{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T12:07:03Z","timestamp":1777896423480,"version":"3.51.4"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T00:00:00Z","timestamp":1736812800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T00:00:00Z","timestamp":1736812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Sohag University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The rapid increase of fraud attacks on banking systems, financial institutions, and even credit card holders demonstrate the high demand for enhanced fraud detection (FD) systems for these attacks. This paper provides a systematic review of enhanced techniques using Artificial Intelligence (AI), machine learning (ML), deep learning (DL), and meta-heuristic optimization (MHO) algorithms for credit card fraud detection (CCFD). Carefully selected recent research papers have been investigated to examine the effectiveness of these AI-integrated approaches in recognizing a wide range of fraud attacks. These AI techniques were evaluated and compared to discover the advantages and disadvantages of each one, leading to the exploration of existing limitations of ML or DL-enhanced models. Discovering the limitation is crucial for future work and research to increase the effectiveness and robustness of various AI models. The key finding from this study demonstrates the need for continuous development of AI models that could be alert to the latest fraudulent activities.<\/jats:p>","DOI":"10.1186\/s40537-024-01048-8","type":"journal-article","created":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T15:59:25Z","timestamp":1736870365000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["A systematic review of AI-enhanced techniques in credit card fraud detection"],"prefix":"10.1186","volume":"12","author":[{"given":"Ibrahim Y.","family":"Hafez","sequence":"first","affiliation":[]},{"given":"Ahmed Y.","family":"Hafez","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Saleh","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Abd El-Mageed","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Abohany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,14]]},"reference":[{"key":"1048_CR1","doi-asserted-by":"crossref","unstructured":"Parkar P, Bilimoria A. A survey on cyber security IDS using ML methods. 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 352\u2013360, 2021. https:\/\/api.semanticscholar.org\/CorpusID:235208042.","DOI":"10.1109\/ICICCS51141.2021.9432210"},{"key":"1048_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3360868","author":"N Musa","year":"2024","unstructured":"Musa N, Mirza N, Rafique S, Abdallah A, Murugan T. machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks\u2014current research solutions. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3360868.","journal-title":"IEEE Access"},{"key":"1048_CR3","doi-asserted-by":"crossref","unstructured":"Eswaran M, Hamsanandhini S, Lakshmi KI. Survey of cyber security approaches for attack detection and prevention. Turk J Comput Math Educ. 2021;12(2):3436\u201341. https:\/\/www.proquest.com\/scholarly-journals\/survey-cyber-security-approaches-attack-detection\/docview\/2624698524\/se-2.","DOI":"10.17762\/turcomat.v12i2.2406"},{"key":"1048_CR4","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055399","author":"K Barik","year":"2022","unstructured":"Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl Artif Intell. 2022. https:\/\/doi.org\/10.1080\/08839514.2022.2055399.","journal-title":"Appl Artif Intell"},{"key":"1048_CR5","doi-asserted-by":"publisher","unstructured":"Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. In 2020 International Conference on Computational Science and Computational Intelligence (CSCI), 2020, pp. 109\u2013115. https:\/\/doi.org\/10.1109\/CSCI51800.2020.00026.","DOI":"10.1109\/CSCI51800.2020.00026"},{"issue":"2","key":"1048_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.13052\/jcsm2245-1439.1225","volume":"12","author":"U Rauf","year":"2023","unstructured":"Rauf U, Mohsen F, Wei Z. A taxonomic classification of insider threats: existing techniques, future directions & recommendations. J Cyber Secur Mobil. 2023;12(2):221\u201352. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1225.","journal-title":"J Cyber Secur Mobil"},{"key":"1048_CR7","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080198","author":"SN Thanh Vu","year":"2021","unstructured":"Thanh Vu SN, Stege M, El-Habr PI, Bang J, Dragoni N. A survey on botnets: incentives, evolution, detection and current trends. Future Internet. 