{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:10:39Z","timestamp":1776924639359,"version":"3.51.2"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-024-01041-1","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T14:58:20Z","timestamp":1737730700000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["A problem-agnostic approach to feature selection and analysis using SHAP"],"prefix":"10.1186","volume":"12","author":[{"given":"John T.","family":"Hancock","sequence":"first","affiliation":[]},{"given":"Taghi M.","family":"Khoshgoftaar","sequence":"additional","affiliation":[]},{"given":"Qianxin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"key":"1041_CR1","unstructured":"New FTC Data Show Consumers Reported Losing Nearly \\$8.8 Billion to Scams in 2022 \u2014 ftc.gov. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/02\/new-ftc-data-show-consumers-reported-losing-nearly-88-billion-scams-2022. Accessed 03 Dec 2023."},{"key":"1041_CR2","unstructured":"Lundberg SM, Lee S-I. A unified approach to interpreting model predictions. Advances in neural information processing systems. 2017; 30"},{"key":"1041_CR3","unstructured":"Kaggle: Credit card fraud detection. 2018. https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud. Accessed 25 Sep 2023."},{"issue":"1\u20133","key":"1041_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S, Esbensen K, Geladi P. Principal component analysis. Chemom Intell Lab Syst. 1987;2(1\u20133):37\u201352.","journal-title":"Chemom Intell Lab Syst"},{"issue":"1","key":"1041_CR5","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1186\/s40537-023-00794-5","volume":"10","author":"JL Leevy","year":"2023","unstructured":"Leevy JL, Hancock J, Khoshgoftaar TM. Comparative analysis of binary and one-class classification techniques for credit card fraud data. J Big Data. 2023;10(1):118.","journal-title":"J Big Data"},{"key":"1041_CR6","doi-asserted-by":"crossref","unstructured":"Kennedy RK, Salekshahrezaee Z, Khoshgoftaar TM. Unsupervised anomaly detection of class imbalanced cognition data using an iterative cleaning method. In: 2023 IEEE 24th International Conference on Information Reuse and Integration for Data Science (IRI), IEEE. 2023. pp. 303\u2013308.","DOI":"10.1109\/IRI58017.2023.00060"},{"key":"1041_CR7","first-page":"451","volume-title":"Joint European conference on machine learning and knowledge discovery in databases","author":"K Boyd","year":"2013","unstructured":"Boyd K, Eng KH, Page CD. Area under the precision-recall curve: point estimates and confidence intervals. In: Joint European conference on machine learning and knowledge discovery in databases. Berlin: Springer; 2013. p. 451\u201366."},{"key":"1041_CR8","doi-asserted-by":"crossref","unstructured":"Bekkar M, Djemaa HK, Alitouche TA. Evaluation measures for models assessment over imbalanced data sets. J Inf Eng Appl. 2013; 3(10)","DOI":"10.5121\/ijdkp.2013.3402"},{"issue":"1","key":"1041_CR9","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s40537-023-00684-w","volume":"10","author":"Z Salekshahrezaee","year":"2023","unstructured":"Salekshahrezaee Z, Leevy JL, Khoshgoftaar TM. The effect of feature extraction and data sampling on credit card fraud detection. J Big Data. 2023;10(1):6.","journal-title":"J Big Data"},{"key":"1041_CR10","doi-asserted-by":"crossref","unstructured":"Masci J, Meier U, Cire\u015fan D, Schmidhuber J. Stacked convolutional auto-encoders for hierarchical feature extraction. In: Artificial Neural Networks and Machine Learning\u2013ICANN 2011: 21st International Conference on Artificial Neural Networks, Espoo, Finland, June 14-17, 2011, Proceedings, Part I 21, Springer; 2011. pp. 52\u201359.","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"1041_CR11","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0101101","author":"M Rezapour","year":"2019","unstructured":"Rezapour M. Anomaly detection using unsupervised methods: credit card fraud case study. Int J Adv Comput Sci Appl. 2019. https:\/\/doi.org\/10.14569\/IJACSA.2019.0101101.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1041_CR12","unstructured":"Sch\u00f6lkopf B, Williamson RC, Smola A, Shawe-Taylor J, Platt J. Support vector method for novelty detection. Advances in neural information processing systems. 1999; 12"},{"key":"1041_CR13","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","volume":"557","author":"F Carcillo","year":"2021","unstructured":"Carcillo F, Le Borgne Y-A, Caelen O, Kessaci Y, Obl\u00e9 F, Bontempi G. Combining unsupervised and supervised learning in credit card fraud detection. Inf Sci. 2021;557:317\u201331.","journal-title":"Inf Sci"},{"key":"1041_CR14","doi-asserted-by":"crossref","unstructured":"Mittal S, Tyagi S. Performance evaluation of machine learning algorithms for credit card fraud detectio. