{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:49:29Z","timestamp":1767991769604,"version":"3.49.0"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003789","name":"Helwan University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003789","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Credit card fraud (CCF) continues to cause significant financial losses worldwide, costs institutions and consumers billions of dollars each year and erodes confidence in digital payments. Fraudulent activities are rare, highly adaptive, and increasingly complex, making them difficult to detect with traditional rule-based or static models. This study presents the binary Griffon vulture optimization algorithm with local search (BGVOA-LS) framework, which integrates optimized feature selection (FS) with machine learning (ML) to improve accuracy and efficiency in fraud identification by selecting the most relevant transaction features and removing noise and redundancy so that classifiers focus on patterns most indicative of fraudulent behavior. To address the severe imbalance between legitimate and fraudulent records, the method applies random under sampling (RUS), which helps reduce the number of false positives and missed detections. The selected features are evaluated via three classifiers across the European, Australian, and PaySim datasets: decision tree (DT), k-nearest neighbors (KNN), and extreme gradient boosting tree (Xgb-tree). BGVOA-LS achieves up to 99.8% accuracy, reduces the feature count by 67%, and outperforms other metaheuristic techniques (MHTs), enabling faster screening, lower computational costs, and more dependable fraud prevention.<\/jats:p>","DOI":"10.1186\/s40537-025-01274-8","type":"journal-article","created":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T09:22:54Z","timestamp":1758100974000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["From chaos to clarity: unraveling credit card fraud with BGVOA-LS"],"prefix":"10.1186","volume":"12","author":[{"given":"Aya H.","family":"Salem","sequence":"first","affiliation":[]},{"given":"Safaa M.","family":"Azzam","sequence":"additional","affiliation":[]},{"given":"O. E.","family":"Emam","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Abohany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,17]]},"reference":[{"key":"1274_CR1","unstructured":"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2025\/03\/new-ftc-data-show-big-jump-reported-losses-fraud-125-billion-2024?utm_source=chatgpt.com."},{"key":"1274_CR2","unstructured":"https:\/\/www.statista.com\/outlook\/fmo\/payments\/digital-payments\/worldwide?currency=USD."},{"key":"1274_CR3","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00957-y","author":"AH Salem","year":"2024","unstructured":"Salem AH, Azzam SM, Emam OE, Abohany AA. Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. J Big Data. 2024. https:\/\/doi.org\/10.1186\/s40537-024-00957-y.","journal-title":"J Big Data"},{"key":"1274_CR4","unstructured":"https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud."},{"key":"1274_CR5","unstructured":"https:\/\/www.kaggle.com\/datasets\/mtalaltariq\/paysim-data."},{"key":"1274_CR6","unstructured":"https:\/\/archive.ics.uci.edu\/dataset\/143\/statlog+australian+credit+approval."},{"key":"1274_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100740","author":"SW Lee","year":"2025","unstructured":"Lee SW, et al. A survey of Beluga whale optimization and its variants: statistical analysis, advances, and structural reviewing. Comput Sci Rev. 2025. https:\/\/doi.org\/10.1016\/j.cosrev.2025.100740.","journal-title":"Comput Sci Rev"},{"issue":"2","key":"1274_CR8","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s40745-024-00525-4","volume":"12","author":"FS Gharehchopogh","year":"2025","unstructured":"Gharehchopogh FS. An improved boosting bald eagle search algorithm with improved African vultures optimization algorithm for data clustering. Ann Data Sci. 2025;12(2):605\u201337. https:\/\/doi.org\/10.1007\/s40745-024-00525-4.","journal-title":"Ann Data Sci"},{"issue":"3","key":"1274_CR9","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.11591\/eei.v14i3.8977","volume":"14","author":"W Aribowo","year":"2025","unstructured":"Aribowo W, et al. Enhancing photovoltaic parameters based on modified puma optimizer. Bull Electr Eng Inform. 