{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T03:35:57Z","timestamp":1776224157207,"version":"3.50.1"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education, Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/SS01\/MMU\/03\/11"],"award-info":[{"award-number":["FRGS\/1\/2019\/SS01\/MMU\/03\/11"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2972009","type":"journal-article","created":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T21:34:57Z","timestamp":1581024897000},"page":"28210-28221","source":"Crossref","is-referenced-by-count":64,"title":["A Multiple Classifiers System for Anomaly Detection in Credit Card Data With Unbalanced and Overlapped Classes"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4514-377X","authenticated-orcid":false,"given":"Suraya Nurain","family":"Kalid","sequence":"first","affiliation":[]},{"given":"Keng-Hoong","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Gee-Kok","family":"Tong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9346-1479","authenticated-orcid":false,"given":"Kok-Chin","family":"Khor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"ref72","first-page":"261","article-title":"Credit card fraud detection using Bayesian and neural networks","author":"maes","year":"2002","journal-title":"Proc 1st Int NAISO Congr Neuro Fuzzy Technologies"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.33"},{"key":"ref70","first-page":"2","article-title":"Predictive accuracy: A misleading performance measure for highly imbalanced data","author":"akosa","year":"2017","journal-title":"SAS Global Forum"},{"key":"ref76","author":"irby","year":"2018","journal-title":"Learn How Credit Card Default Happens and What You Can Do About It"},{"key":"ref77","year":"2019","journal-title":"Kuala Lumpur"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.67"},{"key":"ref74","author":"bache","year":"2013","journal-title":"UCI Machine Learning Reposito-ry"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.tree.2015.11.009"},{"key":"ref75","author":"yeh","year":"2016","journal-title":"UCI Machine Learning Repository Default of credit card clients Data Set"},{"key":"ref78","first-page":"36","article-title":"Prediction of credit-card defaulters: A comparative study on performance of classifiers","volume":"145","author":"venkatesh","year":"2016","journal-title":"Int J Comput Appl"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MITICON.2016.8025244"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5120\/14249-2444"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993309"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2017.10.020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.056"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.3968"},{"key":"ref36","author":"selvi","year":"2018","journal-title":"C5 Causal Decision Tree"},{"key":"ref35","author":"crowley","year":"2017","journal-title":"Intelligent Systems Reasoning and Recognition"},{"key":"ref34","first-page":"191","author":"sani","year":"2018","journal-title":"Computational Complexity Analysis of Decision Tree Algorithms"},{"key":"ref60","author":"brownlee","year":"2019","journal-title":"Bagging and random forest ensemble algorithms for machine learning"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.02.017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3152494.3156815"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICICI.2017.8365282"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.033"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177678"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.201"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1108\/K-09-2015-0228"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.09.014"},{"key":"ref66","author":"ali","year":"2015","journal-title":"Classification With Class Imbalance Problem A Review"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2771290"},{"key":"ref68","article-title":"Evaluation measures for models assessment over imbalanced data sets","volume":"3","author":"bekkar","year":"2013","journal-title":"J Inf Eng Appl"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"},{"key":"ref2","year":"2019","journal-title":"RM51 3mil in payment card fraud losses reported in 2016"},{"key":"ref1","year":"2019","journal-title":"Nilsonreport"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.07.064"},{"key":"ref22","first-page":"1","article-title":"Imbalanced-learn: A Python toolbox to tackle the curse of imbalanced datasets in machine learning","volume":"18","author":"lemaitre","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13529-3_18"},{"key":"ref24","author":"qi","year":"2019","journal-title":"A Brief Literature Review of Class Imbalanced Prob-LEM"},{"key":"ref23","first-page":"78","author":"engelbrecht","year":"1999","journal-title":"Rule Improvement Through Decision Boundary Detection Using Sensitivity Analysis"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/071L50"},{"key":"ref51","first-page":"1","article-title":"Detecting credit card fraud by decision trees and support vector machines","author":"sahin","year":"2011","journal-title":"Proc Int MultiConf Eng Comput Scientists"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196047"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.04.006"},{"key":"ref56","author":"stefanowski","year":"2008","journal-title":"Lamsade Dauphine fr"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-002-0090-8"},{"key":"ref54","first-page":"1","article-title":"Outlier detection using oversampling PCA for credit card fraud detection","volume":"5","author":"pawar","year":"2017","journal-title":"International Journal of Applied Science and Engineering Research"},{"key":"ref53","first-page":"1","article-title":"Data mining techniques for credit card fraud detection: Empirical study","author":"fahmi","year":"2016","journal-title":"Proc Int Conf Sustain Vital Technol Eng Inform"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/252797"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2018.8607671"},{"key":"ref40","article-title":"Adaptive machine learning for credit card fraud detection","author":"dal pozzolo","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2751612"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03493-1_72"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-017-0037-9"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258364"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489661"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00051"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.035"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489755"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.011"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393560"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2012.02.078"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806420"},{"key":"ref4","year":"2019","journal-title":"Malaysia Credit Card Statistics"},{"key":"ref3","author":"lokman","year":"2019","journal-title":"3 6 Million Credit Card Holders Have RM36 9 Billion Outstanding Balance"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2017.154"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0551-y"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00766"},{"key":"ref8","first-page":"1","article-title":"A new approach for classification of highly imbalanced datasets using evolutionary algorithms","volume":"2","author":"maheshwari","year":"2011","journal-title":"Int J Sci Eng Res"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45482-9_8"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2018.8374722"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007734"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-56989-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.205"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1023\/B:APIN.0000033632.42843.17"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v72.4004"},{"key":"ref48","first-page":"24","author":"batista","year":"2005","journal-title":"Balancing Strategies and Class Overlapping"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4"},{"key":"ref41","article-title":"Credit card fraud detectioN (machine learning algorithms)","author":"westerlund","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10346-015-0557-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoderma.2015.04.008"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08985298.pdf?arnumber=8985298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:26Z","timestamp":1639770686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8985298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":87,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2972009","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}