{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:33:49Z","timestamp":1775421229469,"version":"3.50.1"},"reference-count":48,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"vor","delay-in-days":202,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072131"],"award-info":[{"award-number":["62072131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672020"],"award-info":[{"award-number":["61672020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732004"],"award-info":[{"award-number":["61732004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732022"],"award-info":[{"award-number":["61732022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Credit card fraud detection (CCFD) is important for protecting the cardholder\u2019s property and the reputation of banks. Class imbalance in credit card transaction data is a primary factor affecting the classification performance of current detection models. However, prior approaches are aimed at improving the prediction accuracy of the minority class samples (fraudulent transactions), but this usually leads to a significant drop in the model\u2019s predictive performance for the majority class samples (legal transactions), which greatly increases the investigation cost for banks. In this paper, we propose a heterogeneous ensemble learning model based on data distribution (HELMDD) to deal with imbalanced data in CCFD. We validate the effectiveness of HELMDD on two real credit card datasets. The experimental results demonstrate that compared with current state\u2010of\u2010the\u2010art models, HELMDD has the best comprehensive performance. HELMDD not only achieves good recall rates for both the minority class and the majority class but also increases the savings rate for banks to 0.8623 and 0.6696, respectively.<\/jats:p>","DOI":"10.1155\/2021\/2531210","type":"journal-article","created":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T22:50:09Z","timestamp":1626994209000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A Heterogeneous Ensemble Learning Model Based on Data Distribution for Credit Card Fraud Detection"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9986-1756","authenticated-orcid":false,"given":"Yalong","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3335-0093","authenticated-orcid":false,"given":"Aiping","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5384-6219","authenticated-orcid":false,"given":"Liqun","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3835-4272","authenticated-orcid":false,"given":"Ziniu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2856910"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927266"},{"key":"e_1_2_11_3_2","doi-asserted-by":"crossref","unstructured":"PriscillaC. V.andPrabhaD. P. Influence of optimizing XGBoost to handle class imbalance in credit card fraud detection 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) August 2020 Tirunelveli TN India 1309\u20131315 https:\/\/doi.org\/10.1109\/icssit48917.2020.9214206.","DOI":"10.1109\/ICSSIT48917.2020.9214206"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"SohonyI. PratapR. andNambiarU. Ensemble learning for credit card fraud detection 2018 Proceedings of the ACM India Joint International Conference on Data Science and Management of Data (CoDS-COMAD) January 2018 Panaji Goa India 289\u2013294 https:\/\/doi.org\/10.1145\/3152494.3156815 2-s2.0-85044390668.","DOI":"10.1145\/3152494.3156815"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.037"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.007"},{"key":"e_1_2_11_10_2","unstructured":"ChanP. K.andStolfoS. J. Toward scalable learning with non-uniform class and cost distributions: a case study in credit card fraud detection Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD) August 1998 New York NY USA 164\u2013168."},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"OmarS. J. FredK. andSwaibK. K. A state-of-the-art review of machine learning techniques for fraud detection research Proceedings of the 2018 International Conference on Software Engineering in Africa (ICSE) May 2018 Gothenburg GOT Sweden 11\u201319 https:\/\/doi.org\/10.1145\/3195528.3195534 2-s2.0-85051481236.","DOI":"10.1145\/3195528.3195534"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.042"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"BhusariV.andPatilS. Study of hidden Markov model in credit card fraudulent detection 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave) February 2016 Coimbatore India 1\u20134 https:\/\/doi.org\/10.1109\/startup.2016.7583942 2-s2.0-84994128726.","DOI":"10.1109\/STARTUP.2016.7583942"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.018"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102596"},{"key":"e_1_2_11_16_2","doi-asserted-by":"crossref","unstructured":"WangH. ZhuP. ZouX. andQinS. An ensemble learning framework for credit card fraud detection based on training set partitioning and clustering 2018 IEEE SmartWorld Ubiquitous Intelligence Computing Advanced Trusted Computing Scalable Computing Communications Cloud Big Data Computing Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBD) October 2018 Guangzhou GZ China 94\u201398 https:\/\/doi.org\/10.1109\/smartworld.2018.00051 2-s2.0-85060309691.","DOI":"10.1109\/SmartWorld.2018.00051"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2008.04.001"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.021"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.014"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"RushinG. StancilC. SunM. AdamsS. andBelingP. Horse race analysis in credit card fraud\u2014deep learning logistic regression and gradient boosted tree 2017 Systems and Information Engineering Design Symposium (SIEDS) April 2017 Charlottesville VA USA 117\u2013121 https:\/\/doi.org\/10.1109\/sieds.2017.7937700 2-s2.0-85025590349.","DOI":"10.1109\/SIEDS.2017.7937700"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.06.042"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"CarcilloF. BorgneY.-A. L. CaelenO. andBontempiG. An assessment of streaming active learning strategies for real-life credit card fraud detection 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA) October 2017 Tokyo TKY Japan 631\u2013639 https:\/\/doi.org\/10.1109\/dsaa.2017.10 2-s2.0-85046290819.","DOI":"10.1109\/DSAA.2017.10"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.023"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.036"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"ZhangF. LiuG. LiZ. YanC. andJiangC. GMM-based undersampling and its application for credit card fraud detection 2019 International Joint Conference on Neural Networks (IJCNN) July 2019 Budapest BP Hungary 1\u20138 https:\/\/doi.org\/10.1109\/ijcnn.2019.8852415 2-s2.0-85073258912.","DOI":"10.1109\/IJCNN.2019.8852415"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.012"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.004"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2019.6.3498"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"ArmelA.andZaidouniD. Fraud detection using apache spark 2019 5th International Conference on Optimization and Applications (ICOA) April 2019 Kenitra Morocco 1\u20136 https:\/\/doi.org\/10.1109\/icoa.2019.8727610 2-s2.0-85068068551.","DOI":"10.1109\/ICOA.2019.8727610"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.03.042"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2970805"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.029"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113155"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.013"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.028"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.030"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.09.005"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_2_11_40_2","doi-asserted-by":"crossref","unstructured":"HanH. WangW.-Y. andMaoB.-H. Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning Advances in Intelligent Computing International Conference on Intelligent Computing (ICIC) August 2005 Hefei China 878\u2013887 https:\/\/doi.org\/10.1007\/11538059_91.","DOI":"10.1007\/11538059_91"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.02.011"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.062"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.11.099"},{"key":"e_1_2_11_44_2","doi-asserted-by":"crossref","unstructured":"BahnsenA. C. AouadaD. andOtterstenB. Example-dependent cost-sensitive logistic regression for credit scoring 13th International Conference on Machine Learning and Applications (ICMLA) December 2014 Detroit MI USA 263\u2013269 https:\/\/doi.org\/10.1109\/icmla.2014.48 2-s2.0-84946692991.","DOI":"10.1109\/ICMLA.2014.48"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2018.06.009"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.06.011"},{"key":"e_1_2_11_47_2","unstructured":"Kaggle Kaggle November 2020 https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud."},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.030"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/2531210.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/2531210.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/2531210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:32:12Z","timestamp":1723037532000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/2531210"}},"subtitle":[],"editor":[{"given":"Shan","family":"Zhong","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/2531210"],"URL":"https:\/\/doi.org\/10.1155\/2021\/2531210","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-06-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2531210"}}