{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T06:03:25Z","timestamp":1773036205787,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.datak.2026.102557","type":"journal-article","created":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:12:35Z","timestamp":1767888755000},"page":"102557","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["MRV-RSA: Developed Modified Random Value Reptile Search Algorithm and Deep Learning based Fraud Detection Model in Banking Sector"],"prefix":"10.1016","volume":"163","author":[{"given":"V.","family":"Backiyalakshmi","sequence":"first","affiliation":[]},{"given":"B.","family":"Umadevi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.datak.2026.102557_bib0001","article-title":"An effective fraud detection using competitive swarm optimization based deep neural network","volume":"27","author":"Karthikeyan","year":"2023","journal-title":"Elsevier Measure. Sensors"},{"key":"10.1016\/j.datak.2026.102557_bib0002","article-title":"State of the art in financial statement fraud detection: a systematic review","volume":"192","author":"Shahana","year":"2023","journal-title":"Elsevier Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.datak.2026.102557_bib0003","article-title":"Deep learning for detecting financial statement fraud","volume":"139","author":"Craja","year":"2020","journal-title":"Elsevier Decision Support Syst."},{"key":"10.1016\/j.datak.2026.102557_bib0004","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.ins.2019.02.030","article-title":"Automatic detection of relationships between banking operations using machine learning","volume":"485","author":"Gonz\u00e1lez-Carrasco","year":"2019","journal-title":"Elsevier Inform. Sci."},{"issue":"9","key":"10.1016\/j.datak.2026.102557_bib0005","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S0969-4765(21)00095-3","article-title":"Calls for behavioural biometrics as bank fraud soars","volume":"2021","author":"Silva","year":"2021","journal-title":"Elsevier Biometric Technol. Today"},{"key":"10.1016\/j.datak.2026.102557_bib0006","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/TIFS.2023.3255585","article-title":"Synthetic ID card image generation for improving presentation attack detection","volume":"18","author":"Benalcazar","year":"2023","journal-title":"IEEE Trans. Inform. Forensic. Secur."},{"issue":"7","key":"10.1016\/j.datak.2026.102557_bib0007","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/S1361-3723(20)30073-7","article-title":"Using graph databases to detect financial fraud","volume":"2020","author":"Henderson","year":"2020","journal-title":"Elsevier Comput. Fraud Secur."},{"key":"10.1016\/j.datak.2026.102557_bib0008","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.iref.2018.03.008","article-title":"Predicting failure in the U.S. banking sector: an extreme gradient boosting approach","volume":"61","author":"Carmona","year":"2019","journal-title":"Elsevier Int. Rev. Econom. Financ."},{"key":"10.1016\/j.datak.2026.102557_bib0009","doi-asserted-by":"crossref","first-page":"163965","DOI":"10.1109\/ACCESS.2021.3134076","article-title":"Financial Cybercrime: a Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape","volume":"9","author":"Nicholls","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.datak.2026.102557_bib0010","doi-asserted-by":"crossref","first-page":"166095","DOI":"10.1109\/ACCESS.2020.3022315","article-title":"A Closer Look Into the Characteristics of Fraudulent Card Transactions","volume":"8","author":"Can","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.datak.2026.102557_bib0011","article-title":"Suspicious transaction detection in banking cyber\u2013physical systems","volume":"97","author":"Shabbir","year":"2022","journal-title":"Elsevier Comput. Electric. Eng."},{"key":"10.1016\/j.datak.2026.102557_bib0012","article-title":"Machine learning algorithms for fraud prediction in property insurance: empirical evidence using real-world microdata","volume":"5","author":"Matheus","year":"2021","journal-title":"Elsevier Machine Learn. Applicat."},{"key":"10.1016\/j.datak.2026.102557_bib0013","article-title":"Ensemble of deep sequential models for credit card fraud detection","volume":"99","author":"Forough","year":"2021","journal-title":"Elsevier Appl. Soft Comput."},{"key":"10.1016\/j.datak.2026.102557_bib0014","article-title":"Fraud detection in mobile payment systems using an XGBoost-based framework","author":"Hajek","year":"2022","journal-title":"Springer Inform. Syst. Front."},{"key":"10.1016\/j.datak.2026.102557_bib0015","article-title":"Intelligent Fraud Detection framework for PFMS using HGRO feature selection and OC-LSTM fraud detection technique","volume":"4","author":"Alam","year":"2023","journal-title":"Springer SN Comput. Sci."},{"key":"10.1016\/j.datak.2026.102557_bib0016","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s42488-023-00086-w","article-title":"Detection of financial fraud: comparisons of some tree-based machine learning approaches","volume":"5","author":"Sengupta","year":"2023","journal-title":"Springer J. Data, Inform. Manage."