{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T15:29:07Z","timestamp":1765812547060,"version":"3.48.0"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.130078","type":"journal-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T23:39:40Z","timestamp":1761089980000},"page":"130078","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PB","title":["WDAE-GAN: A hybrid dual autoencoder and generative adversarial framework with wavelet denoising for credit card fraud detection"],"prefix":"10.1016","volume":"299","author":[{"given":"Masoud","family":"RezvaniNejad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4860-6007","authenticated-orcid":false,"given":"Ali","family":"Sabzali Yameqani","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2025.130078_b0005","series-title":"April). Fraud Detection in Online Credit Card Transactions Using Deep Learning","first-page":"85","author":"Aquino","year":"2024"},{"key":"10.1016\/j.eswa.2025.130078_b0010","unstructured":"Arjovsky, M., & Bottou, L. (2017). Towards principled methods for training generative adversarial networks. International Conference on Learning Representations (ICLR), Toulon, France. https:\/\/doi.org\/10.48550\/arXiv.1701.04862."},{"key":"10.1016\/j.eswa.2025.130078_b0015","unstructured":"Arjovsky, M., Chintala, S., & Bottou, L. (2017). Wasserstein GAN. arXiv preprint, arXiv:1701.07875. https:\/\/doi.org\/10.48550\/arXiv.1701.07875."},{"issue":"4","key":"10.1016\/j.eswa.2025.130078_b0020","doi-asserted-by":"crossref","first-page":"120","DOI":"10.3390\/computers14040120","article-title":"FraudX AI: An Interpretable Machine Learning Framework for Credit Card Fraud Detection on Imbalanced Datasets","volume":"14","author":"Baisholan","year":"2025","journal-title":"Computers"},{"issue":"19","key":"10.1016\/j.eswa.2025.130078_b0025","doi-asserted-by":"crossref","first-page":"29057","DOI":"10.1007\/s11042-023-14698-2","article-title":"Credit card fraud detection using ensemble data mining methods","volume":"82","author":"Bakhtiari","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2025.130078_b0030","doi-asserted-by":"crossref","unstructured":"Bashar, M. A., & Nayak, R. (2020, December). TAnoGAN: Time series anomaly detection with generative adversarial networks. In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1778\u20131785). IEEE. https:\/\/doi.org\/10.1109\/SSCI47803.2020.9308512.","DOI":"10.1109\/SSCI47803.2020.9308512"},{"key":"10.1016\/j.eswa.2025.130078_b0035","first-page":"153","article-title":"Greedy layer-wise training of deep networks. In","volume":"19","author":"Bengio","year":"2006","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130078_b0040","series-title":"July). Semi-supervised GANs for fraud detection","first-page":"1","author":"Charitou","year":"2020"},{"key":"10.1016\/j.eswa.2025.130078_b0045","doi-asserted-by":"crossref","unstructured":"Chen, J., Shen, Y., & Ali, R. (2018, November). Credit card fraud detection using sparse autoencoder and generative adversarial network. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 1054\u20131059). IEEE. https:\/\/doi.org\/10.1109\/IEMCON.2018.8614815.","DOI":"10.1109\/IEMCON.2018.8614815"},{"key":"10.1016\/j.eswa.2025.130078_b0055","series-title":"In Advances in Neural Information Processing Systems","first-page":"27","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0060","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1186\/s40537-020-00369-8","article-title":"CatBoost for big data: An interdisciplinary review","volume":"7","author":"Hancock","year":"2020","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.eswa.2025.130078_b0065","unstructured":"Kaggle. (2018). Credit card fraud detection dataset. https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud."},{"key":"10.1016\/j.eswa.2025.130078_b0070","doi-asserted-by":"crossref","first-page":"23636","DOI":"10.1109\/ACCESS.2024.3362831","article-title":"Detecting frauds and payment defaults on credit card data inherited with imbalanced class distribution and overlapping class problems: A systematic review","volume":"12","author":"Kalid","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0075","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/01605682.2021.1880296","article-title":"Generative adversarial networks for data augmentation and transfer in credit card fraud detection","volume":"73","author":"Langevin","year":"2022","journal-title":"Journal of the Operational Research Society"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0080","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1186\/s40537-023-00794-5","article-title":"Comparative analysis of binary and one-class classification techniques for credit card fraud data","volume":"10","author":"Leevy","year":"2023","journal-title":"Journal of Big Data"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0085","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1186\/s40537-023-00825-1","article-title":"Investigating the effectiveness of one-class and binary classification for fraud detection","volume":"10","author":"Leevy","year":"2023","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.eswa.2025.130078_b0090","series-title":"July). Intrusion detection method based on complementary adversarial generation network","first-page":"260","author":"Li","year":"2023"},{"key":"10.1016\/j.eswa.2025.130078_b0095","series-title":"In Proceedings of the Second ACM Data Economy Workshop","first-page":"27","article-title":"June). Adversarial learning in real-world fraud detection: Challenges and perspectives","author":"Lunghi","year":"2023"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2023.103569","article-title":"Reconstruction-based anomaly detection for multivariate time series using contrastive generative adversarial networks","volume":"61","author":"Miao","year":"2024","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.eswa.2025.130078_b0105","doi-asserted-by":"crossref","first-page":"30628","DOI":"10.1109\/ACCESS.2023.3262020","article-title":"A deep learning ensemble with data resampling for credit card fraud