2021. https:\/\/doi.org\/10.3390\/fi13080198.","journal-title":"Future Internet"},{"key":"1048_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.35629\/5252-0502733741","volume":"5","author":"A Abu Bakar","year":"2023","unstructured":"Abu Bakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag IJAEM. 2023;5:73. https:\/\/doi.org\/10.35629\/5252-0502733741.","journal-title":"Int J Adv Eng Manag IJAEM."},{"key":"1048_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3176311","author":"A Parizad","year":"2022","unstructured":"Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022. https:\/\/doi.org\/10.1109\/TSG.2022.3176311.","journal-title":"IEEE Trans Smart Grid"},{"key":"1048_CR10","doi-asserted-by":"publisher","unstructured":"Richmond HT. Philosophical logic and artificial intelligence. Springer Netherlands, 1989. https:\/\/doi.org\/10.1007\/978-94-009-2448-2.","DOI":"10.1007\/978-94-009-2448-2"},{"issue":"1","key":"1048_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0377-2217(96)00378-5","volume":"99","author":"J-C Pomerol","year":"1997","unstructured":"Pomerol J-C. Artificial intelligence and human decision making. Eur J Oper Res. 1997;99(1):3\u201325. https:\/\/doi.org\/10.1016\/S0377-2217(96)00378-5.","journal-title":"Eur J Oper Res"},{"issue":"12","key":"1048_CR12","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J Li","year":"2018","unstructured":"Li J. Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng. 2018;19(12):1462\u201374. https:\/\/doi.org\/10.1631\/FITEE.1800573.","journal-title":"Front Inf Technol Electron Eng"},{"key":"1048_CR13","doi-asserted-by":"publisher","DOI":"10.32628\/IJSRST218675","author":"JN Welukar","year":"2021","unstructured":"Welukar JN, Bajoria GP. Artificial Intelligence in cyber security\u2014a review. Int J Sci Res Sci Technol. 2021. https:\/\/doi.org\/10.32628\/IJSRST218675.","journal-title":"Int J Sci Res Sci Technol"},{"key":"1048_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1706-8","author":"T Thomas","year":"2019","unstructured":"Thomas T, Vijayaraghavan AP, Emmanuel S. Machine learning approaches in cyber security analytics. Springer Singapore. 2019. https:\/\/doi.org\/10.1007\/978-981-15-1706-8.","journal-title":"Springer Singapore"},{"issue":"3","key":"1048_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.48009\/3_iis_2021_242-258","volume":"22","author":"GS Kuntla","year":"2021","unstructured":"Kuntla GS, Tian X, Li Z. Security and privacy in machine learning: a survey. Issues Inf Syst. 2021;22(3):224\u201340. https:\/\/doi.org\/10.48009\/3_iis_2021_242-258.","journal-title":"Issues Inf Syst"},{"issue":"3","key":"1048_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.14445\/22312803\/IJCTT-V48P126","volume":"48","author":"FY Osisanwo","year":"2017","unstructured":"Osisanwo FY, Akinsola JET, Awodele O, Hinmikaiye JO, Olakanmi O, Akinjobi J. Supervised machine learning algorithms: classification and comparison. Int J Comput Trends Technol. 2017;48(3):128\u201338. https:\/\/doi.org\/10.14445\/22312803\/IJCTT-V48P126.","journal-title":"Int J Comput Trends Technol"},{"issue":"1","key":"1048_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data. 2020;7(1):41. https:\/\/doi.org\/10.1186\/s40537-020-00318-5.","journal-title":"J Big Data"},{"key":"1048_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3086296","author":"E Rodriguez","year":"2021","unstructured":"Rodriguez E, Otero B, Guti\u00e9rrez N, Canal R. A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Commun Surv Tutor. 2021. https:\/\/doi.org\/10.1109\/COMST.2021.3086296.","journal-title":"IEEE Commun Surv Tutor"},{"key":"1048_CR19","unstructured":"Pourafshin F. Big data mining in internet of things using fusion of deep features. Int J Sci Res Eng Trends. 2021;7(2):1089\u201393. https:\/\/www.researchgate.net\/publication\/350942227_Big_Data_Mining_in_Internet_of_Things_Using_Fusion_of_Deep_Features."},{"key":"1048_CR20","doi-asserted-by":"publisher","first-page":"110722","DOI":"10.1109\/ACCESS.2019.2934354","volume":"7","author":"H Gu","year":"2019","unstructured":"Gu H, Wang Y, Hong S, Gui G. Blind channel identification aided generalized automatic modulation recognition based on deep learning. IEEE Access. 