{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:29:58Z","timestamp":1761294598180,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3584376.3584529","type":"proceedings-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T22:54:51Z","timestamp":1681944891000},"page":"857-861","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Credit Card Fraud Detection Based on GAN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5885-3829","authenticated-orcid":false,"given":"Junwei","family":"Ge","sequence":"first","affiliation":[{"name":"Chongqing University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1428-6997","authenticated-orcid":false,"given":"Xiaobo","family":"Liao","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8907-043X","authenticated-orcid":false,"given":"Yiqiu","family":"Fang","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts &amp; Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_2_1","volume-title":"Bagging predictors [J]. Machine learning","author":"Breiman L.","year":"1996","unstructured":"Breiman L. Bagging predictors [J]. Machine learning , 1996 , 24 (2): 123\u2013140. Breiman L. Bagging predictors [J]. Machine learning, 1996, 24 (2): 123\u2013140."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2010.00358.x"},{"volume-title":"Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning [M]\/\/Advances in Intel-ligent Computing","year":"2005","key":"e_1_3_2_1_4_1","unstructured":"HAN H, WANG W, MAO B. Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning [M]\/\/Advances in Intel-ligent Computing . Berlin Heidelberg : Springer , 2005 : 878-887. HAN H, WANG W, MAO B. Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning [M]\/\/Advances in Intel-ligent Computing. Berlin Heidelberg: Springer, 2005: 878-887."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.056"},{"key":"e_1_3_2_1_6_1","volume-title":"HongKong: IEEE","author":"He H.","year":"2008","unstructured":"He , H. , Bai , Y. , Garcia , E. A. , & Li , S. 2008 , June. ADASYN: Adaptive synthetic sampling approach for imbalanced learning [C]\/\/In 2008 IEEE international joint conference on neural networks . HongKong: IEEE , 2008: 1322-1328. He, H., Bai, Y., Garcia, E. A., & Li, S. 2008, June. ADASYN: Adaptive synthetic sampling approach for imbalanced learning [C]\/\/In 2008 IEEE international joint conference on neural networks. HongKong: IEEE, 2008: 1322-1328."},{"key":"e_1_3_2_1_7_1","volume-title":"Data mining for imbalanced datasets: An overview [J]. Data mining and knowledge discovery handbook","author":"Chawla N V","year":"2009","unstructured":"Chawla N V . Data mining for imbalanced datasets: An overview [J]. Data mining and knowledge discovery handbook , 2009 : 875-886. Chawla N V. Data mining for imbalanced datasets: An overview [J]. Data mining and knowledge discovery handbook, 2009: 875-886."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.030"},{"key":"e_1_3_2_1_9_1","volume-title":"Using Bidirectional GAN with Improved Training Architecture for Imbalanced Tasks [C]\/\/IEEE 24th International Conference on Computer Supported Cooperative Work in Design","author":"Zhang W","year":"2021","unstructured":"Zhang W , Peng P , Zhang H. Using Bidirectional GAN with Improved Training Architecture for Imbalanced Tasks [C]\/\/IEEE 24th International Conference on Computer Supported Cooperative Work in Design . Dalian : IEEE , 2021 : 714-719. Zhang W, Peng P, Zhang H. Using Bidirectional GAN with Improved Training Architecture for Imbalanced Tasks [C]\/\/IEEE 24th International Conference on Computer Supported Cooperative Work in Design. Dalian: IEEE, 2021: 714-719."},{"key":"e_1_3_2_1_10_1","volume-title":"IDA-GAN: A Novel Imbalanced Data Augmentation GAN [C]\/\/25th International Conference on Pattern Recognition","author":"Yang H","year":"2021","unstructured":"Yang H , Zhou Y. IDA-GAN: A Novel Imbalanced Data Augmentation GAN [C]\/\/25th International Conference on Pattern Recognition . Milan : IEEE , 2021 : 8299-8305. Yang H, Zhou Y. IDA-GAN: A Novel Imbalanced Data Augmentation GAN [C]\/\/25th International Conference on Pattern Recognition. Milan: IEEE, 2021: 8299-8305."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994327"},{"key":"e_1_3_2_1_12_1","volume-title":"Generative adversarial nets [C]\/\/Advances in neural information processing systems","author":"Goodfellow I","year":"2014","unstructured":"Goodfellow I , Pouget J , Mirza M. Generative adversarial nets [C]\/\/Advances in neural information processing systems . Montreal : MIT , 2014 : 2672\u20132680. Goodfellow I, Pouget J, Mirza M. Generative adversarial nets [C]\/\/Advances in neural information processing systems. Montreal: MIT, 2014: 2672\u20132680."},{"key":"e_1_3_2_1_13_1","volume-title":"Wasserstein generative adversarial networks [C]\/\/International conference on machine learning","author":"Arjovsky M","year":"2017","unstructured":"Arjovsky M , Chintala S , Bottou L. Wasserstein generative adversarial networks [C]\/\/International conference on machine learning . Sy-dney : PMLR , 2017 : 214-223. Arjovsky M, Chintala S, Bottou L. Wasserstein generative adversarial networks [C]\/\/International conference on machine learning. Sy-dney: PMLR, 2017: 214-223."},{"key":"e_1_3_2_1_14_1","volume-title":"Improved training of wasserstein gans [J]. Advances in neural information processing systems","author":"Gulrajani I","year":"2017","unstructured":"Gulrajani I , Ahmed F , Arjovsky M , Improved training of wasserstein gans [J]. Advances in neural information processing systems , 2017 : 30. Gulrajani I, Ahmed F, Arjovsky M, Improved training of wasserstein gans [J]. Advances in neural information processing systems, 2017: 30."},{"key":"e_1_3_2_1_15_1","unstructured":"Mirza M Osindero S. Conditional generative adversarial nets [EB\/OL]. 2014-11-6. https:\/\/arxiv.org\/abs\/1411.1784  Mirza M Osindero S. Conditional generative adversarial nets [EB\/OL]. 2014-11-6. https:\/\/arxiv.org\/abs\/1411.1784"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"volume-title":"Electronics and Mobile Communication Conference. Columbia: IEEE","author":"Chen J","key":"e_1_3_2_1_17_1","unstructured":"Chen J , Shen Y , Ali R. Credit card fraud detection using sparse autoencoder and generative adversarial network [C]\/\/IEEE 9th Annual Information Technology , Electronics and Mobile Communication Conference. Columbia: IEEE , 2018: 1054-10 Chen J, Shen Y, Ali R. Credit card fraud detection using sparse autoencoder and generative adversarial network [C]\/\/IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference. Columbia: IEEE, 2018: 1054-10"}],"event":{"name":"RICAI 2022: 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","acronym":"RICAI 2022","location":"Dongguan China"},"container-title":["Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584376.3584529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:43Z","timestamp":1750182703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":17,"alternative-id":["10.1145\/3584376.3584529","10.1145\/3584376"],"URL":"https:\/\/doi.org\/10.1145\/3584376.3584529","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}