2025;14(3):1667\u201380. https:\/\/doi.org\/10.11591\/eei.v14i3.8977.","journal-title":"Bull Electr Eng Inform"},{"key":"1274_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.aej.2025.05.071","volume":"128","author":"SW Lee","year":"2025","unstructured":"Lee SW, et al. A hybrid flow shop scheduling optimization using puma optimizer: addressing energy efficiency and workforce restrictions. Alexandria Eng J. 2025;128:340\u201365. https:\/\/doi.org\/10.1016\/j.aej.2025.05.071.","journal-title":"Alexandria Eng J"},{"key":"1274_CR11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0278491","author":"ESM El-Kenawy","year":"2023","unstructured":"El-Kenawy ESM, et al. Feature selection in wind speed forecasting systems based on meta-heuristic optimization. PLoS ONE. 2023. https:\/\/doi.org\/10.1371\/journal.pone.0278491.","journal-title":"PLoS ONE"},{"key":"1274_CR12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-93370-1","author":"S Mohapatra","year":"2025","unstructured":"Mohapatra S, Kaliyaperumal D, Gharehchopogh FS. A revamped black winged kite algorithm with advanced strategies for engineering optimization. Sci Rep. 2025. https:\/\/doi.org\/10.1038\/s41598-025-93370-1.","journal-title":"Sci Rep"},{"key":"1274_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-024-10202-7","author":"F Anka","year":"2025","unstructured":"Anka F, Agaoglu N, Nematzadeh S, Torkamanian-afshar M, Gharehchopogh FS. Advances in artificial rabbits optimization: a comprehensive review. Arch Comput Methods Eng. 2025. https:\/\/doi.org\/10.1007\/s11831-024-10202-7.","journal-title":"Arch Comput Methods Eng"},{"key":"1274_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2025.100605","author":"MR Machado","year":"2025","unstructured":"Machado MR, Chen DT, Osterrieder JR. An analytical approach to credit risk assessment using machine learning models. Decis Anal J. 2025. https:\/\/doi.org\/10.1016\/j.dajour.2025.100605.","journal-title":"Decis Anal J"},{"issue":"2","key":"1274_CR15","doi-asserted-by":"publisher","first-page":"995","DOI":"10.28991\/ESJ-2025-09-02-025","volume":"9","author":"MA Hamada","year":"2025","unstructured":"Hamada MA, Farag K, Abiche AE. Early prediction detection of retail and corporate credit risks using machine learning algorithms. Emerg Sci J. 2025;9(2):995\u20131012. https:\/\/doi.org\/10.28991\/ESJ-2025-09-02-025.","journal-title":"Emerg Sci J"},{"key":"1274_CR16","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1016\/j.aej.2025.05.043","volume":"127","author":"JA Darwish","year":"2025","unstructured":"Darwish JA. Optimization and prediction of corporate credit rating through advanced feature selection based on AI and deep learning. Alexandria Eng J. 2025;127:586\u201394. https:\/\/doi.org\/10.1016\/j.aej.2025.05.043.","journal-title":"Alexandria Eng J"},{"key":"1274_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/math10234421","author":"ESM El-Kenawy","year":"2022","unstructured":"El-Kenawy ESM, et al. Metaheuristic optimization for improving weed detection in wheat images captured by drones. Mathematics. 2022. https:\/\/doi.org\/10.3390\/math10234421.","journal-title":"Mathematics"},{"key":"1274_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127206","volume":"276","author":"DO Hasan","year":"2025","unstructured":"Hasan DO, Mohammed HM, Abdul ZK. Griffon vultures optimization algorithm for solving optimization problems. Expert Syst Appl. 2025;276:127206. https:\/\/doi.org\/10.1016\/j.eswa.2025.127206.","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1274_CR19","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.32604\/cmc.2023.033273","volume":"74","author":"R Alkanhel","year":"2023","unstructured":"Alkanhel R, et al. Network intrusion detection based on feature selection and hybrid metaheuristic optimization. Comput Mater Contin. 