{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:51:54Z","timestamp":1761648714211,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369082","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Fraud detection in credit card transaction using neural networks"],"prefix":"10.1145","author":[{"given":"Imane","family":"Sadgali","sequence":"first","affiliation":[{"name":"University Hassan II, Casablanca, Morocco"}]},{"given":"Nawal","family":"Sael","sequence":"additional","affiliation":[{"name":"University Hassan II, Casablanca, Morocco"}]},{"given":"Faouzia","family":"Benabbou","sequence":"additional","affiliation":[{"name":"University Hassan II, Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"issue":"11","key":"e_1_3_2_1_1_1","first-page":"76","article-title":"Detection of credit card fraud: State of art","volume":"18","author":"Sadgali I.","year":"2018","unstructured":"I. Sadgali , N. Sael , F. Benabbou , \" Detection of credit card fraud: State of art \", International Journal of computer science and network security , Vol. 18 , No. 11 , pp. 76 - 83 , 2018 . I. Sadgali, N. Sael, F. Benabbou, \"Detection of credit card fraud: State of art\", International Journal of computer science and network security, Vol.18, No.11, pp.76-83, 2018.","journal-title":"International Journal of computer science and network security"},{"key":"e_1_3_2_1_2_1","unstructured":"\"ACFE Association of Fraud Examiners Certificates \" (Date last accessed 15-July-2014). [Online]. Available: http:\/\/www.acfe.com\/uploadedfiles\/acfewebsite\/content\/documents\/rttn-2010.pdf.  \"ACFE Association of Fraud Examiners Certificates \" (Date last accessed 15-July-2014). [Online]. Available: http:\/\/www.acfe.com\/uploadedfiles\/acfewebsite\/content\/documents\/rttn-2010.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/13590790810907236"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229897"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.110"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference, 383--387","author":"Adali A.","year":"2017","unstructured":"A. Mubalik (Mubarek) and E. Adali , \" Multilayer Perception Neural network technique for fraud detection\", IEEE, Computer Science and Engineering (UBMK) , International Conference, 383--387 , 2017 . A.Mubalik (Mubarek) and E.Adali, \"Multilayer Perception Neural network technique for fraud detection\", IEEE, Computer Science and Engineering (UBMK), International Conference, 383--387, 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"arXiv","author":"Zanin M.","year":"1953","unstructured":"M. Zanin , M. Romance , S. Moral and R. Criado , \" Credit card fraud detection through parenclitic network analysis\" , arXiv ; 1706.0 1953 v1, 1--8, 2017. M.Zanin, M.Romance, S.Moral and R.Criado, \"Credit card fraud detection through parenclitic network analysis\", arXiv; 1706.01953v1, 1--8, 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.06.042"},{"key":"e_1_3_2_1_11_1","volume-title":"A Hybrid Framework with Big Data Technologies","author":"Dai Y.","year":"2016","unstructured":"Y. Dai , J. Yan , X. Tang , H. Zhao and M. Guo , \" Online Credit Card Fraud Detection : A Hybrid Framework with Big Data Technologies \", IEEE , Trustcom\/BigDataSE\/ ISPA , 1644--1652, 2016 . Y.Dai, J.Yan, X.Tang, H.Zhao and M.Guo, \"Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies\", IEEE, Trustcom\/BigDataSE\/ISPA, 1644--1652, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"Third International Conference","author":"Malini N.","year":"2017","unstructured":"N. Malini and M. Pushpa , \" Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection\", IEEE, Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) , Third International Conference , 2017 . N.Malini and M.Pushpa, \"Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection\", IEEE, Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Third International Conference, 2017."