},{"key":"10.1016\/j.datak.2026.102557_bib0017","first-page":"1","article-title":"Credit card fraud detection technique by applying graph database model","volume":"46","author":"DebachudamaniPrusti","year":"2021","journal-title":"Springer Arabian J. Sci. Eng."},{"key":"10.1016\/j.datak.2026.102557_bib0018","article-title":"Suspicious transaction detection in banking cyber\u2013physical systems","volume":"97","author":"Shabbir","year":"2022","journal-title":"Elsevier Comput. Electric. Eng."},{"key":"10.1016\/j.datak.2026.102557_bib0019","article-title":"Fraud detection in financial statements using data mining and GAN models","volume":"227","author":"Aftabi","year":"2023","journal-title":"Elsevier Expert Syst. Applica."},{"key":"10.1016\/j.datak.2026.102557_bib0020","doi-asserted-by":"crossref","first-page":"3034","DOI":"10.1109\/ACCESS.2022.3232287","article-title":"Fraud Detection in Banking Data by Machine Learning Techniques","volume":"11","author":"Hashemi","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.datak.2026.102557_bib0021","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.procs.2022.11.156","article-title":"Exploratory analysis and implementation of machine learning techniques for predictive assessment of fraud in banking systems","volume":"214","author":"Moreira","year":"2022","journal-title":"Elsevier Procedia Comput. Sci."},{"key":"10.1016\/j.datak.2026.102557_bib0022","doi-asserted-by":"crossref","first-page":"4873","DOI":"10.1007\/s12652-020-01759-9","article-title":"A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking","volume":"11","author":"Darwish","year":"2020","journal-title":"Springer J. Ambient Intell. Human. Comput."},{"key":"10.1016\/j.datak.2026.102557_bib0023","doi-asserted-by":"crossref","DOI":"10.1007\/s40747-023-01016-4","article-title":"RDQN: ensemble of deep neural network with reinforcement learning in classification based on rough set theory for digital transactional fraud detection","author":"Tekkali","year":"2023","journal-title":"Springer Complex Intell. Syst."},{"key":"10.1016\/j.datak.2026.102557_bib0024","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1631\/FITEE.1800580","article-title":"Fraud detection within bankcard enrollment on mobile device based payment using machine learning","volume":"19","author":"Zhou","year":"2018","journal-title":"Springer Front. Inform. Technol. Electron. Eng."},{"key":"10.1016\/j.datak.2026.102557_bib0025","doi-asserted-by":"crossref","first-page":"865","DOI":"10.3103\/S0146411622080223","article-title":"Bank Fraud detection with graph neural networks","volume":"56","author":"Sergadeeva","year":"2022","journal-title":"Springer Automat. Control Comput. Sci."},{"key":"10.1016\/j.datak.2026.102557_bib0026","first-page":"138","article-title":"Deep fraud net: a deep learning approach for cyber security and financial fraud detection and classification","volume":"13","author":"Udayakumar","year":"2023","journal-title":"J. Int. Servi. Inform. Secur."},{"key":"10.1016\/j.datak.2026.102557_bib0027","first-page":"1","article-title":"Mastering fraudulent schemes: a unified framework for AI-driven us banking fraud detection and prevention","volume":"7","author":"Kotagiri","year":"2023","journal-title":"Int. Trans. Artificial Intell."},{"key":"10.1016\/j.datak.2026.102557_bib0028","first-page":"215","article-title":"Deep learning for real-time fraud detection in financial transactions","volume":"1","author":"Pramudito","year":"2024","journal-title":"Join: J. Soc. Sci."},{"issue":"4","key":"10.1016\/j.datak.2026.102557_bib0029","doi-asserted-by":"crossref","DOI":"10.3390\/jrfm18040179","article-title":"Secure and transparent banking: explainable ai-driven federated learning model for financial fraud detection","volume":"18","author":"Aljunaid","year":"2025","journal-title":"J. Risk Financial. Manage."},{"issue":"11","key":"10.1016\/j.datak.2026.102557_bib0030","doi-asserted-by":"crossref","DOI":"10.37547\/tajet\/Volume06Issue11-04","article-title":"Transforming banking security: the role of deep learning in fraud detection systems","author":"Al-Imran","year":"2024","journal-title":"American J. Eng. Technol."},{"key":"10.1016\/j.datak.2026.102557_bib0031","first-page":"781","article-title":"Fraud detection and prevention by face recognition with and without mask for banking application","volume":"84","author":"Rajani","year":"2025","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.datak.2026.102557_bib0032","doi-asserted-by":"crossref","first-page":"915","DOI":"10.30574\/ijsra.2024.11.2.0505","article-title":"Cybersecurity threats in banking: unsupervised fraud detection analysis","volume":"11","author":"Meduri","year":"2024","journal-title":"Int. J. Sci. Arch."},{"issue":"6","key":"10.1016\/j.datak.2026.102557_bib0033","doi-asserted-by":"crossref","first-page":"8","DOI":"10.37547\/tajmei\/Volume06Issue06-02","article-title":"AI-powered fraud detection in banking: safeguarding financial transactions","author":"Johora","year":"2024","journal-title":"America. J. Manage. Econom. Innovat."