{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T00:19:19Z","timestamp":1778545159013,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/icnsc.2018.8361343","type":"proceedings-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T00:07:01Z","timestamp":1526947621000},"page":"1-6","source":"Crossref","is-referenced-by-count":276,"title":["Random forest for credit card fraud detection"],"prefix":"10.1109","author":[{"given":"Shiyang","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Guanjun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenchuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lutao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changjun","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.110"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"ref12","article-title":"Detecting credit card fraud by decision trees and support vector machines","volume":"2188","author":"sahin","year":"2011","journal-title":"Lecture Notes in Computational Science and Enginee"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2014.7058074"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2215851"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1198\/10618600152628068"},{"key":"ref16","first-page":"235","volume":"17","author":"bolton","year":"2002","journal-title":"Statistical Fraud Detection A Review Statistical Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/5254.809570"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001406004624"},{"key":"ref4","first-page":"619","article-title":"Mining information from credit card time series for timelier fraud detection","author":"leila","year":"2011","journal-title":"IEEE Telecommunications Symposium"},{"key":"ref3","first-page":"5","article-title":"Unsupervised Profiling Methods for Fraud Detection","author":"richard","year":"2001","journal-title":"Proc Credit Scoring and Credit Control VII"},{"key":"ref6","first-page":"1","article-title":"C4.5, class imbalance, and cost sensitivity: why under-sampling beats oversampling","author":"drummond","year":"2003","journal-title":"Proc Workshop Learning from Imbalanced Datasets II"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70228"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"ref2","article-title":"Global online payment methods: Full year 2016","author":"gmbh","year":"2016","journal-title":"Tech Rep"},{"key":"ref1","first-page":"22","article-title":"A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant","author":"shalini","year":"2011","journal-title":"International Conference on Communication Systems and Network Technologies IEEE"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","article-title":"Implicit Authentication through Learning User Behavior","volume":"6531","author":"shi","year":"2010","journal-title":"International Conference on Information Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref22","first-page":"931","article-title":"Java-ML: A Machine Learning Library","volume":"10","author":"abeel","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","first-page":"1","volume":"1857","author":"dietterich","year":"2000","journal-title":"Ensemble Methods in Machine Learning"},{"key":"ref24","first-page":"358","article-title":"Classification and regression trees","volume":"40","author":"breiman","year":"1984","journal-title":"Biometrics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"}],"event":{"name":"2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC)","location":"Zhuhai","start":{"date-parts":[[2018,3,27]]},"end":{"date-parts":[[2018,3,29]]}},"container-title":["2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8358983\/8361215\/08361343.pdf?arnumber=8361343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:10:57Z","timestamp":1643177457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8361343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2018.8361343","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}