2023;74(2):2677\u201393. https:\/\/doi.org\/10.32604\/cmc.2023.033273.","journal-title":"Comput Mater Contin"},{"issue":"2","key":"1274_CR20","doi-asserted-by":"publisher","first-page":"4989","DOI":"10.32604\/cmc.2022.023884","volume":"71","author":"ESM El-Kenawy","year":"2022","unstructured":"El-Kenawy ESM, Ibrahim A, Mirjalili S, Zhang YD, Elnazer S, Zaki RM. Optimized ensemble algorithm for predicting metamaterial antenna parameters. Comput Mater Contin. 2022;71(2):4989\u20135003. https:\/\/doi.org\/10.32604\/cmc.2022.023884.","journal-title":"Comput Mater Contin"},{"key":"1274_CR21","doi-asserted-by":"publisher","first-page":"106673","DOI":"10.1109\/ACCESS.2022.3212081","volume":"10","author":"N Khodadadi","year":"2022","unstructured":"Khodadadi N, Abualigah L, El-Kenawy ESM, Snasel V, Mirjalili S. An archive-based multi-objective arithmetic optimization algorithm for solving industrial engineering problems. IEEE Access. 2022;10:106673\u201398. https:\/\/doi.org\/10.1109\/ACCESS.2022.3212081.","journal-title":"IEEE Access"},{"key":"1274_CR22","unstructured":"Tonui I, Kibet P. Credit card fraud detection with deep learning techniques. [Online]. Available: https:\/\/www.researchgate.net\/publication\/388459328."},{"key":"1274_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120760","author":"Z Yi","year":"2023","unstructured":"Yi Z, et al. Fraud detection in capital markets: a novel machine learning approach. Expert Syst Appl. 2023. https:\/\/doi.org\/10.1016\/j.eswa.2023.120760.","journal-title":"Expert Syst Appl"},{"key":"1274_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125179","author":"HR Ranganatha","year":"2025","unstructured":"Ranganatha HR, Mustafa AS. Enhancing fraud detection efficiency in mobile transactions through the integration of bidirectional 3d Quasi-Recurrent Neural network and blockchain technologies. Expert Syst Appl. 2025. https:\/\/doi.org\/10.1016\/j.eswa.2024.125179.","journal-title":"Expert Syst Appl"},{"key":"1274_CR25","doi-asserted-by":"crossref","unstructured":"Abdelghafour EB, Mohamed C, Noura A, Abdelhamid B. Enhancing credit card fraud detection using a stacking model approach and hyperparameter optimization. 2024. [Online]. Available: www.ijacsa.thesai.org.","DOI":"10.14569\/IJACSA.2024.01510110"},{"key":"1274_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102003","author":"A Cherif","year":"2024","unstructured":"Cherif A, Ammar H, Kalkatawi M, Alshehri S, Imine A. Encoder\u2013decoder graph neural network for credit card fraud detection. J King Saud Univ Comput Inform Sci. 2024. https:\/\/doi.org\/10.1016\/j.jksuci.2024.102003.","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"1274_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3528079","author":"N Damanik","year":"2025","unstructured":"Damanik N, Liu CM. Advanced fraud detection: leveraging K-SMOTEENN and stacking ensemble to tackle data imbalance and extract insights. IEEE Access. 2025. https:\/\/doi.org\/10.1109\/ACCESS.2025.3528079.","journal-title":"IEEE Access"},{"key":"1274_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3466288","author":"FK Alarfaj","year":"2024","unstructured":"Alarfaj FK, Shahzadi S. Enhancing fraud detection in banking with deep learning: graph neural networks and autoencoders for real-time credit card fraud prevention. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3466288.","journal-title":"IEEE Access"},{"key":"1274_CR29","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00996-5","author":"MA Talukder","year":"2024","unstructured":"Talukder MA, Khalid M, Uddin MA. An integrated multistage ensemble machine learning model for fraudulent transaction detection. J Big Data. 2024. https:\/\/doi.org\/10.1186\/s40537-024-00996-5.","journal-title":"J Big Data"},{"key":"1274_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2023.108560","author":"A Iqbal","year":"2024","unstructured":"Iqbal A, Amin R. Time series forecasting and anomaly detection using deep learning. Comput Chem Eng. 2024. https:\/\/doi.org\/10.1016\/j.compchemeng.2023.108560.","journal-title":"Comput Chem Eng"},{"key":"1274_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100793","author":"T Karthikeyan","year":"2023","unstructured":"Karthikeyan T, Govindarajan M, Vijayakumar V. An effective fraud detection using competitive swarm optimization based deep neural network. Meas Sensors. 2023. https:\/\/doi.org\/10.1016\/j.measen.2023.100793.","journal-title":"Meas Sensors"},{"key":"1274_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/2693022","author":"N Prabhakaran","year":"2023","unstructured":"Prabhakaran N, Nedunchelian R. Oppositional cat swarm optimization-based feature selection approach for credit card fraud detection. Comput Intell Neurosci. 2023. https:\/\/doi.org\/10.1155\/2023\/2693022.","journal-title":"Comput Intell Neurosci"},{"key":"1274_CR33","doi-asserted-by":"publisher","unstructured":"Mniai A, Tarik M, Jebari K. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. A Novel Framework for Credit Card Fraud Detection https:\/\/doi.org\/10.1109\/ACCESS.2017.DOI.","DOI":"10.1109\/ACCESS.2017.DOI"},{"issue":"2","key":"1274_CR34","doi-asserted-by":"publisher","first-page":"3171","DOI":"10.32604\/cmc.2023.036865","volume":"75","author":"CG Tekkali","year":"2023","unstructured":"Tekkali CG, Natarajan K. Smart fraud detection in E-transactions using synthetic minority oversampling and binary Harris hawks optimization. Comput Mater Contin. 2023;75(2):3171\u201387. https:\/\/doi.org\/10.32604\/cmc.2023.036865.","journal-title":"Comput Mater Contin"},{"key":"1274_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.04.193","author":"CG Tekkali","year":"2024","unstructured":"Tekkali CG, Natarajan K. Assessing CNN\u2019s performance with multiple optimization functions for credit card fraud detection. Procedia Comput Sci. 2024. https:\/\/doi.org\/10.1016\/j.procs.2024.04.193.","journal-title":"Procedia Comput Sci"},{"key":"1274_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124493","author":"VVK Reddy","year":"2024","unstructured":"Reddy VVK, Reddy RVK, Munaga MSK, Karnam B, Maddila SK, Kolli CS. Deep learning-based credit card fraud detection in federated learning. Expert Syst Appl. 2024. https:\/\/doi.org\/10.1016\/j.eswa.2024.124493.","journal-title":"Expert Syst Appl"},{"key":"1274_CR37","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.aej.2024.06.040","volume":"104","author":"SE Sorour","year":"2024","unstructured":"Sorour SE, AlBarrak KM, Abohany AA, El-Mageed AAA. Credit card fraud detection using the brown bear optimization algorithm. Alexandria Eng J. 2024;104:171\u201392. https:\/\/doi.org\/10.1016\/j.aej.2024.06.040.","journal-title":"Alexandria Eng J"},{"key":"1274_CR38","unstructured":"Krishnavardhan N, Govindarajan M, Achutha Rao SV. International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING Detection of Financial Fraudulent using Metaheuristic Algorithm with Support Vector Machine Based Classification. [Online]. Available: www.ijisae.org."},{"key":"1274_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/engproc2024060018","author":"K Niyazova","year":"2024","unstructured":"Niyazova K, Mukasheva A, Balbayev G, Iliev T, Mirambayeva N, Uzakbayev M. Ant colony optimization algorithm for feature selection in suspicious transaction detection system \u2020. Eng Proc. 2024. https:\/\/doi.org\/10.3390\/engproc2024060018.","journal-title":"Eng Proc"},{"key":"1274_CR40","doi-asserted-by":"publisher","first-page":"8002","DOI":"10.1109\/TEM.2024.3385298","volume":"71","author":"P Xia","year":"2024","unstructured":"Xia P, Zhu X, Charles V, Zhao X, Peng M. A novel heuristic-based selective ensemble prediction method for digital financial fraud risk. IEEE Trans Eng Manag. 