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_14_1","volume-title":"Systems and Information Engineering Design Symposium (SIEDS), 112--116","author":"Zeager M.F.","year":"2017","unstructured":"M.F. Zeager , A. Sridhar , N. Fogal , S. Adams , D.E. Brown , and P.A. Beling , \" Adversarial Learning in Credit Card Fraud Detection\", IEEE , Systems and Information Engineering Design Symposium (SIEDS), 112--116 , 2017 . M.F.Zeager, A.Sridhar, N.Fogal, S.Adams, D.E.Brown, and P.A.Beling, \"Adversarial Learning in Credit Card Fraud Detection\", IEEE, Systems and Information Engineering Design Symposium (SIEDS), 112--116, 2017."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J.Shaji D.Panchal \"Improved Fraud Detection in e-Commerce Transactions\" IEEE Communication Systems Computing and IT Applications (CSCITA) 121--126 2017.  J.Shaji D.Panchal \"Improved Fraud Detection in e-Commerce Transactions\" IEEE Communication Systems Computing and IT Applications (CSCITA) 121--126 2017.","DOI":"10.1109\/CSCITA.2017.8066537"},{"key":"e_1_3_2_1_16_1","article-title":"An Assessment of Streaming Active Learning Strategies for Real-Life Credit Card Fraud Detection","author":"Carcillo F.","year":"2017","unstructured":"F. Carcillo , Y. Le Borgne , O. Caelen and G. Bontempi , \" An Assessment of Streaming Active Learning Strategies for Real-Life Credit Card Fraud Detection \", Springer, International Journal of Data Science and Analytics, 1--16 , 2017 . F.Carcillo, Y.Le Borgne, O.Caelen and G.Bontempi, \"An Assessment of Streaming Active Learning Strategies for Real-Life Credit Card Fraud Detection\", Springer, International Journal of Data Science and Analytics, 1--16, 2017.","journal-title":"Springer, International Journal of Data Science and Analytics, 1--16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254499"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2013.785791"},{"key":"e_1_3_2_1_19_1","volume-title":"Electronics and Communication (CTCEEC)","author":"Devi J. Vimala","year":"2017","unstructured":"J. Vimala Devi , K.S. Kavitha , \" Fraud Detection in Credit Card Transactions by using Classification Algorithms\", nternational Conference on Current Trends in Computer, Electrical , Electronics and Communication (CTCEEC) , 2017 . J. Vimala Devi, K.S. Kavitha, \"Fraud Detection in Credit Card Transactions by using Classification Algorithms\", nternational Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017."},{"key":"e_1_3_2_1_20_1","volume-title":"Communication and Bio-Informatics (AEEICB)","author":"Malini N.","year":"2017","unstructured":"N. Malini , M. Pushpa , \" Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection\", IEEE, Advances in Electrical, Electronics, Information , Communication and Bio-Informatics (AEEICB) , 2017 . N.Malini, M.Pushpa, \"Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection\", IEEE, Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"Statistical Learning Theory","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik , Statistical Learning Theory , Wiley , New York , 1998 . V. Vapnik, Statistical Learning Theory, Wiley, New York, 1998."},{"key":"e_1_3_2_1_22_1","volume-title":"Cambridge University Press","author":"Cristianini N.","year":"2000","unstructured":"N. Cristianini , J. Shawe-Taylor , \" An Introduction to Support Vector Machines and Other Kernel-based Learning Methods\" , Cambridge University Press , 2000 . N. Cristianini, J. Shawe-Taylor, \"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods\", Cambridge University Press, 2000."},{"key":"e_1_3_2_1_23_1","unstructured":"https:\/\/medium.freecodecamp.org\/machine-learning-mean-squared-error-regression-line-c7dde9a26b93  https:\/\/medium.freecodecamp.org\/machine-learning-mean-squared-error-regression-line-c7dde9a26b93"},{"key":"e_1_3_2_1_24_1","volume-title":"Conference on Credit Scoring and Credit Control","author":"Bolton R.J.","year":"2001","unstructured":"R.J. Bolton , D.J. Hand , \"Unsupervised profiling methods for fraud detection \", Conference on Credit Scoring and Credit Control , Edinburgh , 2001 . R.J. Bolton, D.J. Hand, \"Unsupervised profiling methods for fraud detection\", Conference on Credit Scoring and Credit Control, Edinburgh, 2001."