{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:06:24Z","timestamp":1775815584530,"version":"3.50.1"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T00:00:00Z","timestamp":1655424000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2022,6,17]]},"abstract":"<jats:p>The usage of credit cards is increasing daily for online transactions to buy and sell goods, and this has also increased the frequency of online credit card fraud. Credit card fraud has become a serious issue for financial institutions over the last decades. Recent research has developed a machine learning (ML)-based credit card fraud transaction system, but due to the high dimensionality of the feature vector and the issue of class imbalance in any credit card dataset, there is a need to adopt optimization techniques. In this paper, a new methodology has been proposed for detecting credit card fraud (financial fraud) that is a hybridization of the firefly bio-inspired optimization algorithm and a support vector machine (called FFSVM), which comprises two sequential levels. In the first level, the firefly algorithm (FFA) and the CfsSubsetEval feature section method have been applied to optimize the subset of features, while in the second level, the support vector machine classifier has been used to build the training model for the detection of credit card fraud cases. Furthermore, a comparative study has been performed between the proposed approach and the existing techniques. The proposed approach has achieved an accuracy of 85.65% and successfully classified 591 transactions, which is far better than the existing techniques. The proposed approach has enhanced classification accuracy, reduced incorrect classification of credit card transactions, and reduced misclassification costs. The evaluation results show that the proposed FFSVM method outperforms other nonoptimization machine learning techniques.<\/jats:p>","DOI":"10.1155\/2022\/1468015","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T18:20:18Z","timestamp":1655490018000},"page":"1-10","source":"Crossref","is-referenced-by-count":49,"title":["Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5409-8443","authenticated-orcid":true,"given":"Ajeet","family":"Singh","sequence":"first","affiliation":[{"name":"University School of Information Communication and Technology, Guru Govind Singh Indraprastha University, Delhi, India"}]},{"given":"Anurag","family":"Jain","sequence":"additional","affiliation":[{"name":"University School of Information Communication and Technology, Guru Govind Singh Indraprastha University, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1743-6105","authenticated-orcid":true,"given":"Seblewongel Esseynew","family":"Biable","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Debre Berhan University, Debre Birhan, Ethiopia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","article-title":"An investigation on experimental issues in financial fraud mining","author":"J. West","DOI":"10.1109\/ICIEA.2016.7603878"},{"key":"2","article-title":"Payments companies are trying to fix the massive credit-card fraud problem","author":"B. Insider","year":"2019"},{"key":"3","article-title":"Global economic crime survey 2016","author":"Pwc","year":"2018"},{"key":"4","article-title":"Card fraud worldwide","author":"Nilson report 2016","year":"2018"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5120\/8184-1538"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/icices.2016.7518889"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2020.1809090"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/iciccs48265.2020.9120957"},{"key":"9","article-title":"FraudMiner: a novel credit card fraud detection model","volume":"10","author":"K. R. Seeja","year":"2014","journal-title":"Science World Journal"},{"key":"10","doi-asserted-by":"crossref","article-title":"Adaptive credit card fraud detection techniques based on feature selection method","author":"A. Singh","DOI":"10.1007\/978-981-13-6861-5_15"},{"key":"11","article-title":"A survey of bio inspired optimization algorithm","volume":"2","author":"S. Binitha","year":"2012","journal-title":"International Journal of soft computing and engineering (IJSCE)"},{"key":"12","first-page":"169","article-title":"Firefly algorithms for multimodal optimization","author":"Y. X. She"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"14","first-page":"113","article-title":"Real-time credit-card fraud detection using artificial neural network tuned by simulated annealing algorithm","author":"A. U. S. Khan"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040662"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11050756"},{"key":"17","first-page":"1","article-title":"Detecting credit card fraud by decision trees and support vector machines","author":"Y. Sahin"},{"key":"18","doi-asserted-by":"crossref","first-page":"62","DOI":"10.4156\/jcit.vol6.issue1.8","article-title":"Research on credit card fraud detection model based on class weighted support vector machine","volume":"6","author":"Q. Lu","year":"2011","journal-title":"Journal of Convergence Information Technology"},{"key":"19","article-title":"A survey of machine-learning and nature-inspired based credit card fraud detection techniques","volume":"8","author":"O. A. Aderemi","year":"2016","journal-title":"International Journal of System Assurance Engineering and Management Springer"},{"key":"20","article-title":"A hybrid fuzzy-firefly method for rule-based classification","author":"M. B. Pouyan"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-007-0274-8"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.4018\/ijisss.2017070102"},{"key":"23","article-title":"Electronic transaction fraud detection based on improved PSO algorithm","author":"S. J. Jie"},{"key":"24","article-title":"Credit card fraud detection based on whale algorithm optimize BP neural network","author":"C. Wang"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.110"},{"key":"26","doi-asserted-by":"crossref","article-title":"Intelligent financial fraud detection practices: an investigation","author":"J. West","DOI":"10.1007\/978-3-319-23802-9_16"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2972009"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"},{"key":"29","article-title":"Deep learning methods for credit card fraud detection","author":"T. T. Nguyen","year":"2020"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5680264"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.005"},{"key":"32","unstructured":"HallM. A.Correlation-based feature selection for machine learning1999Hamilton, New ZealandUniversity of Waikato HamiltonPh.D. thesis"},{"key":"33","article-title":"UC irvine machine learning repository","year":"2020"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.4018\/ijisss.2017070102"},{"issue":"2","key":"35","first-page":"57","article-title":"Fraud detection of credit cards using neuro-fuzzy approach based on tlbo and pso algorithms","volume":"10","author":"M. Ghodsi","year":"2017","journal-title":"Journal of Computer & Robotics"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-017-0683-8"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1468015.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1468015.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1468015.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T18:20:24Z","timestamp":1655490024000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2022\/1468015\/"}},"subtitle":[],"editor":[{"given":"Manikandan","family":"Ramachandran","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,6,17]]},"references-count":36,"alternative-id":["1468015","1468015"],"URL":"https:\/\/doi.org\/10.1155\/2022\/1468015","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"value":"1687-9732","type":"electronic"},{"value":"1687-9724","type":"print"}],"subject":[],"published":{"date-parts":[[2022,6,17]]}}}