2019;7:110722\u20139. https:\/\/doi.org\/10.1109\/ACCESS.2019.2934354.","journal-title":"IEEE Access"},{"key":"1048_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10815-022-02708-5","author":"I Glatstein","year":"2023","unstructured":"Glatstein I, Chavez-Badiola A, Curchoe C. New frontiers in embryo selection. J Assist Reprod Genet. 2023. https:\/\/doi.org\/10.1007\/s10815-022-02708-5.","journal-title":"J Assist Reprod Genet"},{"key":"1048_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/B978-0-323-91781-0.00006-5","volume-title":"Comprehensive metaheuristics","author":"IH Hassan","year":"2023","unstructured":"Hassan IH, Mohammed A, Masama MA. Chapter 6\u2014Metaheuristic algorithms in network intrusion detection. In: Mirjalili S, Gandomi AH, editors. Comprehensive metaheuristics. Academic Press; 2023. p. 95\u2013129. https:\/\/doi.org\/10.1016\/B978-0-323-91781-0.00006-5."},{"issue":"11","key":"1048_CR23","doi-asserted-by":"publisher","first-page":"13187","DOI":"10.1007\/s10462-023-10470-y","volume":"56","author":"K Rajwar","year":"2023","unstructured":"Rajwar K, Deep K, Das S. An exhaustive review of the metaheuristic algorithms for search and optimization: taxonomy, applications, and open challenges. Artif Intell Rev. 2023;56(11):13187\u2013257. https:\/\/doi.org\/10.1007\/s10462-023-10470-y.","journal-title":"Artif Intell Rev"},{"key":"1048_CR24","doi-asserted-by":"publisher","first-page":"26766","DOI":"10.1109\/ACCESS.2021.3056407","volume":"9","author":"P Agrawal","year":"2021","unstructured":"Agrawal P, Abutarboush HF, Ganesh T, Mohamed AW. Metaheuristic algorithms on feature selection: a survey of one decade of research (2009\u20132019). IEEE Access. 2021;9:26766\u201391. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056407.","journal-title":"IEEE Access"},{"key":"1048_CR25","doi-asserted-by":"publisher","unstructured":"Saddam Hussain SK, Sai Charan Reddy E, Akshay KG, Akanksha T. Fraud detection in credit card transactions using SVM and random forest algorithms. In 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2021, pp. 1013\u20131017. https:\/\/doi.org\/10.1109\/I-SMAC52330.2021.9640631.","DOI":"10.1109\/I-SMAC52330.2021.9640631"},{"key":"1048_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s44230-022-00004-0","author":"R BinSulaiman","year":"2022","unstructured":"BinSulaiman R, Schetinin V, Sant P. Review of machine learning approach on credit card fraud detection. Hum-Centric Intell Syst. 2022. https:\/\/doi.org\/10.1007\/s44230-022-00004-0.","journal-title":"Hum-Centric Intell Syst"},{"key":"1048_CR27","first-page":"1","volume":"179","author":"A Aziz","year":"2021","unstructured":"Aziz A, Ghous H. Fraudulent transactions detection in credit card by using data mining methods: a review. Int J Sci Prog Res. 2021;179:1.","journal-title":"Int J Sci Prog Res."},{"key":"1048_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/app12199637","author":"A Ali","year":"2022","unstructured":"Ali A, et al. Financial fraud detection based on machine learning: a systematic literature review. Appl Sci. 2022. https:\/\/doi.org\/10.3390\/app12199637.","journal-title":"Appl Sci"},{"key":"1048_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1468015","volume":"2022","author":"A Singh","year":"2022","unstructured":"Singh A, Jain A, Biable S. Financial fraud detection approach based on firefly optimization algorithm and support vector machine. Appl Comput Intell Soft Comput. 2022;2022:1\u201310. https:\/\/doi.org\/10.1155\/2022\/1468015.","journal-title":"Appl Comput Intell Soft Comput"},{"key":"1048_CR30","doi-asserted-by":"publisher","unstructured":"Behera T, Panigrahi S. Credit card fraud detection: a hybrid approach using fuzzy clustering & neural network. 2015, pp. 494\u2013499. https:\/\/doi.org\/10.1109\/ICACCE.2015.33.","DOI":"10.1109\/ICACCE.2015.33"},{"key":"1048_CR31","unstructured":"Nguyen TT, Tahir H, Abdelrazek M, Babar A. Deep learning methods for credit card fraud detection. CoRR, vol. abs\/2012.03754, 2020. https:\/\/arxiv.org\/abs\/2012.03754."},{"key":"1048_CR32","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2020.03.219","volume":"167","author":"S Misra","year":"2020","unstructured":"Misra S, Thakur S, Ghosh M, Saha S. An autoencoder based model for detecting fraudulent credit card transaction. Procedia Comput Sci. 2020;167:254\u201362. https:\/\/doi.org\/10.1016\/j.procs.2020.03.219.","journal-title":"Procedia Comput Sci"},{"key":"1048_CR33","doi-asserted-by":"publisher","unstructured":"Schl\u00f6r D, Ring M, Krause A, Hotho A. Financial fraud detection with improved neural arithmetic logic units. 