2024;71:8002\u201318. https:\/\/doi.org\/10.1109\/TEM.2024.3385298.","journal-title":"IEEE Trans Eng Manag"},{"key":"1274_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-01896-w","author":"R Oak","year":"2024","unstructured":"Oak R. Detecting review fraud using metaheuristic graph neural networks. Int J Inf Technol. 2024. https:\/\/doi.org\/10.1007\/s41870-024-01896-w.","journal-title":"Int J Inf Technol"},{"key":"1274_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123149","author":"C Vairetti","year":"2024","unstructured":"Vairetti C, Assadi JL, Maldonado S. Efficient hybrid oversampling and intelligent undersampling for imbalanced big data classification. Expert Syst Appl. 2024. https:\/\/doi.org\/10.1016\/j.eswa.2024.123149.","journal-title":"Expert Syst Appl"},{"key":"1274_CR43","doi-asserted-by":"crossref","unstructured":"Elsoud EA et al. Under sampling techniques for handling unbalanced data with various imbalance rates: a comparative study. 2024. [Online]. Available: www.ijacsa.thesai.org.","DOI":"10.14569\/IJACSA.2024.01508124"},{"key":"1274_CR44","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00869-3","author":"JT Hancock","year":"2024","unstructured":"Hancock JT, Wang H, Khoshgoftaar TM, Liang Q. Data reduction techniques for highly imbalanced Medicare big data. J Big Data. 2024. https:\/\/doi.org\/10.1186\/s40537-023-00869-3.","journal-title":"J Big Data"},{"key":"1274_CR45","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2016.2654","author":"R Harel","year":"2017","unstructured":"Harel R, Spiegel O, Getz WM, Nathan R. Social foraging and individual consistency in following behaviour: testing the information centre hypothesis in free-ranging vultures. Proc R Soc Lond B Biol Sci. 2017. https:\/\/doi.org\/10.1098\/rspb.2016.2654.","journal-title":"Proc R Soc Lond B Biol Sci"},{"key":"1274_CR46","doi-asserted-by":"publisher","DOI":"10.1086\/670009","author":"O Spiegel","year":"2013","unstructured":"Spiegel O, Getz WM, Nathan R. Factors influencing foraging search efficiency: Why do scarce lappet-faced vultures outperform ubiquitous white-backed vultures? Am Nat. 2013. https:\/\/doi.org\/10.1086\/670009.","journal-title":"Am Nat"},{"key":"1274_CR47","doi-asserted-by":"publisher","DOI":"10.1186\/2051-3933-1-5","author":"O Spiegel","year":"2013","unstructured":"Spiegel O, Harel R, Getz WM, Nathan R. Mixed strategies of griffon vultures\u2019 (Gyps fulvus) response to food deprivation lead to a hump-shaped movement pattern. Mov Ecol. 2013. https:\/\/doi.org\/10.1186\/2051-3933-1-5.","journal-title":"Mov Ecol"},{"key":"1274_CR48","doi-asserted-by":"publisher","DOI":"10.3390\/life11101038","author":"M Pirastru","year":"2021","unstructured":"Pirastru M, Mereu P, Manca L, Bebbere D, Naitana S, Leoni GG. Anthropogenic drivers leading to population decline and genetic preservation of the Eurasian griffon vulture (Gyps fulvus). Life. 2021. https:\/\/doi.org\/10.3390\/life11101038.","journal-title":"Life"},{"key":"1274_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113122","author":"M Tubishat","year":"2020","unstructured":"Tubishat M, Idris N, Shuib L, Abushariah MAM, Mirjalili S. Improved salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst Appl. 2020. https:\/\/doi.org\/10.1016\/j.eswa.2019.113122.","journal-title":"Expert Syst Appl"},{"key":"1274_CR50","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00973-y","author":"RK Halder","year":"2024","unstructured":"Halder RK, Uddin MN, Uddin MA, Aryal S, Khraisat A. Enhancing k-nearest neighbor algorithm: a comprehensive review and performance analysis of modifications. J Big Data. 2024. https:\/\/doi.org\/10.1186\/s40537-024-00973-y.","journal-title":"J Big Data"},{"key":"1274_CR51","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C. XGBoost: a scalable tree boosting system. 