{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:02:14Z","timestamp":1755838934613,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377113","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Credit Card Fraud Detection using Data Pre-processing on Imbalanced Data - both Oversampling and Undersampling"],"prefix":"10.1145","author":[{"given":"Jalal","family":"Ahammad","sequence":"first","affiliation":[{"name":"Stamford University Bangladesh, Dhaka, Bangladesh"}]},{"given":"Nazia","family":"Hossain","sequence":"additional","affiliation":[{"name":"Stamford University Bangladesh, Dhaka, Bangladesh"}]},{"given":"Mohammad Shafiul","family":"Alam","sequence":"additional","affiliation":[{"name":"Ahsanullah University of Science and Technology, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. 24 Best Ecommerce Retail Datasets for Machine Learning | Lionbridge AI. https:\/\/lionbridge.ai\/datasets\/24-best-ecommerce- retail- datasets- for- machine-learning\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Decision Trees-A simple way to visualize a decision. https:\/\/medium.com\/greyatom\/decision-trees-a-simple-way-to-visualize-a-decision-dc506a403aeb"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.47"},{"key":"e_1_3_2_1_4_1","unstructured":"Astha Agrawal Herna L Viktor and Eric Paquet. [n.d.]. SCUT: Multi-Class Imbalanced Data Classification using SMOTE and Cluster-based Undersampling."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-015-9339-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16841-4_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2014.7058074"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.026"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Jon T S Quah and M Sriganesh. [n.d.]. Real-time credit card fraud detection using computational intelligence. ([n. d.]). https:\/\/doi.org\/10.1016\/j.eswa.2007.08.093","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2010.5734099"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70228"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2057192"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2187280"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Shiyang Xuan Guanjun Liu and Zhenchuan Li. 2018. Refined weighted random forest and its application to credit card fraud detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11280 LNCS 343--355. https:\/\/doi.org\/10.1007\/978-3-030-04648-4_29","DOI":"10.1007\/978-3-030-04648-4_29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2012.02.147"}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:38Z","timestamp":1750202618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":17,"alternative-id":["10.1145\/3377049.3377113","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377113","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}