2021, pp. 40\u201354. https:\/\/doi.org\/10.1007\/978-3-030-66981-2_4.","DOI":"10.1007\/978-3-030-66981-2_4"},{"key":"1048_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41060-020-00238-w","volume":"13","author":"S Buschjager","year":"2022","unstructured":"Buschjager S, Honysz P-J, Morik K. Randomized outlier detection with trees. Int J Data Sci Anal. 2022;13:1\u201314. https:\/\/doi.org\/10.1007\/s41060-020-00238-w.","journal-title":"Int J Data Sci Anal"},{"key":"1048_CR35","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-030-11914-0_24","volume-title":"Smart data and computational intelligence: proceedings of the international conference on advanced information technology, services and systems","author":"I Benchaji","year":"2019","unstructured":"Benchaji I, Douzi S, El Ouahidi B. Using genetic algorithm to improve classification of imbalanced datasets for credit card fraud detection. In: Khoukhi F, Bahaj M, Ezziyyani M, editors. Smart data and computational intelligence: proceedings of the international conference on advanced information technology, services and systems. Cham: Springer International Publishing; 2019. p. 220\u20139. https:\/\/doi.org\/10.1007\/978-3-030-11914-0_24."},{"key":"1048_CR36","doi-asserted-by":"publisher","unstructured":"\u00d6z\u00e7elik M, Isik M, Duman E, Cevik T. Improving a credit card fraud detection system using genetic algorithm. ICNIT 2010\u20142010 International Conference on Networking and Information Technology, 2010. https:\/\/doi.org\/10.1109\/ICNIT.2010.5508478.","DOI":"10.1109\/ICNIT.2010.5508478"},{"key":"1048_CR37","unstructured":"Kitchenham B, Charters S. Guidelines for performing systematic literature reviews in software engineering. 2, 2007."},{"key":"1048_CR38","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.1016\/j.procs.2023.01.231","volume":"218","author":"P Gupta","year":"2023","unstructured":"Gupta P, Varshney A, Khan MR, Ahmed R, Shuaib M, Alam S. Unbalanced credit card fraud detection data: a machine learning-oriented comparative study of balancing techniques. Procedia Comput Sci. 2023;218:2575\u201384. https:\/\/doi.org\/10.1016\/j.procs.2023.01.231.","journal-title":"Procedia Comput Sci"},{"key":"1048_CR39","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00221-z","author":"MdA Talukder","year":"2024","unstructured":"Talukder MdA, Hossen R, Uddin MA, Uddin MN, Acharjee UK. Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search. Cybersecurity. 2024. https:\/\/doi.org\/10.1186\/s42400-024-00221-z.","journal-title":"Cybersecurity"},{"key":"1048_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc8010006","author":"AR Khalid","year":"2024","unstructured":"Khalid AR, Owoh N, Uthmani O, Ashawa M, Osamor J, Adejoh J. Enhancing credit card fraud detection: an ensemble machine learning approach. Big Data Cogn Comput. 2024. https:\/\/doi.org\/10.3390\/bdcc8010006.","journal-title":"Big Data Cogn Comput"},{"key":"1048_CR41","doi-asserted-by":"publisher","unstructured":"Sonwane VR, Zanje S, Yenpure S, Gunjal Y, Kulkarni Y, Yeole R. Advanced machine learning techniques for credit card fraud detection: a comprehensive study. In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), 2024, pp. 1978\u20131981. https:\/\/doi.org\/10.1109\/ICOSEC61587.2024.10722667.","DOI":"10.1109\/ICOSEC61587.2024.10722667"},{"key":"1048_CR42","doi-asserted-by":"publisher","unstructured":"Varmedja D, Karanovic M, Sladojevic S, Arsenovic M, Anderla A. Credit card fraud detection\u2014machine learning methods. 2019, pp. 1\u20135. https:\/\/doi.org\/10.1109\/INFOTEH.2019.8717766.","DOI":"10.1109\/INFOTEH.2019.8717766"},{"key":"1048_CR43","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.procs.2020.01.057","volume":"165","author":"VN Dornadula","year":"2019","unstructured":"Dornadula VN, Geetha S. Credit card fraud detection using machine learning algorithms. Procedia Comput Sci. 2019;165:631\u201341. https:\/\/doi.org\/10.1016\/j.procs.2020.01.057.","journal-title":"Procedia Comput Sci"},{"key":"1048_CR44","doi-asserted-by":"publisher","unstructured":"Thennakoon A, Chee B, Premadasa S, Mihiranga S, Kuruwitaarachchi N. Real-time credit card fraud detection using machine learning. 