2016. https:\/\/doi.org\/10.1145\/2939672.2939785.","DOI":"10.1145\/2939672.2939785"},{"key":"1274_CR52","unstructured":"Rokach L, Maimon O. Data mining with decision trees. [Online]. Available: http:\/\/www.worldscientific.com\/series\/smpai."},{"key":"1274_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120482","author":"S Xian","year":"2023","unstructured":"Xian S, Feng X. Meerkat optimization algorithm: a new meta-heuristic optimization algorithm for solving constrained engineering problems. Expert Syst Appl. 2023. https:\/\/doi.org\/10.1016\/j.eswa.2023.120482.","journal-title":"Expert Syst Appl"},{"key":"1274_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107408","author":"B Abdollahzadeh","year":"2021","unstructured":"Abdollahzadeh B, Gharehchopogh FS, Mirjalili S. African vultures optimization algorithm: a new nature-inspired metaheuristic algorithm for global optimization problems. Computers Ind Eng. 2021. https:\/\/doi.org\/10.1016\/j.cie.2021.107408.","journal-title":"Computers Ind Eng"},{"key":"1274_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107250","author":"L Abualigah","year":"2021","unstructured":"Abualigah L, Yousri D, Elaziz MA, Ewees AA, Al-qaness MAA, Gandomi AH. Aquila optimizer: a novel meta-heuristic optimization algorithm. Comput Ind Eng. 2021. https:\/\/doi.org\/10.1016\/j.cie.2021.107250.","journal-title":"Comput Ind Eng"},{"issue":"1","key":"1274_CR56","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/21642583.2019.1708830","volume":"8","author":"J Xue","year":"2020","unstructured":"Xue J, Shen B. A novel swarm intelligence optimization approach: sparrow search algorithm. Syst Sci Control Eng. 2020;8(1):22\u201334. https:\/\/doi.org\/10.1080\/21642583.2019.1708830.","journal-title":"Syst Sci Control Eng"},{"key":"1274_CR57","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.knosys.2018.08.030","volume":"163","author":"W Zhao","year":"2019","unstructured":"Zhao W, Wang L, Zhang Z. Atom search optimization and its application to solve a hydrogeologic parameter estimation problem. Knowl Based Syst. 2019;163:283\u2013304. https:\/\/doi.org\/10.1016\/j.knosys.2018.08.030.","journal-title":"Knowl Based Syst"},{"key":"1274_CR58","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.future.2019.07.015","volume":"101","author":"FA Hashim","year":"2019","unstructured":"Hashim FA, Houssein EH, Mabrouk MS, Al-Atabany W, Mirjalili S. Henry gas solubility optimization: a novel physics-based algorithm. Future Gener Comput Syst. 2019;101:646\u201367. https:\/\/doi.org\/10.1016\/j.future.2019.07.015.","journal-title":"Future Gener Comput Syst"},{"key":"1274_CR59","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H. Harris hawks optimization: algorithm and applications. Future Gener Comput Syst. 2019;97:849\u201372. https:\/\/doi.org\/10.1016\/j.future.2019.02.028.","journal-title":"Future Gener Comput Syst"},{"key":"1274_CR60","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.engappai.2019.01.001","volume":"80","author":"S Shadravan","year":"2019","unstructured":"Shadravan S, Naji HR, Bardsiri VK. The sailfish optimizer: a novel nature-inspired metaheuristic algorithm for solving constrained engineering optimization problems. Eng Appl Artif Intell. 2019;80:20\u201334. https:\/\/doi.org\/10.1016\/j.engappai.2019.01.001.","journal-title":"Eng Appl Artif Intell"},{"issue":"3\u20134","key":"1274_CR61","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s00521-013-1525-5","volume":"25","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Yang XS. Binary bat algorithm. Neural Comput Appl. 2014;25(3\u20134):663\u201381. https:\/\/doi.org\/10.1007\/s00521-013-1525-5.","journal-title":"Neural Comput Appl"},{"issue":"4","key":"1274_CR62","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s10489-017-1019-8","volume":"48","author":"SZ Mirjalili","year":"2018","unstructured":"Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I. Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell. 2018;48(4):805\u201320. https:\/\/doi.org\/10.1007\/s10489-017-1019-8.","journal-title":"Appl Intell"},{"issue":"1","key":"1274_CR63","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11721-007-0002-0","volume":"1","author":"R Poli","year":"2007","unstructured":"Poli R, Kennedy J, Blackwell T. Particle swarm optimization. Swarm Intell. 2007;1(1):33\u201357. https:\/\/doi.org\/10.1007\/s11721-007-0002-0.","journal-title":"Swarm Intell"},{"key":"1274_CR64","doi-asserted-by":"publisher","unstructured":"Torgo L, Ribeiro R. Precision and recall for regression. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 332\u2013346. https:\/\/doi.org\/10.1007\/978-3-642-04747-3_26.","DOI":"10.1007\/978-3-642-04747-3_26"},{"issue":"1","key":"1274_CR65","doi-asserted-by":"publisher","first-page":"37","DOI":"10.9735\/2229-3981","volume":"2","author":"DM Powers","year":"2011","unstructured":"Powers DM. Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. Artic J Mach Learn Technol. 2011;2(1):37\u201363. https:\/\/doi.org\/10.9735\/2229-3981.","journal-title":"Artic J Mach Learn Technol"},{"issue":"3","key":"1274_CR66","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10994-021-05964-1","volume":"110","author":"DJ Hand","year":"2021","unstructured":"Hand DJ, Christen P, Kirielle N. F*: an interpretable transformation of the F-measure. Mach Learn. 2021;110(3):451\u20136. https:\/\/doi.org\/10.1007\/s10994-021-05964-1.","journal-title":"Mach Learn"},{"issue":"3","key":"1274_CR67","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1590\/S0004-27492013000300008","volume":"76","author":"FR Silva","year":"2013","unstructured":"Silva FR, Vidotti VG, Cremasco F, Dias M, Gomi ES, Costa VP. Sensitivity and specificity of machine learning classifiers for glaucoma diagnosis using spectral domain OCT and standard automated perimetry. Arq Bras Oftalmol. 2013;76(3):170\u20134. https:\/\/doi.org\/10.1590\/S0004-27492013000300008.","journal-title":"Arq Bras Oftalmol"},{"key":"1274_CR68","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph191610213","author":"B Wi\u0119ckowska","year":"2022","unstructured":"Wi\u0119ckowska B, Kubiak KB, J\u00f3\u017awiak P, Moryson W, Stawi\u0144ska-Witoszy\u0144ska B. Cohen\u2019s kappa coefficient as a measure to assess classification improvement following the addition of a new marker to a regression model. Int J Environ Res Public Health. 2022. https:\/\/doi.org\/10.3390\/ijerph191610213.","journal-title":"Int J Environ Res Public Health"},{"key":"1274_CR69","unstructured":"Dj Novakovi J, Veljovi A, Ili SS, Papi Z, Tomovi M. Evaluation of classification models in machine learning. 2017."},{"key":"1274_CR70","doi-asserted-by":"publisher","first-page":"78368","DOI":"10.1109\/ACCESS.2021.3084050","volume":"9","author":"D Chicco","year":"2021","unstructured":"Chicco D, Warrens MJ, Jurman G. The Matthews correlation coefficient (MCC) is more informative than Cohen\u2019s kappa and Brier score in binary classification assessment. IEEE Access. 2021;9:78368\u201381. https:\/\/doi.org\/10.1109\/ACCESS.2021.3084050.","journal-title":"IEEE Access"},{"key":"1274_CR71","doi-asserted-by":"publisher","unstructured":"Clark JA, Harman M, Clark J. Metrics are fitness functions too. 2004, https:\/\/doi.org\/10.1109\/METRICS.2004.30.","DOI":"10.1109\/METRICS.2004.30"},{"issue":"11","key":"1274_CR72","doi-asserted-by":"publisher","first-page":"107","DOI":"10.5958\/2249-7315.2016.01179.5","volume":"6","author":"DAAG Singh","year":"2016","unstructured":"Singh DAAG, Balamurugan SAA, Leavline EJ. Performance metrics for feature selection, clustering and classification algorithms. Asian J Res Soc Sci Humanit. 