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), IEEE. 2019. pp. 320\u2013324.","DOI":"10.1109\/CONFLUENCE.2019.8776925"},{"key":"1041_CR15","doi-asserted-by":"publisher","DOI":"10.17577\/IJERTV9IS040749","author":"L Bhavya","year":"2020","unstructured":"Bhavya L, Reddy VS, Mohan UA, Karishma S. Credit card fraud detection using classification, unsupervised, neural networks models. Int J Eng Res. 2020. https:\/\/doi.org\/10.17577\/IJERTV9IS040749.","journal-title":"Int J Eng Res"},{"issue":"11","key":"1041_CR16","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P. Gradient-based learning applied to document recognition. Proc IEEE. 1998;86(11):2278\u2013324.","journal-title":"Proc IEEE"},{"issue":"2","key":"1041_CR17","first-page":"235","volume":"5","author":"F Fadaei Noghani","year":"2017","unstructured":"Fadaei Noghani F, Moattar M. Ensemble classification and extended feature selection for credit card fraud detection. J AI Data Min. 2017;5(2):235\u201343.","journal-title":"J AI Data Min"},{"key":"1041_CR18","doi-asserted-by":"publisher","first-page":"2693022","DOI":"10.1155\/2023\/2693022","volume":"2023","author":"N Prabhakaran","year":"2023","unstructured":"Prabhakaran N, Nedunchelian R, et al. Oppositional cat swarm optimization-based feature selection approach for credit card fraud detection. Comput Intell Neurosci. 2023;2023:2693022.","journal-title":"Comput Intell Neurosci"},{"key":"1041_CR19","doi-asserted-by":"crossref","unstructured":"Hancock JT, Bauder RA, Khoshgoftaar TM. A model-agnostic feature selection technique to improve the performance of one-class classifiers. In: 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI). IEEE. 2023.","DOI":"10.1109\/ICTAI59109.2023.00021"},{"key":"1041_CR20","unstructured":"scikit-learn developers: sklearn.ensemble.IsolationForest \u2014 scikit-learn.org. 2023. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.IsolationForest.html. Accessed 01 Dec 2023."},{"key":"1041_CR21","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH. Greedy function approximation: a gradient boosting machine. Ann Statist. 2001;29:1189\u2013232.","journal-title":"Ann Statist"},{"key":"1041_CR22","doi-asserted-by":"crossref","unstructured":"Wang H, Liang Q, Hancock JT, Khoshgoftaar TM. Enhancing credit card fraud detection through a novel ensemble feature selection technique. In: 2023 IEEE 24th International Conference on Information Reuse and Integration for Data Science (IRI), IEEE. 2023. pp. 121\u2013126.","DOI":"10.1109\/IRI58017.2023.00028"},{"key":"1041_CR23","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C. Xgboost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International conference on knowledge discovery and data mining - KDD. 2016. 16","DOI":"10.1145\/2939672.2939785"},{"key":"1041_CR24","first-page":"421","volume-title":"Artificial intelligence and applications","author":"LI Kuncheva","year":"2007","unstructured":"Kuncheva LI. A stability index for feature selection. In: Artificial intelligence and applications. Princeton: Citeseer; 2007. p. 421\u20137."},{"key":"1041_CR25","doi-asserted-by":"crossref","unstructured":"Hancock J, Khoshgoftaar TM, Johnson JM. Informative evaluation metrics for highly imbalanced big data classification. In: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE. 2022 pp. 1419\u20131426.","DOI":"10.1109\/ICMLA55696.2022.00224"},{"key":"1041_CR26","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983327","volume-title":"Analysis of variance","author":"GR Iversen","year":"1987","unstructured":"Iversen GR, Norpoth H. Analysis of variance. Newbury Park: Sage; 1987."},{"key":"1041_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2307\/3001913","volume":"5","author":"JW Tukey","year":"1949","unstructured":"Tukey JW. Comparing individual means in the analysis of variance. Biometrics. 1949;5:99\u2013114.","journal-title":"Biometrics"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01041-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-024-01041-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01041-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T14:58:32Z","timestamp":1737730712000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-024-01041-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,24]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1041"],"URL":"https:\/\/doi.org\/10.1186\/s40537-024-01041-1","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,24]]},"assertion":[{"value":"11 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no Competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"12"}}