2019. https:\/\/doi.org\/10.1109\/CONFLUENCE.2019.8776942.","DOI":"10.1109\/CONFLUENCE.2019.8776942"},{"key":"1048_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-020-00430-y","author":"F Itoo","year":"2020","unstructured":"Itoo F, Mittal M, Singh S. Comparison and analysis of logistic regression, Na\u00efve Bayes and KNN machine learning algorithms for credit card fraud detection. Int J Inf Technol. 2020. https:\/\/doi.org\/10.1007\/s41870-020-00430-y.","journal-title":"Int J Inf Technol"},{"key":"1048_CR46","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.procs.2020.06.014","volume":"173","author":"S Bagga","year":"2020","unstructured":"Bagga S, Goyal A, Gupta N, Goyal A. Credit card fraud detection using pipeling and ensemble learning. Procedia Comput Sci. 2020;173:104\u201312. https:\/\/doi.org\/10.1016\/j.procs.2020.06.014.","journal-title":"Procedia Comput Sci"},{"key":"1048_CR47","unstructured":"Alemad M. Credit card fraud detection using machine learning. 2022. https:\/\/repository.rit.edu\/theses."},{"issue":"1","key":"1048_CR48","doi-asserted-by":"publisher","first-page":"231","DOI":"10.32604\/csse.2023.026508","volume":"45","author":"M Valavan","year":"2023","unstructured":"Valavan M, Rita S. Predictive-analysis-based machine learning model for fraud detection with boosting classifiers. Comput Syst Sci Eng. 2023;45(1):231\u201345. https:\/\/doi.org\/10.32604\/csse.2023.026508.","journal-title":"Comput Syst Sci Eng"},{"key":"1048_CR49","doi-asserted-by":"publisher","first-page":"603","DOI":"10.35940\/ijrte.F8182.059120","volume":"9","author":"R Goyal","year":"2020","unstructured":"Goyal R, Manjhvar A, Sejwar V. Credit card fraud detection in data mining using XGBoost classifier. Int J Recent Technol Eng (IJRTE). 2020;9:603\u20138. https:\/\/doi.org\/10.35940\/ijrte.F8182.059120.","journal-title":"Int J Recent Technol Eng (IJRTE)"},{"key":"1048_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100163","volume":"6","author":"J Afriyie","year":"2023","unstructured":"Afriyie J, et al. A supervised machine learning algorithm for detecting and predicting fraud in credit card transactions. Decis Anal J. 2023;6: 100163. https:\/\/doi.org\/10.1016\/j.dajour.2023.100163.","journal-title":"Decis Anal J"},{"issue":"1","key":"1048_CR51","doi-asserted-by":"publisher","DOI":"10.1063\/5.0184539","volume":"2742","author":"A Singh","year":"2024","unstructured":"Singh A, ShibargattiMahasmrti A, Jena A, Manvi S. Machine learning based detection of phishing websites in chrome. AIP Conf Proc. 2024;2742(1): 020072. https:\/\/doi.org\/10.1063\/5.0184539.","journal-title":"AIP Conf Proc"},{"issue":"3","key":"1048_CR52","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.11591\/ijeecs.v35.i3.pp1491-1498","volume":"35","author":"BS Kumar","year":"2024","unstructured":"Kumar BS, Yadav PP, Reddy MR. An intelligent approach to detect and predict online fraud transaction using XGBoost algorithm. Indones J Electr Eng Comput Sci. 2024;35(3):1491\u20138. https:\/\/doi.org\/10.11591\/ijeecs.v35.i3.pp1491-1498.","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"1048_CR53","doi-asserted-by":"publisher","unstructured":"Sadgali I, Sael N, Benabbou F. Fraud detection in credit card transaction using neural networks. In ACM International Conference Proceeding Series, Association for Computing Machinery, Oct. 2019. https:\/\/doi.org\/10.1145\/3368756.3369082.","DOI":"10.1145\/3368756.3369082"},{"key":"1048_CR54","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-981-13-0059-2_10","volume-title":"Soft computing and medical bioinformatics","author":"P Ragha Vardhani","year":"2019","unstructured":"Ragha Vardhani P, Indira Priyadarshini Y, Narasimhulu Y. CNN data mining algorithm for detecting credit card fraud. In: Muppalaneni NB, Ma M, Gurumoorthy S, editors. Soft computing and medical bioinformatics. Singapore: Springer Singapore; 2019. p. 85\u201393. https:\/\/doi.org\/10.1007\/978-981-13-0059-2_10."},{"key":"1048_CR55","doi-asserted-by":"publisher","unstructured":"Azhan M, Meraj S. Credit card fraud detection using machine learning and deep learning techniques. In Proceedings of the 3rd International Conference on Intelligent Sustainable Systems, ICISS 2020, Institute of Electrical and Electronics Engineers Inc. 2020, pp. 514\u2013518. https:\/\/doi.org\/10.1109\/ICISS49785.2020.9316002.","DOI":"10.1109\/ICISS49785.2020.9316002"},{"key":"1048_CR56","unstructured":"Cheng D, Xiang S, Shang C, Zhang Y, Yang F, Zhang L. Spatio-temporal attention-based neural network for credit card fraud detection. www.aaai.org."