{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:34:09Z","timestamp":1730234049508,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579915","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Credit Card Fraud Detection with Resampling Techniques"],"prefix":"10.1109","author":[{"given":"Prerak","family":"Parekh","sequence":"first","affiliation":[]},{"given":"Chirag","family":"Rana","sequence":"additional","affiliation":[]},{"given":"Kunal","family":"Nalawade","sequence":"additional","affiliation":[]},{"given":"Surekha","family":"Dholay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Credit Card Fraud Detection Using Machine Learning As Data Mining Technique","year":"2018","author":"saravanan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAIE49996.2020.00045"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(00)00131-8"},{"key":"ref13","first-page":"670","author":"akila","year":"2017","journal-title":"Risk based Bagged Ensemble (RBE) for Credit Card Fraud Detection"},{"key":"ref14","article-title":"BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES","volume":"2","author":"dheepa","year":"2012","journal-title":"ICTACT J Soft Computing"},{"key":"ref15","first-page":"21","article-title":"Using Support Vector Machines for text categorization","volume":"13","author":"dumais","year":"1998","journal-title":"IEEE Intelligent Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti132"},{"key":"ref17","first-page":"23","article-title":"Applying Support Vectors Machines to face detection","volume":"13","author":"osuna","year":"1998","journal-title":"IEEE Intell Syst Mag Support Vector Machines"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120957"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i4.10601064"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence47617.2020.9057851"},{"journal-title":"Kaggle[online dataset]","article-title":"Credit Card Fraud Detection","year":"0","key":"ref3"},{"key":"ref6","article-title":"AUC-ROC Curve in Machine Learning Clearly Explained","author":"bhandari","year":"0","journal-title":"on Analytics Vidhya[online document]"},{"key":"ref5","article-title":"SMOTE for Imbalanced Classification with Python","author":"brownlee","year":"0","journal-title":"Machine Learning Mastery[online document]"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref7","article-title":"Accuracy, Precision, Recall or F1?","author":"ping shung","year":"0","journal-title":"on toward data science[online document]"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2018.8361343"},{"journal-title":"Identity Theft and Credit Card Fraud Statistics for 2020","year":"0","author":"daly","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref20","article-title":"Accuracy Paradox","author":"afonja","year":"0","journal-title":"on toward data science[online document]"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579915.pdf?arnumber=9579915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:41Z","timestamp":1652201741000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579915","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}