{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:54:57Z","timestamp":1773932097014,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.is.2026.102716","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:42:21Z","timestamp":1772671341000},"page":"102716","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Diffusion-based minority augmentation and confidence-calibrated tabular learning for imbalanced rare-event classification"],"prefix":"10.1016","volume":"140","author":[{"given":"Chandrahas","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Ashish Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0001","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s44230-022-00004-0","article-title":"Review of machine learning approach on credit card fraud detection","volume":"2","author":"Bin Sulaiman","year":"2022","journal-title":"Hum.-Centric Intell. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2024.04.057","article-title":"Digital twin for credit card fraud detection: opportunities, challenges, and fraud detection advancements","author":"Chatterjee","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0003","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3426955","article-title":"Deep learning for credit card fraud detection: a review of algorithms, challenges, and solutions","author":"Mienye","year":"2024","journal-title":"IEEe Access."},{"key":"10.1016\/j.is.2026.102716_bib0004","doi-asserted-by":"crossref","first-page":"39700","DOI":"10.1109\/ACCESS.2022.3166891","article-title":"Credit card fraud detection using state-of-the-art machine learning and deep learning algorithms","volume":"10","author":"Alarfaj","year":"2022","journal-title":"IEEe Access."},{"key":"10.1016\/j.is.2026.102716_bib0005","doi-asserted-by":"crossref","first-page":"16400","DOI":"10.1109\/ACCESS.2022.3148298","article-title":"A neural network ensemble with feature engineering for improved credit card fraud detection","volume":"10","author":"Esenogho","year":"2022","journal-title":"IEEe Access."},{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0006","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1186\/s40537-022-00573-8","article-title":"A machine learning based credit card fraud detection using the GA algorithm for feature selection","volume":"9","author":"Ileberi","year":"2022","journal-title":"J. Big. Data"},{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0007","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.gltp.2021.01.006","article-title":"Credit card fraud detection using artificial neural network","volume":"2","author":"Asha","year":"2021","journal-title":"Glob. Transit. Proc."},{"key":"10.1016\/j.is.2026.102716_bib0008","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","article-title":"Combining unsupervised and supervised learning in credit card fraud detection","volume":"557","author":"Carcillo","year":"2021","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.is.2026.102716_bib0009","series-title":"2021 5th international conference on intelligent computing and control systems (ICICCS)","first-page":"967","article-title":"Credit card fraud detection using machine learning","author":"Tanouz","year":"2021"},{"key":"10.1016\/j.is.2026.102716_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2023.114037","article-title":"Efficient fraud detection using deep boosting decision trees","volume":"175","author":"Xu","year":"2023","journal-title":"Decis. Support. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0011","doi-asserted-by":"crossref","first-page":"89694","DOI":"10.1109\/ACCESS.2023.3306621","article-title":"Ensemble synthesized minority oversampling-based generative adversarial networks and random forest algorithm for credit card fraud detection","volume":"11","author":"Ghaleb","year":"2023","journal-title":"IEEe Access."},{"key":"10.1016\/j.is.2026.102716_bib0012","doi-asserted-by":"crossref","first-page":"25579","DOI":"10.1109\/ACCESS.2020.2971354","article-title":"An intelligent approach to credit card fraud detection using an optimized light gradient boosting machine","volume":"8","author":"Taha","year":"2020","journal-title":"IEEe Access."},{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0013","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s44230-022-00004-0","article-title":"Review of machine learning approach on credit card fraud detection","volume":"2","author":"Bin Sulaiman","year":"2022","journal-title":"Hum.-Centric Intell. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0014","doi-asserted-by":"crossref","first-page":"165286","DOI":"10.1109\/ACCESS.2021.3134330","article-title":"Performance evaluation of machine learning methods for credit card fraud detection using SMOTE and AdaBoost","volume":"9","author":"Ileberi","year":"2021","journal-title":"IEEe Access."},{"key":"10.1016\/j.is.2026.102716_bib0015","doi-asserted-by":"crossref","first-page":"93010","DOI":"10.1109\/ACCESS.2019.2927266","article-title":"An experimental study with imbalanced classification approaches for credit card fraud detection","volume":"7","author":"Makki","year":"2019","journal-title":"IEEe Access."},{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0016","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/01605682.2021.1880296","article-title":"Generative adversarial networks for data augmentation and transfer in credit card fraud detection","volume":"73","author":"Langevin","year":"2022","journal-title":"J. Oper. Res. Soc."