},{"issue":"1","key":"1048_CR57","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.gltp.2021.01.006","volume":"2","author":"A Rb","year":"2021","unstructured":"Rb A, Kr SK. Credit card fraud detection using artificial neural network. Glob Trans Proc. 2021;2(1):35\u201341. https:\/\/doi.org\/10.1016\/j.gltp.2021.01.006.","journal-title":"Glob Trans Proc"},{"key":"1048_CR58","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3991\/ijim.v15i24.27355","volume":"15","author":"D Hussein","year":"2021","unstructured":"Hussein D, Ibrahim D, Alshobaili J, Aloufi A, Almuteer A, Alrashidi W. Detecting credit card fraud using machine learning. Int J Interact Mobile Technol (iJIM). 2021;15:108\u201322. https:\/\/doi.org\/10.3991\/ijim.v15i24.27355.","journal-title":"Int J Interact Mobile Technol (iJIM)"},{"key":"1048_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106883","volume":"99","author":"J Forough","year":"2021","unstructured":"Forough J, Momtazi S. Ensemble of deep sequential models for credit card fraud detection. Appl Soft Comput. 2021;99: 106883. https:\/\/doi.org\/10.1016\/j.asoc.2020.106883.","journal-title":"Appl Soft Comput"},{"key":"1048_CR60","doi-asserted-by":"publisher","unstructured":"Alammar A, Al Moaiad Y, Algeelani N. Transaction fraud detector using KNN in deep learning. 2022;9:16\u201323. https:\/\/doi.org\/10.5281\/zenodo.7365019.","DOI":"10.5281\/zenodo.7365019"},{"issue":"1","key":"1048_CR61","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.32604\/cmc.2023.046051","volume":"78","author":"SMH Sumaya","year":"2024","unstructured":"Sumaya SMH, Sulaiman Ibraheem Nadher S. Credit card fraud detection using improved deep learning models. Comput Mater Continua. 2024;78(1):1049\u201369. https:\/\/doi.org\/10.32604\/cmc.2023.046051.","journal-title":"Comput Mater Continua"},{"key":"1048_CR62","doi-asserted-by":"publisher","DOI":"10.3390\/fi16060196","author":"T Baabdullah","year":"2024","unstructured":"Baabdullah T, Alzahrani A, Rawat DB, Liu C. Efficiency of federated learning and blockchain in preserving privacy and enhancing the performance of Credit Card Fraud Detection (CCFD) Systems. Future Internet. 2024. https:\/\/doi.org\/10.3390\/fi16060196.","journal-title":"Future Internet"},{"key":"1048_CR63","doi-asserted-by":"publisher","DOI":"10.3390\/info15040227","author":"S El Kafhali","year":"2024","unstructured":"El Kafhali S, Tayebi M, Sulimani H. An optimized deep learning approach for detecting fraudulent transactions. Information. 2024. https:\/\/doi.org\/10.3390\/info15040227.","journal-title":"Information"},{"key":"1048_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2023.108560","volume":"182","author":"A Iqbal","year":"2023","unstructured":"Iqbal A, Amin R. Time series forecasting and anomaly detection using deep learning. Comput Chem Eng. 2023;182: 108560. https:\/\/doi.org\/10.1016\/j.compchemeng.2023.108560.","journal-title":"Comput Chem Eng"},{"key":"1048_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102003","author":"A Cherif","year":"2024","unstructured":"Cherif A, Ammar H, Kalkatawi M, Alshehri S, Imine A. Encoder\u2013decoder graph neural network for credit card fraud detection. J King Saud Univ Comput Inf Sci. 2024. https:\/\/doi.org\/10.1016\/j.jksuci.2024.102003.","journal-title":"J. King Saud Univ Comput Inf Sci."},{"key":"1048_CR66","doi-asserted-by":"publisher","DOI":"10.7494\/csci.2024.25.2.5967","author":"N Shome","year":"2024","unstructured":"Shome N, Sarkar DD, Kashyap R, Lasker RH. Detection of credit card fraud with optimized deep neural network in balanced data condition. Comput Sci. 2024. https:\/\/doi.org\/10.7494\/csci.2024.25.2.5967.","journal-title":"Comput Sci"},{"issue":"6","key":"1048_CR67","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1080\/02522667.2020.1809090","volume":"41","author":"A Singh","year":"2020","unstructured":"Singh A, Jain A. Cost-sensitive metaheuristic technique for credit card fraud detection. J Inf Optim Sci. 2020;41(6):1319\u201331. https:\/\/doi.org\/10.1080\/02522667.2020.1809090.","journal-title":"J Inf Optim Sci"},{"key":"1048_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102596","volume":"55","author":"N Rtayli","year":"2020","unstructured":"Rtayli N, Enneya N. Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization. J Inf Secur Appl. 2020;55: 102596. https:\/\/doi.org\/10.1016\/j.jisa.2020.102596.","journal-title":"J Inf Secur Appl"},{"key":"1048_CR69","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3834947","author":"A Shahapurkar","year":"2021","unstructured":"Shahapurkar A. Accurate fraud detection in credit card transactions using hybrid heuristic and meta-heuristic algorithms. SSRN Electron J. 2021. https:\/\/doi.org\/10.2139\/ssrn.3834947.","journal-title":"SSRN Electron J"},{"key":"1048_CR70","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00573-8","author":"E Ileberi","year":"2022","unstructured":"Ileberi E, Sun Y, Wang Z. A machine learning based credit card fraud detection using the GA algorithm for feature selection. J Big Data. 2022. https:\/\/doi.org\/10.1186\/s40537-022-00573-8.","journal-title":"J Big Data"},{"key":"1048_CR71","doi-asserted-by":"publisher","DOI":"10.3390\/math10132272","author":"D Jovanovic","year":"2022","unstructured":"Jovanovic D, Antonijevic M, Stankovic M, Zivkovic M, Tanaskovic M, Bacanin N. Tuning machine learning models using a group search firefly algorithm for credit card fraud detection. Mathematics. 2022. https:\/\/doi.org\/10.3390\/math10132272.","journal-title":"Mathematics"},{"key":"1048_CR72","doi-asserted-by":"publisher","unstructured":"Arun GK, Rajesh P. Design of metaheuristic feature selection with deep learning based credit card fraud detection model. In 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), 2022, pp. 191\u2013197. https:\/\/doi.org\/10.1109\/ICAIS53314.2022.9742937.","DOI":"10.1109\/ICAIS53314.2022.9742937"},{"key":"1048_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120760","volume":"231","author":"Z Yi","year":"2023","unstructured":"Yi Z, et al. Fraud detection in capital markets: a novel machine learning approach. Expert Syst Appl. 2023;231: 120760. https:\/\/doi.org\/10.1016\/j.eswa.2023.120760.","journal-title":"Expert Syst Appl"},{"issue":"14","key":"1048_CR74","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.3390\/math12142250","volume":"12","author":"DT Mosa","year":"2024","unstructured":"Mosa DT, Sorour SE, Abohany AA, Maghraby FA. CCFD: efficient credit card fraud detection using meta-heuristic techniques and machine learning algorithms. Mathematics. 2024;12(14):2250. https:\/\/doi.org\/10.3390\/math12142250.","journal-title":"Mathematics"},{"key":"1048_CR75","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.9.009","author":"E Faisal","year":"2024","unstructured":"Faisal E, Ahmad H, Zaghloul R. Efficient credit card fraud detection using evolutionary hybrid feature selection and random weight networks. Int J Data Netw Sci. 2024. https:\/\/doi.org\/10.5267\/j.ijdns.2023.9.009.","journal-title":"Int J Data Netw Sci"},{"key":"1048_CR76","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.aej.2024.06.040","volume":"104","author":"SE Sorour","year":"2024","unstructured":"Sorour SE, AlBarrak KM, Abohany AA, El-Mageed AAA. Credit card fraud detection using the brown bear optimization algorithm. Alex Eng J. 2024;104:171\u201392. https:\/\/doi.org\/10.1016\/j.aej.2024.06.040.","journal-title":"Alex Eng J"},{"key":"1048_CR77","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00541-8","author":"I Benchaji","year":"2021","unstructured":"Benchaji I, Douzi S, El Ouahidi B, Jaafari J. Enhanced credit card fraud detection based on attention mechanism and LSTM deep model. J Big Data. 2021. https:\/\/doi.org\/10.1186\/s40537-021-00541-8.","journal-title":"J Big Data"},{"key":"1048_CR78","doi-asserted-by":"crossref","unstructured":"Zaffar Z, Sohrab F, Kanniainen J, Gabbouj M. Credit card fraud detection with subspace learning-based one-class classification. 2023. http:\/\/arxiv.org\/abs\/2309.14880","DOI":"10.1109\/SSCI52147.2023.10372038"},{"issue":"3","key":"1048_CR79","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1016\/j.ijforecast.2018.03.002","volume":"36","author":"G Vaughan","year":"2020","unstructured":"Vaughan G. Efficient big data model selection with applications to fraud detection. Int J Forecast. 2020;36(3):1116\u201327. https:\/\/doi.org\/10.1016\/j.ijforecast.2018.03.002.","journal-title":"Int J Forecast"},{"key":"1048_CR80","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/978-1-80262-637-720221003","volume-title":"Big data analytics in the insurance market","author":"YK Saheed","year":"2022","unstructured":"Saheed YK, Baba UA, Raji MA. Big data analytics for credit card fraud detection using supervised machine learning models. In: Sood K, Balusamy B, Grima S, Marano P, editors. Big data analytics in the insurance market. Bingley: Emerald Publishing Limited; 2022. p. 31\u201356. https:\/\/doi.org\/10.1108\/978-1-80262-637-720221003."