi.org\/10.1016\/j.knosys.2014.01.012","journal-title":"Knowl. Based Syst."},{"key":"889_CR74","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02478259","volume":"5","author":"WS McCulloch","year":"1943","unstructured":"McCulloch, W.S., Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5, 115\u2013133 (1943). https:\/\/doi.org\/10.1007\/BF02478259","journal-title":"Bull. Math. Biophys."},{"key":"889_CR75","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1613\/jair.614","volume":"11","author":"D Opitz","year":"1999","unstructured":"Opitz, D., Maclin, R.: Popular emsemble methods: an empirical study. J. Artif. Intell. Res. 11, 169\u2013198 (1999)","journal-title":"J. Artif. Intell. Res."},{"issue":"2","key":"889_CR76","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"XY Liu","year":"2009","unstructured":"Liu, X.Y., Wu, J., Zhou, Z.H.: Exploratory undersampling for class-imbalance learning. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 39(2), 539\u2013550 (2009). https:\/\/doi.org\/10.1109\/TSMCB.2008.2007853","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"issue":"1","key":"889_CR77","first-page":"1","volume":"2","author":"BR Patel","year":"2014","unstructured":"Patel, B.R., Rana, K.K.: A survey on decision tree algorithm for classification. Ijedr 2(1), 1\u20135 (2014)","journal-title":"Ijedr"},{"key":"889_CR78","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995). https:\/\/doi.org\/10.1007\/BF00994018","journal-title":"Mach. Learn."},{"issue":"1","key":"889_CR79","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16(1), 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"key":"889_CR80","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1613\/jair.1.11192","volume":"61","author":"A Fern\u00e1ndez","year":"2018","unstructured":"Fern\u00e1ndez, A., Garc\u00eda, S., Herrera, F., Chawla, N.V.: SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J. Artif. Intell. Res. 61, 863\u2013905 (2018). https:\/\/doi.org\/10.1613\/jair.1.11192","journal-title":"J. Artif. Intell. Res."},{"issue":"19:3","key":"889_CR81","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1136\/bmj.c4414","volume":"341","author":"M Szumilas","year":"2010","unstructured":"Szumilas, M.: Explaining odds ratios. J. Can. Acad. Child Adolesc. Psychiatry 341(19:3), 227\u2013229 (2010). https:\/\/doi.org\/10.1136\/bmj.c4414","journal-title":"J. Can. Acad. Child Adolesc. Psychiatry"},{"key":"889_CR82","unstructured":"Welcome to the SHAP documentation. Accessed 25 Feb 2024. https:\/\/shap.readthedocs.io\/en\/latest\/"},{"key":"889_CR83","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-38304-5","author":"A Mutemi","year":"2023","unstructured":"Mutemi, A., Bacao, F.: A numeric-based machine learning design for detecting organized retail fraud in digital marketplaces. Sci. Rep. (2023). https:\/\/doi.org\/10.1038\/s41598-023-38304-5","journal-title":"Sci. Rep."},{"key":"889_CR84","doi-asserted-by":"publisher","DOI":"10.3389\/fonc.2022.981059","author":"C Jiang","year":"2022","unstructured":"Jiang, C., Xiu, Y., Qiao, K., Yu, X., Zhang, S., Huang, Y.: Prediction of lymph node metastasis in patients with breast invasive micropapillary carcinoma based on machine learning and SHapley additive explanations framework. Front. Oncol. (2022). https:\/\/doi.org\/10.3389\/fonc.2022.981059","journal-title":"Front. Oncol."},{"key":"889_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123392","author":"M Nahiduzzaman","year":"2024","unstructured":"Nahiduzzaman, M., Faisal Abdulrazak, L., Arselene Ayari, M., Khandakar, A., Islam, S.M.R.: A novel framework for lung cancer classification using lightweight convolutional neural networks and ridge extreme learning machine model with SHapley additive explanations (SHAP). Expert Syst. Appl. (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.123392","journal-title":"Expert Syst. Appl."},{"key":"889_CR86","doi-asserted-by":"publisher","unstructured":"Mishra, P.: Explainability for linear supervised models. In: Explainable AI Recipes, pp. 17\u201372. Apress, Berkeley (2023). https:\/\/doi.org\/10.1007\/978-1-4842-9029-3_2","DOI":"10.1007\/978-1-4842-9029-3_2"},{"key":"889_CR87","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103502","author":"K Aas","year":"2021","unstructured":"Aas, K., Jullum, M., L\u00f8land, A.: Explaining individual predictions when features are dependent: more accurate approximations to Shapley values. Artif. Intell. (2021). https:\/\/doi.org\/10.1016\/j.artint.2021.103502","journal-title":"Artif. Intell."},{"key":"889_CR88","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7158-2","volume-title":"Practical Explainable AI Using Python","author":"P Mishra","year":"2022","unstructured":"Mishra, P.: Practical Explainable AI Using Python, 1st edn. Apress, Berkeley (2022). https:\/\/doi.org\/10.1007\/978-1-4842-7158-2","edition":"1"},{"key":"889_CR89","unstructured":"Frank, E., Witten, I.: Generating accurate rule sets without global optimization. In: Shavlik J. (ed.) Proceedings of the 15th International Conference on Machine Learning, pp. 144\u2013151 (1998)"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00889-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00889-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00889-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:35:23Z","timestamp":1773480923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00889-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["889"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00889-7","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]},"assertion":[{"value":"20 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing financial interests or personal relationships that could have influenced the work reported in this paper. This research received no specific grant from funding agencies in the public, commercial, or not-for-profit sectors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The datasets used and analyzed during the current study are available from a public data repository. The authors also declare that the models comply with ethical standards and avoid unfair discrimination.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and informed consent"}},{"value":"While preparing this work, the authors used ChatGPT and Grammarly to improve the grammatical quality of the previously written and submitted text. After using this tool\/service, the authors reviewed and edited the content as needed and took full responsibility for the publication's content.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of Generative AI and AI-assisted technologies in the writing process"}}],"article-number":"22"}}