2016;6(11):107. https:\/\/doi.org\/10.5958\/2249-7315.2016.01179.5.","journal-title":"Asian J Res Soc Sci Humanit"},{"key":"1274_CR73","unstructured":"Vujovi\u0107 \u017d\u0110. Classification model evaluation metrics. [Online]. Available: www.ijacsa.thesai.org."},{"key":"1274_CR74","unstructured":"Shahapurkar AS. Accurate fraud detection in credit card transactions using hybrid heuristic and meta-heuristic algorithms. [Online]. Available: https:\/\/ssrn.com\/abstract=3834947."},{"key":"1274_CR75","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00573-8","author":"E Ileberi","year":"2022","unstructured":"Ileberi E, Sun Y, Wang Z. A machine learning based credit card fraud detection using the GA algorithm for feature selection. J Big Data. 2022. https:\/\/doi.org\/10.1186\/s40537-022-00573-8.","journal-title":"J Big Data"},{"issue":"1","key":"1274_CR76","doi-asserted-by":"publisher","first-page":"463","DOI":"10.5267\/j.ijdns.2023.9.009","volume":"8","author":"E Rawashdeh","year":"2024","unstructured":"Rawashdeh E, Al-Ramahi N, Ahmad H, Zaghloul R. Efficient credit card fraud detection using evolutionary hybrid feature selection and random weight networks. Int J Data Netw Sci. 2024;8(1):463\u201372. https:\/\/doi.org\/10.5267\/j.ijdns.2023.9.009.","journal-title":"Int J Data Netw Sci"},{"key":"1274_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111491","author":"SA Alex","year":"2024","unstructured":"Alex SA, Jesu Vedha Nayahi J, Kaddoura S. Deep convolutional neural networks with genetic algorithm-based synthetic minority over-sampling technique for improved imbalanced data classification. Appl Soft Comput. 2024. https:\/\/doi.org\/10.1016\/j.asoc.2024.111491.","journal-title":"Appl Soft Comput"},{"key":"1274_CR78","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00882-0","author":"I Emmanuel","year":"2024","unstructured":"Emmanuel I, Sun Y, Wang Z. A machine learning-based credit risk prediction engine system using a stacked classifier and a filter-based feature selection method. J Big Data. 2024. https:\/\/doi.org\/10.1186\/s40537-024-00882-0.","journal-title":"J Big Data"},{"issue":"1","key":"1274_CR79","doi-asserted-by":"publisher","first-page":"92","DOI":"10.52465\/joscex.v5i1.302","volume":"5","author":"DAA Pertiwi","year":"2024","unstructured":"Pertiwi DAA, Ahmad K, Salahudin SN, Annegrat AM, Muslim MA. Using genetic algorithm feature selection to optimize XGBoost performance in Australian credit. J Soft Comput Explor. 2024;5(1):92\u20138. https:\/\/doi.org\/10.52465\/joscex.v5i1.302.","journal-title":"J Soft Comput Explor"},{"key":"1274_CR80","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1468015","author":"A Singh","year":"2022","unstructured":"Singh A, Jain A, Biable SE. Financial fraud detection approach based on Firefly optimization algorithm and support vector machine. Appl Comput Intell Soft Comput. 2022. https:\/\/doi.org\/10.1155\/2022\/1468015.","journal-title":"Appl Comput Intell Soft Comput"},{"issue":"1","key":"1274_CR81","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","volume":"1","author":"J Derrac","year":"2011","unstructured":"Derrac J, Garc\u00eda S, Molina D, Herrera F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput. 2011;1(1):3\u201318. https:\/\/doi.org\/10.1016\/j.swevo.2011.02.002.","journal-title":"Swarm Evol Comput"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01274-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01274-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01274-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T09:22:58Z","timestamp":1758100978000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01274-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":81,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1274"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01274-8","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,17]]},"assertion":[{"value":"19 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"215"}}