},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Intelligent Computing and Control (I2C2'17)","author":"Modi K.","year":"2017","unstructured":"K. Modi , R. Dayma , \" Review On Fraud Detection Methods in Credit Card Transactions\", IEEE , International Conference on Intelligent Computing and Control (I2C2'17) , 2017 . K. Modi, R. Dayma, \"Review On Fraud Detection Methods in Credit Card Transactions\", IEEE, International Conference on Intelligent Computing and Control (I2C2'17), 2017."},{"key":"e_1_3_2_1_26_1","unstructured":"Michael Nielsen (2017 March 15) Deep learning available http:\/\/neuralnetworksanddeeplearning.com\/chap6.html  Michael Nielsen (2017 March 15) Deep learning available http:\/\/neuralnetworksanddeeplearning.com\/chap6.html"},{"key":"e_1_3_2_1_27_1","volume-title":"Springer International Publishing AG","author":"Fu Kang","year":"2016","unstructured":"Kang Fu , Dawei Cheng , Yi Tu , and Liqing Zhang , \" Credit Card Fraud Detection Using Convolutional Neural Networks\" , Springer International Publishing AG 2016 . Kang Fu, Dawei Cheng, Yi Tu, and Liqing Zhang, \"Credit Card Fraud Detection Using Convolutional Neural Networks\", Springer International Publishing AG 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Prakash O Khan F Sangwan RS Misra L. ANN-QSAR model for virtual screening of androstenedione C-skeleton containing phytomolecules and analogues for cytotoxic activity against human breast cancer cell line MCF-7. Comb Chem High Throughput Screen; 16: 57--72 2013.  Prakash O Khan F Sangwan RS Misra L. ANN-QSAR model for virtual screening of androstenedione C-skeleton containing phytomolecules and analogues for cytotoxic activity against human breast cancer cell line MCF-7. Comb Chem High Throughput Screen; 16: 57--72 2013.","DOI":"10.2174\/1386207311316010008"},{"key":"e_1_3_2_1_29_1","volume-title":"IEEE International Conference on (pp. 8624--8628)","author":"R.","year":"2013","unstructured":"Bengio, Y., Boulanger-Lewandowski, N., & Pascanu, R. ( 2013 , May). Advances in optimizing recurrent networks. In Acoustics, Speech and Signal Processing (ICASSP) , IEEE International Conference on (pp. 8624--8628) , 2013. Bengio, Y., Boulanger-Lewandowski, N., & Pascanu, R. (2013, May). Advances in optimizing recurrent networks. In Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference on (pp. 8624--8628), 2013."},{"key":"e_1_3_2_1_30_1","first-page":"129","volume-title":"Proc. of International Conference Systems and Information Engineering Design Symposium (SIEDS)","author":"Roy A.","year":"2018","unstructured":"A. Roy , J. Sun , R. Mahoney , L. Alonzi , S. Adams , P. Beling , \" Deep Learning Detecting Fraud in Credit Card Transactions\" , In: Proc. of International Conference Systems and Information Engineering Design Symposium (SIEDS) , Charlottesville, VA, USA , pp. 129 -- 134 , 2018 . A. Roy, J. Sun, R. Mahoney, L. Alonzi, S. Adams, P. Beling, \"Deep Learning Detecting Fraud in Credit Card Transactions\", In: Proc. of International Conference Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, pp.129-- 134, 2018."},{"key":"e_1_3_2_1_31_1","volume-title":"San Diego","author":"M.","year":"2000","unstructured":"Han, J., & Camber, M. \"Data mining concepts and techniques\". San Diego , USA : Morgan Kaufman , 2000 . Han, J., & Camber, M. \"Data mining concepts and techniques\". San Diego, USA: Morgan Kaufman, 2000."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"key":"e_1_3_2_1_33_1","unstructured":"https:\/\/www.udemy.com\/machine-learning-with-tensorflow-for-business-intelligence\/learn\/lecture\/8447970#overview  https:\/\/www.udemy.com\/machine-learning-with-tensorflow-for-business-intelligence\/learn\/lecture\/8447970#overview"}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":33,"alternative-id":["10.1145\/3368756.3369082","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369082","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}