},{"issue":"1","key":"10.1016\/j.is.2026.102716_bib0017","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1186\/s40537-021-00461-7","article-title":"Modelling customers credit card behaviour using bidirectional LSTM neural networks","volume":"8","author":"Ala\u2019raj","year":"2021","journal-title":"J. Big. Data"},{"key":"10.1016\/j.is.2026.102716_bib0018","series-title":"2024 IEEE 6th International Conference on Power, Intelligent Computing and Systems (ICPICS)","first-page":"876","article-title":"Advanced user credit risk prediction model using lightgbm, xgboost and tabnet with smoteenn","author":"Yu","year":"2024"},{"issue":"4","key":"10.1016\/j.is.2026.102716_bib0019","doi-asserted-by":"crossref","first-page":"6978","DOI":"10.1109\/TASE.2023.3335145","article-title":"A spatial\u2013temporal gated network for credit card fraud detection by learning transactional representations","volume":"21","author":"Xie","year":"2023","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"2","key":"10.1016\/j.is.2026.102716_bib0020","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TCSS.2023.3242149","article-title":"Fraud feature boosting mechanism and spiral oversampling balancing technique for credit card fraud detection","volume":"11","author":"Ni","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0021","article-title":"Learning transactional behavioral representations for credit card fraud detection","author":"Xie","year":"2022","journal-title":"IEEe Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0022","article-title":"NUS: noisy-sample-removed under sampling scheme for imbalanced classification and application to credit card fraud detection","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.is.2026.102716_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119562","article-title":"A novel combined approach based on deep autoencoder and deep classifiers for credit card fraud detection","volume":"217","author":"Fanai","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.is.2026.102716_bib0024","article-title":"Deep learning-based credit card fraud detection in federated learning","volume":"255","author":"Reddy","year":"2024","journal-title":"Expert. Syst. Appl."},{"issue":"18","key":"10.1016\/j.is.2026.102716_bib0025","doi-asserted-by":"crossref","first-page":"54729","DOI":"10.1007\/s11042-023-17766-9","article-title":"A voting ensemble machine learning based credit card fraud detection using highly imbalance data","volume":"83","author":"Chhabra","year":"2024","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.is.2026.102716_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111368","article-title":"Imbalanced credit card fraud detection data: a solution based on hybrid neural network and clustering-based undersampling technique","volume":"154","author":"Huang","year":"2024","journal-title":"Appl. Soft. Comput."},{"issue":"8","key":"10.1016\/j.is.2026.102716_bib0027","doi-asserted-by":"crossref","first-page":"4026","DOI":"10.1109\/TAI.2024.3359568","article-title":"An adaptive heterogeneous credit card fraud detection model based on deep reinforcement training subset selection","volume":"5","author":"Zhu","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"10.1016\/j.is.2026.102716_bib0028","unstructured":"Dal Pozzolo, A., Caelen, O., Johnson, R., & Bontempi, G. Credit Card Fraud Detection Dataset. Machine Learning Group, Universit\u00e9 Libre de Bruxelles, 2015. Available: https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud."},{"key":"10.1016\/j.is.2026.102716_bib0029","unstructured":"Elgiriyewithana, N., \u201cCredit Card Fraud Detection Dataset 2023,\u201d Kaggle, 2023."},{"key":"10.1016\/j.is.2026.102716_bib0030","article-title":"Least information spectral GAN with time-series data augmentation for industrial IoT","author":"Seon","year":"2024","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.is.2026.102716_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119543","article-title":"Deep learning in insurance: accuracy and model interpretability using TabNet","volume":"217","author":"McDonnell","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.is.2026.102716_bib0032","unstructured":"J. Salazar (2024) \u201cGlobal payment fraud losses to exceed $400B over the next 10 years,\u201d *Payments Dive*. [Online]. Available: https:\/\/www.paymentsdive.com\/news\/payments-fraud-losses-prevention-nilson-outlook\/737440\/."},{"key":"10.1016\/j.is.2026.102716_bib0033","unstructured":"S. DeNicola (2024) \u201cCredit card fraud statistics 2024,\u201d *Fit Small Business* [Online]. Available: https:\/\/fitsmallbusiness.com\/credit-card-fraud-statistics\/."},{"key":"10.1016\/j.is.2026.102716_bib0034","series-title":"In Proceedings of the Symposium on Computer Applications and Medical Care","first-page":"261","article-title":"Using the ADAP learning algorithm to forecast the onset of diabetes mellitus","author":"Smith","year":"1988"},{"key":"10.1016\/j.is.2026.102716_bib0035","series-title":"Canadian Institute for Cybersecurity","article-title":"Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization (CIC-IDS2017)","author":"Sharafaldin","year":"2017"}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030643792600030X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030643792600030X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:23:28Z","timestamp":1773923008000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S030643792600030X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":35,"alternative-id":["S030643792600030X"],"URL":"https:\/\/doi.org\/10.1016\/j.is.2026.102716","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Diffusion-based minority augmentation and confidence-calibrated tabular learning for imbalanced rare-event classification","name":"articletitle","label":"Article Title"},{"value":"Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.is.2026.102716","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102716"}}