{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:57:07Z","timestamp":1776977827558,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11471884","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["AI-Enabled Fraud Detection and Risk Management Systems for the U.S. Financial Sector"],"prefix":"10.1109","author":[{"given":"Md","family":"Tariquzzaman","sequence":"first","affiliation":[{"name":"Southern Arkansas University,College of Science and Engineering,Magnolia,Arkansas,USA,71753"}]},{"given":"Istiaque","family":"Mahmud","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]},{"given":"Dipon Das","family":"Rahul","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]},{"given":"Hasan","family":"Aqif","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]},{"given":"Samia","family":"Akter","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]},{"given":"Faisal Yousuf","family":"Osman","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]},{"given":"Sayer","family":"Bin Shafi","sequence":"additional","affiliation":[{"name":"Midwestern State University,Dillard College of Business Administration,Wichita Falls,Texas,USA,76308"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"1718","article-title":"A survey of machine learning for big data","volume":"20","author":"Liu","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref2","first-page":"127","article-title":"Deep learning approaches for fraud detection","volume":"329","author":"Ren","year":"2019","journal-title":"Neurocomputing"},{"key":"ref3","first-page":"112860","article-title":"Feature engineering and model selection for fraud detection","volume":"138","author":"Lin","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"ref4","first-page":"36","article-title":"Credit card fraud detection: A comprehensive review","volume":"148","author":"Zhang","year":"2018","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"ref5","first-page":"454","article-title":"A comprehensive survey of data mining-based fraud detection research","volume":"30","author":"Phua","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref6","first-page":"20145","article-title":"A hybrid deep learning framework for fraud detection in digital transactions","volume":"9","author":"Nguyen","year":"2021","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref10","first-page":"127","article-title":"A deep neural network for fraud detection","volume":"399","author":"Huang","year":"2017","journal-title":"Inf. Sci."},{"issue":"4","key":"ref11","first-page":"1532","article-title":"Adaptive learning for financial fraud detection","volume":"32","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"3","key":"ref12","first-page":"620","article-title":"Real-time fraud detection in financial transactions using machine learning","volume":"49","author":"Feng","year":"2019","journal-title":"IEEE Trans. Syst., Man, Cybern., Syst."},{"issue":"2","key":"ref13","first-page":"451","article-title":"Machine learning techniques for anomaly detection in financial fraud: A review","volume":"38","author":"Alawadhi","year":"2018","journal-title":"J. Risk Anal."},{"issue":"3","key":"ref14","first-page":"755","article-title":"Recent advances in fraud detection: A review","volume":"26","author":"Gupta","year":"2019","journal-title":"J. Financial Crime"},{"issue":"1","key":"ref15","first-page":"77","article-title":"Recent advances in fraud detection using artificial intelligence","volume":"29","author":"Kim","year":"2022","journal-title":"J. Financial Crime"},{"key":"ref16","first-page":"113045","article-title":"Enhancing fraud detection systems with machine learning: A case study","volume":"143","author":"Tran","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref17","first-page":"15271","article-title":"Fraud detection based on deep learning: A survey","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983433"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1301"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021"},{"key":"ref21","volume-title":"Applied Logistic Regression Analysis","author":"Menard","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1301"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021"},{"key":"ref24","first-page":"114","article-title":"Fraud detection using XGBoost in financial transactions","volume":"179","author":"Zheng","year":"2021","journal-title":"Expert Systems with Applications"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11471884.pdf?arnumber=11471884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:58:04Z","timestamp":1776974284000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11471884","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}