{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:29:01Z","timestamp":1761294541011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,2]]},"DOI":"10.1145\/3533271.3561723","type":"proceedings-article","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T22:20:22Z","timestamp":1666304422000},"page":"123-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Fraud Generation for Improved Detection"],"prefix":"10.1145","author":[{"given":"Anubha","family":"Pandey","sequence":"first","affiliation":[{"name":"Mastercard, IN"}]},{"given":"Alekhya","family":"Bhatraju","sequence":"additional","affiliation":[{"name":"Mastercard, IN"}]},{"given":"Shiv","family":"Markam","sequence":"additional","affiliation":[{"name":"Mastercard, IN"}]},{"given":"Deepak","family":"Bhatt","sequence":"additional","affiliation":[{"name":"Mastercard, IN"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2018.06.009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2003.158005"},{"key":"e_1_3_2_1_3_1","unstructured":"Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein gan. arXiv preprint arXiv:1701.07875(2017).  Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein gan. arXiv preprint arXiv:1701.07875(2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Hung Ba. 2019. Improving Detection of Credit Card Fraudulent Transactions using Generative Adversarial Networks. arXiv preprint arXiv:1907.03355(2019).  Hung Ba. 2019. Improving Detection of Credit Card Fraudulent Transactions using Generative Adversarial Networks. arXiv preprint arXiv:1907.03355(2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-011-0287-y"},{"key":"e_1_3_2_1_6_1","unstructured":"Fabrizio Carcillo Yann-A\u00ebl Le\u00a0Borgne Olivier Caelen Yacine Kessaci Fr\u00e9d\u00e9ric Obl\u00e9 and Gianluca Bontempi. 2019. Combining unsupervised and supervised learning in credit card fraud detection. Information Sciences(2019).  Fabrizio Carcillo Yann-A\u00ebl Le\u00a0Borgne Olivier Caelen Yacine Kessaci Fr\u00e9d\u00e9ric Obl\u00e9 and Gianluca Bontempi. 2019. Combining unsupervised and supervised learning in credit card fraud detection. Information Sciences(2019)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_8_1","volume-title":"Credit card fraud detection: a realistic modeling and a novel learning strategy","author":"Dal\u00a0Pozzolo Andrea","year":"2017","unstructured":"Andrea Dal\u00a0Pozzolo , Giacomo Boracchi , Olivier Caelen , Cesare Alippi , and Gianluca Bontempi . 2017. Credit card fraud detection: a realistic modeling and a novel learning strategy . IEEE transactions on neural networks and learning systems 29, 8( 2017 ), 3784\u20133797. Andrea Dal\u00a0Pozzolo, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. 2017. Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE transactions on neural networks and learning systems 29, 8(2017), 3784\u20133797."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.01.057"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.030"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2019.113003"},{"key":"e_1_3_2_1_13_1","unstructured":"Xin Guo Johnny Hong Tianyi Lin and Nan Yang. 2017. Relaxed wasserstein with applications to gans. arXiv preprint arXiv:1705.07164(2017).  Xin Guo Johnny Hong Tianyi Lin and Nan Yang. 2017. Relaxed wasserstein with applications to gans. arXiv preprint arXiv:1705.07164(2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"e_1_3_2_1_15_1","volume-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks","author":"He Haibo","year":"2008","unstructured":"Haibo He , Yang Bai , Edwardo\u00a0 A Garcia , and Shutao Li . 2008 . ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence). IEEE , 1322\u20131328. Haibo He, Yang Bai, Edwardo\u00a0A Garcia, and Shutao Li. 2008. ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence). IEEE, 1322\u20131328."},{"key":"e_1_3_2_1_16_1","volume-title":"KDD 2017 Workshop on Anomaly Detection in Finance. PMLR, 76\u201384","author":"Ki Youngjoon","year":"2018","unstructured":"Youngjoon Ki and Ji\u00a0Won Yoon . 2018 . PD-FDS: purchase density based online credit card fraud detection system . In KDD 2017 Workshop on Anomaly Detection in Finance. PMLR, 76\u201384 . Youngjoon Ki and Ji\u00a0Won Yoon. 2018. PD-FDS: purchase density based online credit card fraud detection system. In KDD 2017 Workshop on Anomaly Detection in Finance. PMLR, 76\u201384."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.03.042"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.219"},{"key":"e_1_3_2_1_20_1","unstructured":"Xuetong Niu Li Wang and Xulei Yang. 2019. A comparison study of credit card fraud detection: Supervised versus unsupervised. arXiv preprint arXiv:1904.10604(2019).  Xuetong Niu Li Wang and Xulei Yang. 2019. A comparison study of credit card fraud detection: Supervised versus unsupervised. arXiv preprint arXiv:1904.10604(2019)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ahmet\u00a0Murat Ozbayoglu Mehmet\u00a0Ugur Gudelek and Omer\u00a0Berat Sezer. 2020. Deep learning for financial applications: A survey. Applied Soft Computing(2020) 106384.  Ahmet\u00a0Murat Ozbayoglu Mehmet\u00a0Ugur Gudelek and Omer\u00a0Berat Sezer. 2020. Deep learning for financial applications: A survey. Applied Soft Computing(2020) 106384.","DOI":"10.1016\/j.asoc.2020.106384"},{"key":"e_1_3_2_1_22_1","unstructured":"Anubha Pandey Deepak Bhatt and Tanmoy Bhowmik. 2020. Limitations and Applicability of GANs in Banking Domain.. In ADGN@ ECAI.  Anubha Pandey Deepak Bhatt and Tanmoy Bhowmik. 2020. Limitations and Applicability of GANs in Banking Domain.. In ADGN@ ECAI."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2018.8777628"},{"key":"e_1_3_2_1_25_1","unstructured":"Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. arXiv preprint arXiv:1804.00792(2018).  Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. arXiv preprint arXiv:1804.00792(2018)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015600"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2018.8361343"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yusuf Yazici. 2020. Approaches to Fraud Detection on Credit Card Transactions Using Artificial Intelligence Methods. arXiv preprint arXiv:2007.14622(2020).  Yusuf Yazici. 2020. Approaches to Fraud Detection on Credit Card Transactions Using Artificial Intelligence Methods. arXiv preprint arXiv:2007.14622(2020).","DOI":"10.5121\/csit.2020.101018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852295"},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Machine Learning. PMLR, 7614\u20137623","author":"Zhu Chen","year":"2019","unstructured":"Chen Zhu , W\u00a0Ronny Huang , Hengduo Li , Gavin Taylor , Christoph Studer , and Tom Goldstein . 2019 . Transferable clean-label poisoning attacks on deep neural nets . In International Conference on Machine Learning. PMLR, 7614\u20137623 . Chen Zhu, W\u00a0Ronny Huang, Hengduo Li, Gavin Taylor, Christoph Studer, and Tom Goldstein. 2019. Transferable clean-label poisoning attacks on deep neural nets. In International Conference on Machine Learning. PMLR, 7614\u20137623."}],"event":{"name":"ICAIF '22: 3rd ACM International Conference on AI in Finance","sponsor":["ACM Association for Computing Machinery"],"location":"New York NY USA","acronym":"ICAIF '22"},"container-title":["Proceedings of the Third ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533271.3561723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533271.3561723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:38Z","timestamp":1750186838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533271.3561723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":31,"alternative-id":["10.1145\/3533271.3561723","10.1145\/3533271"],"URL":"https:\/\/doi.org\/10.1145\/3533271.3561723","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}