{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:10:46Z","timestamp":1773976246624,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02772-x","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T16:02:05Z","timestamp":1713456125000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Fraud Detection Using Machine Learning and Deep Learning"],"prefix":"10.1007","volume":"5","author":[{"given":"Akash","family":"Gandhar","sequence":"first","affiliation":[]},{"given":"Kapil","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Aman Kumar","family":"Pandey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8363-0515","authenticated-orcid":false,"given":"Dharm","family":"Raj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"issue":"24","key":"2772_CR1","first-page":"16819","volume":"13","author":"SVSS Lakshmi","year":"2018","unstructured":"Lakshmi SVSS, Kavilla SD. Machine learning for credit card fraud detection system. Int J Appl Eng Res. 2018;13(24): PP16819\u201316824:1\u20133.","journal-title":"Int J Appl Eng Res."},{"issue":"7","key":"2772_CR2","first-page":"2","volume":"9","author":"V Kumar","year":"2020","unstructured":"Kumar V, Kumar V, Vijayshankar A, Kumar P. Credit card fraud detection using machine learning algorithms. Int Eng Res Technol (IJERT). 2020;9(7):2\u20134.","journal-title":"Int Eng Res Technol (IJERT)"},{"key":"2772_CR3","doi-asserted-by":"crossref","unstructured":"Khan S, Sanovar S, Kumar H. Credit card fraud detection using machine learning. Int J Sci Res Publ (IJSRP) 11\u20136","DOI":"10.29322\/IJSRP.11.06.2021.p11410"},{"issue":"151","key":"2772_CR4","first-page":"1","volume":"8","author":"I Benchaji","year":"2021","unstructured":"Benchaji I, Douzi S, Ouahidil BE, Jaafari J. Enhanced credit card fraud detection based on attention mechanism and LSTM deep model. J Big Data. 2021;8(151):1\u201321.","journal-title":"J Big Data"},{"issue":"2","key":"2772_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"B Leo","year":"1996","unstructured":"Leo B. Bagging predictors. Mach Learn. 1996;24(2):123\u201340.","journal-title":"Mach Learn"},{"issue":"5","key":"2772_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1601\/5\/052016","volume":"1601","author":"C Meng","year":"2020","unstructured":"Meng C, Zhou L, Liu B. A case study in credit fraud detection with SMOTE and XGBoost. J Phys Conf Ser. 2020;1601(5): 052016.","journal-title":"J Phys Conf Ser."},{"key":"2772_CR7","doi-asserted-by":"crossref","unstructured":"Bahnsen AC, Stojanovic A, Aouada D, Ottersten B. Cost sensitive credit card fraud detection using Bayes minimum risk, 2013. In: 12th international conference on machine learning and applications; 2013. vol. 1, pp. 333\u2013338.","DOI":"10.1109\/ICMLA.2013.68"},{"key":"2772_CR8","doi-asserted-by":"crossref","unstructured":"Awoyemi JO, Adetunmbi AO, Oluwadare SA. Credit card fraud detection using machine learning techniques: a comparative analysi. In: 2017 international conference on computing networking and informatics (ICCNI); 2017. pp. 1\u20139.","DOI":"10.1109\/ICCNI.2017.8123782"},{"issue":"2","key":"2772_CR9","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s13198-016-0551-y","volume":"8","author":"AO Adewumi","year":"2017","unstructured":"Adewumi AO, Akinyelu AA. A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int J Syst Assur Eng Manag. 2017;8(2):937\u201353.","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"3","key":"2772_CR10","first-page":"514","volume":"18","author":"A Chaudhary","year":"2016","unstructured":"Chaudhary A, Tiwari VN, Kumar A. A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets. Int J Netw Secur. 2016;18(3):514\u201322.","journal-title":"Int J Netw Secur."},{"key":"2772_CR11","unstructured":"Nguyen TT, Tahir H, Abdelrazek M, Babar A. Deep learning methods for credit card fraud detection. arXiv:abs\/2012.03754 (2020)."},{"key":"2772_CR12","doi-asserted-by":"crossref","unstructured":"Sohony I, Pratap R, Nambiar U. Ensemble learning for credit card fraud detection. In: ACM India joint international conference on data science and management of data; 2018. pp. 289\u2013294.","DOI":"10.1145\/3152494.3156815"},{"key":"2772_CR13","doi-asserted-by":"crossref","unstructured":"Sakharova I. Payment card fraud: challenges and solutions. In: 2012 IEEE international conference on intelligence and security informatics; 2012. pp. 227\u2013234.","DOI":"10.1109\/ISI.2012.6284315"},{"key":"2772_CR14","doi-asserted-by":"crossref","unstructured":"Douzi Benchaji S, Ouahidi BE. Using genetic algorithm to improve classification of imbalanced datasets for credit card fraud detection. In: International conference on advanced information technology services and systems; 2018. pp. 220\u2013229.","DOI":"10.1007\/978-3-030-11914-0_24"},{"key":"2772_CR15","doi-asserted-by":"crossref","unstructured":"Dawar I, Kumar N, Kaur G, Chaturvedi S, Bhardwaj A, Rana M. Supervised learning methods for identifying credit card fraud. In: 2023 international conference on innovative data communication technologies and application (ICIDCA); 2023. pp.791\u2013796.","DOI":"10.1109\/ICIDCA56705.2023.10100266"},{"key":"2772_CR16","doi-asserted-by":"crossref","unstructured":"Jose S, Devassy D, Antony AM. Detection of credit card fraud using resampling and boosting technique. In: 2023 advanced computing and communication technologies for high performance applications (ACCTHPA); 2023. pp.1\u20138.","DOI":"10.1109\/ACCTHPA57160.2023.10083376"},{"key":"2772_CR17","doi-asserted-by":"crossref","unstructured":"Devika M, Kishan SR, Manohar LS, Vijaya N. Credit card fraud detection using logistic regression. In: 2022 second international conference on advanced technologies in intelligent control, environment, computing & communication engineering; 2022. pp. 1\u20136.","DOI":"10.1109\/ICATIECE56365.2022.10046976"},{"key":"2772_CR18","doi-asserted-by":"crossref","unstructured":"Own RM, Salem SA, Mohamed AE. TCCFD: an efficient tree-based framework for credit card fraud detection. In: 2021 16th international conference on computer engineering and systems (ICCES); 2021. pp. 1\u20136.","DOI":"10.1109\/ICCES54031.2021.9686121"},{"issue":"4","key":"2772_CR19","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1080\/09720529.2019.1642625","volume":"22","author":"B Chaudhary","year":"2019","unstructured":"Chaudhary B, Singh K. Pseudonym generation using genetic algorithm in vehicular ad hoc networks. J Discrete Math Sci Cryptogr. 2019;22(4):661\u201377.","journal-title":"J Discrete Math Sci Cryptogr"}],"updated-by":[{"DOI":"10.1007\/s42979-024-03236-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000}}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02772-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02772-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02772-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T06:21:22Z","timestamp":1724134882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02772-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":19,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["2772"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02772-x","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s42979-024-03236-y","asserted-by":"object"}]},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"5 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s42979-024-03236-y","URL":"https:\/\/doi.org\/10.1007\/s42979-024-03236-y","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"No Human and\/or Animals used in research.\u00a0","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}}],"article-number":"453"}}