{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:02:40Z","timestamp":1770357760718,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,19]]},"DOI":"10.1109\/cvmi61877.2024.10781986","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:24:11Z","timestamp":1733955851000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Credit Card Fraud Detection: A Comparative Analysis of Anomaly Detection Models"],"prefix":"10.1109","author":[{"given":"J G","family":"Sherwin Akshay","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing, Coimbatore,Department of Computer Science and Engineering,India"}]},{"given":"T","family":"Vinusha","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing, Coimbatore,Department of Computer Science and Engineering,India"}]},{"given":"R","family":"Sharon Bianca","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing, Coimbatore,Department of Computer Science and Engineering,India"}]},{"given":"C K","family":"Sarath Krishna","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing, Coimbatore,Department of Computer Science and Engineering,India"}]},{"given":"G","family":"Radhika","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing, Coimbatore,Department of Computer Science and Engineering,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-023-00470-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.02.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12078"},{"issue":"1","key":"ref5","first-page":"1","article-title":"Online payment fraud: from anomaly detection to risk management","volume":"9","author":"Hilal","year":"2022","journal-title":"Financial Innovation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1918\/4\/042002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIKE47802.2019.9004231"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.b4957.129219"},{"key":"ref9","article-title":"Sequential behavioral data processing using deep learning and the Markov transition field in online fraud detection","author":"Zhang","year":"2018","journal-title":"arXiv preprint arXiv:1808.05329."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM48762.2020.9160200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08954-1_111"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.69554\/JIKC1304"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s22197162"},{"key":"ref14","article-title":"Anomaly Detection on Bitcoin, Ethereum Networks Using GPUaccelerated Machine Learning Methods","author":"Patel","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.36548\/jaicn.2021.2.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182155"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10024-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134330"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2821-5_47"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v26.i1.pp362-373"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3395245.3396409"},{"key":"ref22","first-page":"218","article-title":"Credit Card Fraud Detection Based on Feature Selection Using Linear Discriminant Analysis and Deep Artificial Neural Network","author":"Wreford","year":"2023","journal-title":"Asian Research Journal of Current Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.60084\/ijma.v1i1.78"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116463"}],"event":{"name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","location":"Prayagraj, India","start":{"date-parts":[[2024,10,19]]},"end":{"date-parts":[[2024,10,20]]}},"container-title":["2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10781474\/10781502\/10781986.pdf?arnumber=10781986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:37:05Z","timestamp":1733989025000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10781986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cvmi61877.2024.10781986","relation":{},"subject":[],"published":{"date-parts":[[2024,10,19]]}}}