detection","volume":"11","author":"Mienye","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130078_b0110","doi-asserted-by":"crossref","first-page":"112776","DOI":"10.1109\/ACCESS.2023.3323842","article-title":"A novel framework for credit card fraud detection","volume":"11","author":"Mniai","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130078_b0115","doi-asserted-by":"crossref","first-page":"96852","DOI":"10.1109\/ACCESS.2022.3205416","article-title":"A proposed model for card fraud detection based on CatBoost and deep neural network","volume":"10","author":"Nguyen","year":"2022","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.eswa.2025.130078_b0120","doi-asserted-by":"crossref","first-page":"1556","DOI":"10.1109\/TCSS.2022.3209827","article-title":"A scalable RF-XGBoost framework for financial fraud mitigation","volume":"11","author":"Nti","year":"2022","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"6","key":"10.1016\/j.eswa.2025.130078_b0125","first-page":"3793","article-title":"One-class adversarial fraud detection nets with class specific representations","volume":"10","author":"Peng","year":"2023","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"10.1016\/j.eswa.2025.130078_b0130","series-title":"In Advances in Neural Information Processing Systems","first-page":"31","article-title":"CatBoost: Unbiased boosting with categorical features","author":"Prokhorenkova","year":"2018"},{"key":"10.1016\/j.eswa.2025.130078_b0135","doi-asserted-by":"crossref","unstructured":"Raturi, R., Kumar, A., Vyas, N., & Dutt, V. (2023, June). A novel approach for anomaly detection in time-series data using generative adversarial networks. In 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS) (pp. 1352\u20131357). IEEE. https:\/\/doi.org\/10.1109\/ICSCSS57650.2023.10169365.","DOI":"10.1109\/ICSCSS57650.2023.10169365"},{"key":"10.1016\/j.eswa.2025.130078_b0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124979","article-title":"Credit card fraud detection based on federated graph learning","volume":"256","author":"Tang","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0145","doi-asserted-by":"crossref","first-page":"9","DOI":"10.3390\/jcp5010009","article-title":"Generative modeling for imbalanced credit card fraud transaction detection","volume":"5","author":"Tayebi","year":"2025","journal-title":"Journal of Cybersecurity and Privacy"},{"issue":"9","key":"10.1016\/j.eswa.2025.130078_b0150","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.3390\/electronics14091754","article-title":"Big data-driven distributed machine learning for scalable credit card fraud detection using PySpark, XGBoost, and CatBoost","volume":"14","author":"Theodorakopoulos","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130078_b0155","doi-asserted-by":"crossref","first-page":"91265","DOI":"10.1109\/ACCESS.2020.2994327","article-title":"Dual autoencoders generative adversarial network for imbalanced classification problem","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130078_b0160","series-title":"November). Locally interpretable one-class anomaly detection for credit card fraud detection","first-page":"25","author":"Wu","year":"2021"},{"issue":"3","key":"10.1016\/j.eswa.2025.130078_b0165","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/TCSS.2022.3158318","article-title":"Time-aware attention-based gated network for credit card fraud detection by extracting transactional behaviors","volume":"10","author":"Xie","year":"2022","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"4","key":"10.1016\/j.eswa.2025.130078_b0170","doi-asserted-by":"crossref","first-page":"5735","DOI":"10.1109\/TNNLS.2022.3208967","article-title":"Learning transactional behavioral representations for credit card fraud detection","volume":"35","author":"Xie","year":"2022","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.1016\/j.eswa.2025.130078_b0175","doi-asserted-by":"crossref","DOI":"10.1109\/JAS.2025.125243","article-title":"A transactional-behavior-based hierarchical gated network for credit card fraud detection","author":"Xie","year":"2025","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"6","key":"10.1016\/j.eswa.2025.130078_b0180","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3390\/computers11060085","article-title":"Improved bidirectional GAN-based approach for network intrusion detection using one-class classifier","volume":"11","author":"Xu","year":"2022","journal-title":"Computers"},{"key":"10.1016\/j.eswa.2025.130078_b0185","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.125661","article-title":"A distribution-preserving method for resampling combined with LightGBM-LSTM for sequence-wise fraud detection in credit card transactions","volume":"262","author":"Yousefimehr","year":"2025","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2025.130078_b0190","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103916","article-title":"NNEnsLeG: A novel approach for e-commerce payment fraud detection using ensemble learning and neural networks","volume":"62","author":"Zeng","year":"2025","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.eswa.2025.130078_b0195","doi-asserted-by":"crossref","unstructured":"Zheng, P., Yuan, S., Wu, X., Li, J., & Lu, A. (2019, July). One-class adversarial nets for fraud detection. In Proceedings of the AAAI Conference on Artificial Intelligence, 33(1), 1286\u20131293. https:\/\/doi.org\/10.1609\/aaai.v33i01.33011286.","DOI":"10.1609\/aaai.v33i01.33011286"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425036942?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425036942?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T15:26:46Z","timestamp":1765812406000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425036942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":38,"alternative-id":["S0957417425036942"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130078","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"WDAE-GAN: A hybrid dual autoencoder and generative adversarial framework with wavelet denoising for credit card fraud detection","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130078","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"130078"}}