{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:17:33Z","timestamp":1776284253274,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11471965","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Ensemble-based Approach for Fraud Detection in Financial Transactions"],"prefix":"10.1109","author":[{"given":"Tamima","family":"ElHassan","sequence":"first","affiliation":[{"name":"Jinan University,Faculty of Business Administration,Tripoli,Lebanon"}]},{"given":"Ghalia","family":"Nassreddine","sequence":"additional","affiliation":[{"name":"Rafik Hariri Universiry,Department of Financial Studies,Meshref,Lebanon"}]},{"given":"Amal El","family":"Arid","sequence":"additional","affiliation":[{"name":"Rafik Hariri University,Dept. of Electrical and Computer Engineering,Meshref,Lebanon"}]},{"given":"Obada","family":"Al-Khatib","sequence":"additional","affiliation":[{"name":"University of Wollongong in Dubai,School of Engineering,Dubai,United Arab Emirates"}]},{"given":"Mohamad","family":"Nassereddine","sequence":"additional","affiliation":[{"name":"University of Wollongong in Dubai,School of Engineering,Dubai,United Arab Emirates"}]},{"given":"Abir El","family":"Abed","sequence":"additional","affiliation":[{"name":"Lebanese University,Faculty of Engineering,Hadath,Lebanon"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-9220-5.ch082"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.08.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-04-2020-0062"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.30574\/gjeta.2024.21.2.0205"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781003328414-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.32996\/jcsts.2023.5.2.2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.62650\/ijhrmob.2021.v9.i04.pp9-21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17654\/0972361724052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.62051\/16r3aa10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2021.1969733"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13682"},{"issue":"2","key":"ref12","first-page":"377","article-title":"Artificial Intelligence for Financial Fraud Detection: Advanced Techniques for Anomaly Detection, Pattern Recognition, and Risk Mitigation","volume":"1","author":"Gayam","year":"2021","journal-title":"African Journal of Artificial Intelligence and Sustainable Development"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s21051594"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-9220-5.ch082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.saa.2021.120652"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/computers14030082"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2022.04.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10275-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09896-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.018179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/pr8060638"},{"key":"ref23","article-title":"Fraudulent Transactions Data"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9293877"},{"issue":"5","key":"ref25","first-page":"3414","article-title":"An efficient credit card fraud detection model based on machine learning methods","volume":"29","author":"Trivedi","year":"2020","journal-title":"International Journal of Advanced Science and Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.006"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11471965.pdf?arnumber=11471965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:24:05Z","timestamp":1776281045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11471965","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}