},{"key":"10.1016\/j.datak.2026.102557_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.116158","article-title":"Reptile search algorithm (RSA): a nature-inspired meta-heuristic optimizer","volume":"191","author":"Abualigah","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.datak.2026.102557_bib0035","doi-asserted-by":"crossref","unstructured":"Emeline Pouyet, Neda Rohani, A. Katsaggelos, Oliver Cossairt and Marc Walton EMAIL logo\"Innovative data reduction and visualization strategy for hyperspectral imaging datasets using t-SNE approach\"2018.","DOI":"10.1515\/pac-2017-0907"},{"key":"10.1016\/j.datak.2026.102557_bib0036","doi-asserted-by":"crossref","unstructured":"Md. Palash Uddin, Md. Al Mamun and Md. Ali Hossain \"PCA-based feature reduction for hyperspectral remote sensing image classification\",2020.","DOI":"10.1080\/02564602.2020.1740615"},{"issue":"2","key":"10.1016\/j.datak.2026.102557_bib0037","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1109\/TNNLS.2020.2978942","article-title":"Host\u2013Parasite: graph LSTM-in-LSTM for group activity recognition","volume":"32","author":"Shu","year":"2021","journal-title":"IEEE Trans. Neural. Netw. Learn Syst."},{"key":"10.1016\/j.datak.2026.102557_bib0038","doi-asserted-by":"crossref","first-page":"8518","DOI":"10.1109\/ACCESS.2022.3142178","article-title":"Unrestricted attention may not be all you need\u2013masked attention mechanism focuses better on relevant parts in aspect-based sentiment analysis","volume":"10","author":"Feng","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.datak.2026.102557_bib0039","article-title":"D2CL: a dense dilated convolutional lstm model for sea surface temperature prediction","volume":"14","author":"Hou","year":"2021","journal-title":"J. Select. Topics Appl. Earth Observat. Remote Sens."},{"key":"10.1016\/j.datak.2026.102557_bib0040","unstructured":"Hazel K.Watson, Rebecca J.Mogg, Joanna M.Bond & Sarah E.A.Le V.Dit Durell \" Sexing eurasian oystercatchers haematopus ostralegus from breast feathers collected when ringing\", 2004."},{"key":"10.1016\/j.datak.2026.102557_bib0041","article-title":"Tuna Swarm optimization: a novel swarm-based metaheuristic algorithm for global optimization","author":"Xie","year":"2021","journal-title":"Artificial Intell. Mach. Learn.-Driv. Decisi.-Making"},{"key":"10.1016\/j.datak.2026.102557_bib0042","doi-asserted-by":"crossref","unstructured":"Khaled H. Almotairi and Laith Abualigah \" Hybrid Reptile Search Algorithm and Remora Optimization Algorithm for Optimization Tasks and Data Clustering\"2022.","DOI":"10.3390\/sym14030458"},{"key":"10.1016\/j.datak.2026.102557_bib0043","doi-asserted-by":"crossref","first-page":"119951","DOI":"10.1109\/ACCESS.2020.3005450","article-title":"A New Image Recognition and Classification Method Combining Transfer Learning Algorithm and MobileNet Model for Welding Defects","volume":"8","author":"Pan","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.datak.2026.102557_bib0044","series-title":"2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT)","first-page":"381","article-title":"A deep temporal graph convolutional neural network for network traffic forecasting","author":"Wu","year":"2022"},{"key":"10.1016\/j.datak.2026.102557_bib0045","doi-asserted-by":"crossref","first-page":"9872","DOI":"10.1109\/ACCESS.2018.2890127","article-title":"Multiple Feature Reweight DenseNet for Image Classification","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.datak.2026.102557_bib0046","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-022-09514-0","article-title":"Hybrid leader based optimization: a new stochastic optimization algorithm for solving optimization applications","volume":"12","author":"Dehghani","year":"2022","journal-title":"Sci. Rep."},{"issue":"855","key":"10.1016\/j.datak.2026.102557_bib0047","article-title":"Pelican Optimization Algorithm: a Novel Nature-Inspired Algorithm for Engineering Applications","volume":"22","author":"Trojovsk\u00fd","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.datak.2026.102557_bib0048","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/9752003","article-title":"A modified reptile search algorithm for numerical optimization problems","author":"Yuan","year":"2022","journal-title":"Comput. Intell. Neurosci."}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X26000042?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X26000042?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T05:04:39Z","timestamp":1773032679000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X26000042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":48,"alternative-id":["S0169023X26000042"],"URL":"https:\/\/doi.org\/10.1016\/j.datak.2026.102557","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MRV-RSA: Developed Modified Random Value Reptile Search Algorithm and Deep Learning based Fraud Detection Model in Banking Sector","name":"articletitle","label":"Article Title"},{"value":"Data & Knowledge Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.datak.2026.102557","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102557"}}