{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T21:00:28Z","timestamp":1774818028946,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T00:00:00Z","timestamp":1515628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,11]]},"DOI":"10.1145\/3152494.3156815","type":"proceedings-article","created":{"date-parts":[[2018,2,13]],"date-time":"2018-02-13T15:28:46Z","timestamp":1518535726000},"page":"289-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Ensemble learning for credit card fraud detection"],"prefix":"10.1145","author":[{"given":"Ishan","family":"Sohony","sequence":"first","affiliation":[{"name":"Pune Institute of Computer Technology"}]},{"given":"Rameshwar","family":"Pratap","sequence":"additional","affiliation":[{"name":"Zensar Technologies, Pune"}]},{"given":"Ullas","family":"Nambiar","sequence":"additional","affiliation":[{"name":"Zensar Technologies, Pune"}]}],"member":"320","published-online":{"date-parts":[[2018,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"European Central Bank","author":"Second","year":"2013","unstructured":"Second report on card fraud . In European Central Bank , 2013 . Second report on card fraud. In European Central Bank, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIFER.1997.618940"},{"key":"e_1_3_2_1_3_1","first-page":"1027","volume-title":"Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '07","author":"Arthur David","year":"2007","unstructured":"David Arthur and Sergei Vassilvitskii . K-means++ : The advantages of careful seeding . In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '07 , pages 1027 -- 1035 , Philadelphia, PA, USA , 2007 . Society for Industrial and Applied Mathematics. David Arthur and Sergei Vassilvitskii. K-means++: The advantages of careful seeding. In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '07, pages 1027--1035, Philadelphia, PA, USA, 2007. Society for Industrial and Applied Mathematics."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"e_1_3_2_1_6_1","first-page":"800","volume-title":"Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines","author":"Chen Rong-Chang","year":"2004","unstructured":"Rong-Chang Chen , Ming-Li Chiu , Ya-Li Huang , and Lin-Ti Chen . Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines , pages 800 -- 806 . Springer Berlin Heidelberg , Berlin, Heidelberg , 2004 . Rong-Chang Chen, Ming-Li Chiu, Ya-Li Huang, and Lin-Ti Chen. Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines, pages 800--806. Springer Berlin Heidelberg, Berlin, Heidelberg, 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.33"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the Int\u00e2\u0102&Zacute;l Conf. on Artificial Intelligence","author":"Japkowicz Nathalie","year":"2000","unstructured":"Nathalie Japkowicz . The class imbalance problem: Significance and strategies . In Proc. of the Int\u00e2\u0102&Zacute;l Conf. on Artificial Intelligence , 2000 . Nathalie Japkowicz. The class imbalance problem: Significance and strategies. In Proc. of the Int\u00e2\u0102&Zacute;l Conf. on Artificial Intelligence, 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1293951.1293954"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DBTA.2009.170"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.03.014"},{"key":"e_1_3_2_1_15_1","volume-title":"Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs\/1412.6980","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs\/1412.6980 , 2014 . Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs\/1412.6980, 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Butterworth-Heinemann","author":"Mena Jesus","year":"2002","unstructured":"Jesus Mena . Investigative Data Mining for Security and Criminal Detection . Butterworth-Heinemann , Newton, MA, USA , 2002 . Jesus Mena. Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Newton, MA, USA, 2002."},{"key":"e_1_3_2_1_17_1","first-page":"3111","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems, NIPS'13","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg Corrado , and Jeffrey Dean . Distributed representations of words and phrases and their compositionality . In Proceedings of the 26th International Conference on Neural Information Processing Systems, NIPS'13 , pages 3111 -- 3119 , USA, 2013 . Curran Associates Inc. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. Distributed representations of words and phrases and their compositionality. In Proceedings of the 26th International Conference on Neural Information Processing Systems, NIPS'13, pages 3111--3119, USA, 2013. Curran Associates Inc."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"e_1_3_2_1_19_1","first-page":"659","volume-title":"Gaussian Mixture Models","author":"Reynolds Douglas","year":"2009","unstructured":"Douglas Reynolds . Gaussian Mixture Models , pages 659 -- 663 . Springer US , Boston, MA , 2009 . Douglas Reynolds. Gaussian Mixture Models, pages 659--663. Springer US, Boston, MA, 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2002.1005055"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/0003684042000337433"}],"event":{"name":"CoDS-COMAD '18: The ACM India Joint International Conference on Data Science & Management of Data","location":"Goa India","acronym":"CoDS-COMAD '18"},"container-title":["Proceedings of the ACM India Joint International Conference on Data Science and Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152494.3156815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152494.3156815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:31Z","timestamp":1750212811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152494.3156815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,11]]},"references-count":21,"alternative-id":["10.1145\/3152494.3156815","10.1145\/3152494"],"URL":"https:\/\/doi.org\/10.1145\/3152494.3156815","relation":{},"subject":[],"published":{"date-parts":[[2018,1,11]]},"assertion":[{"value":"2018-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}