},{"issue":"12","key":"1048_CR81","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11265-023-01903-6","volume":"95","author":"H Banirostam","year":"2023","unstructured":"Banirostam H, Banirostam T, Pedram MM, Rahmani AM. A model to detect the fraud of electronic payment card transactions based on stream processing in Big Data. J Signal Process Syst. 2023;95(12):1469\u201384. https:\/\/doi.org\/10.1007\/s11265-023-01903-6.","journal-title":"J Signal Process Syst"},{"key":"1048_CR82","doi-asserted-by":"publisher","unstructured":"Dai Y, Yan J, Tang X, Zhao H, Guo M. Online credit card fraud detection: a hybrid framework with big data technologies. In 2016 IEEE Trustcom\/BigDataSE\/ISPA, 2016, pp. 1644\u20131651. https:\/\/doi.org\/10.1109\/TrustCom.2016.0253.","DOI":"10.1109\/TrustCom.2016.0253"},{"key":"1048_CR83","doi-asserted-by":"crossref","unstructured":"Priscilla DP, Victoria C, Prabha. Credit card fraud detection: a systematic review. In Jain LC, S-L Peng, Alhadidi, Souvika S, editors. Intelligent Computing Paradigm and Cutting-edge Technologies, Cham: Springer International Publishing; 2020, pp. 290\u2013303.","DOI":"10.1007\/978-3-030-38501-9_29"},{"key":"1048_CR84","unstructured":"Elgiriyewithana N. Credit card fraud detection dataset 2023. Kaggle. https:\/\/www.kaggle.com\/datasets\/nelgiriyewithana\/credit-card-fraud-detection-dataset-2023. Accessed 5 Sep 2024."},{"key":"1048_CR85","unstructured":"Howard A, Bouchon-Meunier B, Lei J, Abbass H. IEEE-CIS fraud detection. Kaggle. https:\/\/kaggle.com\/competitions\/ieee-fraud-detection. Accessed 5 Sep 2024."},{"key":"1048_CR86","doi-asserted-by":"publisher","unstructured":"Wu B, Yao X, Zhang B, Chao K-M, Li Y. SplitGNN: spectral graph neural network for fraud detection against heterophily. 2023, pp. 2737\u20132746. https:\/\/doi.org\/10.1145\/3583780.3615067.","DOI":"10.1145\/3583780.3615067"},{"issue":"3","key":"1048_CR87","doi-asserted-by":"publisher","first-page":"427","DOI":"10.14778\/3494124.3494128","volume":"15","author":"SX Rao","year":"2021","unstructured":"Rao SX, Zhang S, Han Z, Zhang Z, Min W, Chen Z, Shan Y, Zhao Y, Zhang C. xFraud: explainable fraud transaction detection. Proc VLDB Endowm. 2021;15(3):427\u201336. https:\/\/doi.org\/10.14778\/3494124.3494128.","journal-title":"Proc VLDB Endowm"},{"key":"1048_CR88","unstructured":"Singh S. Fraudulent transaction detection. Kaggle. [https:\/\/www.kaggle.com\/datasets\/sanskar457\/fraud-transaction-detection. Accessed 5 Sep 2024."},{"key":"1048_CR89","doi-asserted-by":"crossref","unstructured":"Jain R, Gour B, Dubey S. A hybrid approach for credit card fraud detection using rough set and decision tree technique. 2016.","DOI":"10.5120\/ijca2016909325"},{"key":"1048_CR90","unstructured":"Noghani FF, Moattar M-H. Ensemble classification and extended feature selection for credit card fraud detection. 2017."},{"key":"1048_CR91","doi-asserted-by":"publisher","unstructured":"Awoyemi J, Adetunmbi A, Oluwadare S. Credit card fraud detection using machine learning techniques: a comparative analysis. 2017. pp. 1\u20139. https:\/\/doi.org\/10.1109\/ICCNI.2017.8123782.","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"1048_CR92","doi-asserted-by":"publisher","unstructured":"Xuan S, Liu G, Li Z, Zheng L, Wang S, Jiang C. Random forest for credit card fraud detection. Institute of Electrical and Electronics Engineers. 2018; p. 127. https:\/\/doi.org\/10.1109\/ICNSC.2018.8361343.","DOI":"10.1109\/ICNSC.2018.8361343"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01048-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-024-01048-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01048-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T03:29:43Z","timestamp":1736911783000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-024-01048-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,14]]},"references-count":92,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1048"],"URL":"https:\/\/doi.org\/10.1186\/s40537-024-01048-8","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,14]]},"assertion":[{"value":"21 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"6"}}