{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:50:41Z","timestamp":1769302241932,"version":"3.49.0"},"reference-count":55,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T00:00:00Z","timestamp":1603929600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2018R1A4A1025632"],"award-info":[{"award-number":["2018R1A4A1025632"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2020,10,29]]},"abstract":"<jats:p>An effective machine learning implementation means that artificial intelligence has tremendous potential to help and automate financial threat assessment for commercial firms and credit agencies. The scope of this study is to build a predictive framework to help the credit bureau by modelling\/assessing the credit card delinquency risk. Machine learning enables risk assessment by predicting deception in large imbalanced data by classifying the transaction as normal or fraudster. In case of fraud transaction, an alert can be sent to the related financial organization that can suspend the release of payment for particular transaction. Of all the machine learning models such as RUSBoost, decision tree, logistic regression, multilayer perceptron, K-nearest neighbor, random forest, and support vector machine, the overall predictive performance of customized RUSBoost is the most impressive. The evaluation metrics used in the experimentation are sensitivity, specificity, precision, F scores, and area under receiver operating characteristic and precision recall curves. Datasets used for training and testing of the models have been taken from kaggle.com.<\/jats:p>","DOI":"10.1155\/2020\/8885269","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T18:35:14Z","timestamp":1604082914000},"page":"1-13","source":"Crossref","is-referenced-by-count":34,"title":["Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6081-7555","authenticated-orcid":true,"given":"Vinay","family":"Arora","sequence":"first","affiliation":[{"name":"Computer Science & Engineering Department, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6791-6310","authenticated-orcid":true,"given":"Rohan Singh","family":"Leekha","sequence":"additional","affiliation":[{"name":"Associate Application Support, IT-App Development\/Maintenance, Concentrix, Gurugram, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1477-7569","authenticated-orcid":true,"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Computer Software, Daegu Catholic University, Gyeongsan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5634-3465","authenticated-orcid":true,"given":"Aman","family":"Kataria","sequence":"additional","affiliation":[{"name":"Optical Devices and Systems (Visiting Research Scholar), CSIR-CSIO, Chandigarh, India"}]}],"member":"311","reference":[{"issue":"2","key":"1","first-page":"57","article-title":"Credit card fraud and detection techniques: a review","volume":"4","author":"L. Delamaire","year":"2009","journal-title":"Banks and Bank Systems"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCET.2011.5762457"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1080\/23080477.2020.1783491"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2010.5705824"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040692"},{"key":"7","article-title":"InterWeave payment gateway, CreatioMarketplace","year":"2020"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9330-3_9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.005"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.037"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2818163"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.1352"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2019.2959108"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00405-6_28"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960027"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102364"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2012.2215851"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1111\/1539-6975.00024"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1994.323314"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/72.595879"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.675496"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.1999.809773"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.143"},{"key":"25","first-page":"261","article-title":"Credit card fraud detection using Bayesian and neural networks","author":"S. Maes"},{"key":"26","first-page":"83","article-title":"Credit card fraud detection using meta-learning","author":"S. J. Stolfo"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.043"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1142\/s0218001406004624"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.1.3375.5284"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.026"},{"key":"32","first-page":"435","article-title":"Cost-sensitive learning by cost-proportionate example weighting","author":"B. Zadrozny"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/5254.809570"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23957-1_12"},{"key":"35","article-title":"Detecting credit card fraud by decision trees and support vector machines","author":"E. Duman"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.262"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.168"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.021"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol6.issue1.8"},{"key":"41","article-title":"Fuzzy darwinian detection of credit card fraud","author":"P. J. Bentley"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41278-3_4"},{"issue":"4","key":"43","first-page":"229","article-title":"Proposal of credit card fraudulent use detection by online-type decision tree construction and verification of generality","volume":"1","author":"T. Minegishi","year":"2011","journal-title":"International Journal for Information Security Research (IJISR)"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/252797"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.011"},{"issue":"1","key":"46","first-page":"1","article-title":"Credit card fraud detection using naive Bayesian and C4.5 decision tree classifiers","volume":"8","author":"A. Husejinovic","year":"2020","journal-title":"Periodicals of Engineering and Natural Sciences"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.153"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761297"},{"key":"50","article-title":"Abstract data set for credit card fraud detection","author":"S. Joshi","year":"2020"},{"key":"51","article-title":"Default of credit card clients dataset","author":"U. M. Learning","year":"2016"},{"key":"52","article-title":"Credit card fraud detection","author":"M. L. G. ULB","year":"2018"},{"key":"53","article-title":"Default","author":"J. Chen","year":"2020"},{"key":"54","first-page":"2","article-title":"Predictive accuracy: a misleading performance measure for highly imbalanced data","author":"J. Akosa"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1142\/s0217984919503214"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8885269.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8885269.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8885269.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T18:35:23Z","timestamp":1604082923000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2020\/8885269\/"}},"subtitle":[],"editor":[{"given":"Zengpeng","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,29]]},"references-count":55,"alternative-id":["8885269","8885269"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8885269","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,29]]}}}