{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T22:23:34Z","timestamp":1778883814922,"version":"3.51.4"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100012024","name":"Multimedia University Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012024","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3362831","type":"journal-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T19:15:32Z","timestamp":1707246932000},"page":"23636-23652","source":"Crossref","is-referenced-by-count":26,"title":["Detecting Frauds and Payment Defaults on Credit Card Data Inherited With Imbalanced Class Distribution and Overlapping Class Problems: A Systematic Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4514-377X","authenticated-orcid":false,"given":"Suraya Nurain","family":"Kalid","sequence":"first","affiliation":[{"name":"Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9346-1479","authenticated-orcid":false,"given":"Kok-Chin","family":"Khor","sequence":"additional","affiliation":[{"name":"Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Bandar Sungai Long, Kajang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8617-1086","authenticated-orcid":false,"given":"Keng-Hoong","family":"Ng","sequence":"additional","affiliation":[{"name":"Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Bandar Sungai Long, Kajang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5086-9383","authenticated-orcid":false,"given":"Gee-Kok","family":"Tong","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Selangor, Malaysia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Credit Card Fraud Will Increase Due To the Covid Pandemic, Experts Warn","author":"Lee","year":"2021"},{"key":"ref2","volume-title":"Alternative Views: Cybercrime on the Rise Amid the Pandemic","author":"Shanmugam","year":"2021"},{"key":"ref3","volume-title":"Nilson Newsletter","year":"2022"},{"key":"ref4","volume-title":"BNM Annual Report 2022","year":"2022"},{"key":"ref5","volume-title":"Malaysians Use Credit Cards More and Borrow More","year":"2022"},{"key":"ref6","volume-title":"What Happens If You Do Not Pay Back Your Credit Card Debt?","author":"Wu","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/2046-4053-4-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1590\/s0104-11692007000300023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icbaie49996.2020.00045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2927266"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971354"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icspis.2016.7869880"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/iscv49265.2020.9204185"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/iccse.2018.8468855"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2806420"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/confluence47617.2020.9057851"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iri.2018.00025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icssit46314.2019.8987801"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3033784"},{"key":"ref21","first-page":"753","article-title":"Application of balancing techniques with ensemble approach for credit card fraud detection","volume-title":"Proc. Int. Conf. Comput., Power Commun. Technol. (GUCON)","author":"Taneja"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccic.2017.8524418"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2023.104547"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/mipro.2019.8757212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2019.8852415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/iccic.2017.8524161"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icssit48917.2020.9214206"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata.2017.8258364"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icpcsi.2017.8392219"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/icici.2017.8365263"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/eitce47263.2019.9094859"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/smartworld.2018.00051"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114750"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/sceecs.2018.8546939"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/miticon.2016.8025244"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/icces45898.2019.9002289"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/iccasit48058.2019.8973167"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sciaf.2020.e00464"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.03.042"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2018.06.009"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.01.057"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106883"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102596"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/indicon49873.2020.9342462"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.030"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04335-1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3633-8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/icics52457.2021.9464555"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-03375-w"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC353642.2021.9697227"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41568-6_16"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49944-4_20"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/iceem52022.2021.9480639"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23551-2_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4214-9_14"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/icics49469.2020.239524"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ictai.2019.00188"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00045"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/icce-taiwan58799.2023.10226905"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3056285"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3148298"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/cds49703.2020.00050"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3460179.3460186"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/icaisc58445.2023.10199684"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/cogmi56440.2022.00018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn54540.2023.10191810"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/pdgc56933.2022.10053175"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/iceccme55909.2022.9987791"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2023.3273543"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2023.04.002"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100793"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00573-8"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3166891"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ccict56684.2022.00022"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/icatiece56365.2022.10046976"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/confluence56041.2023.10048876"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.006"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119562"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2019.8682212"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00684-w"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2023.3242149"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-00987-w"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3323842"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/iccubea.2018.8697799"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/dicct56244.2023.10110188"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3262020"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/infoteh48170.2020.9066276"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04465-9"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100163"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103618"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108132"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14698-2"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2023.114037"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ssci.2015.33"},{"key":"ref97","volume-title":"IEEE Computational Intelligence Society","year":"2022"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"ref99","volume-title":"UCSD: University of California, San Diego Data Mining Con-test 2009","year":"2009"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.08.074"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3207287"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107884"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10423008.pdf?arnumber=10423008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T12:04:16Z","timestamp":1709467456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10423008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":102,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3362831","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}