{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:14:54Z","timestamp":1767953694557,"version":"3.49.0"},"reference-count":49,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019725","name":"Deanship of Scientific Research, Prince Sattam bin Abdulaziz University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Artif. Intell."],"abstract":"<jats:sec>\n                    <jats:title>Introduction<\/jats:title>\n                    <jats:p>The growing prevalence of fraud and malware, fueled by increased online activity and digital transactions, has exposed the shortcomings of conventional detection systems, particularly in handling novel or obfuscated threats, class imbalance, and high-dimensional data with many irrelevant features. This underscores the need for robust and adaptive detection methodologies.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Methods<\/jats:title>\n                    <jats:p>This study proposes an advanced Fraud Detection (FD) methodology, BKOA-GOBL, that enhances the Binary Kepler Optimization Algorithm (BKOA) by integrating Ghost Opposition-Based Learning (GOBL) to improve Feature Selection (FS). The BKOA dynamically models gravitational attraction, planetary motion mechanics, and cyclic control to maintain a balance between exploration and exploitation. At the same time, the GOBL enhances broader search diversification and prevents early convergence, allowing the local optimum to be avoided. The Random Under-Sampling (RUS) technique is utilized to mitigate the class imbalance in fraud benchmarks.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results and discussion<\/jats:title>\n                    <jats:p>\n                      Experimental validation is conducted on five real-world benchmarks, including the Australian, European, CIC-MalMem-2022, Synthetic Financial Transaction Log, and Real vs Fake Job Postings datasets, using k-Nearest Neighbors (\n                      <jats:italic>K<\/jats:italic>\n                      -NN) and XGBoost (Xgb-tree) classifiers. The BKOA-GOBL achieves outstanding performance, reaching classification accuracies up to 99.96% in some benchmarks and corresponding feature reduction rates up to 81.82%. Precision, recall, ROC_AUC, and F1-scores were consistently high across most benchmarks, demonstrating reliable and balanced detection. However, some challenging benchmarks\u2014such as the Real vs Fake Job Postings dataset using\n                      <jats:italic>k<\/jats:italic>\n                      -NN classifier\u2014returned lower scores (Precision = 76.14%, Recall = 66.55%, F1-score = 71.00%, and ROC_AUC = 74.15%), reflecting the difficulty of the problem. Comparative analyses against 12 recent Metaheuristic Algorithms (MHAs) and Machine Learning (ML) classifiers confirmed BKOA-GOBL's dominance in terms of accuracy and computational efficiency. Its statistical superiority is confirmed by the Wilcoxon rank-sum test, underscoring its robustness, adaptability, and effectiveness in high-dimensional fraud and malware detection tasks and real-world fraud and malware detection scenarios.\n                    <\/jats:p>\n                  <\/jats:sec>","DOI":"10.3389\/frai.2025.1710387","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T06:38:13Z","timestamp":1767940693000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Tackling fraud detection with an enhanced Kepler optimization and ghost opposition-based learning"],"prefix":"10.3389","volume":"8","author":[{"given":"Ria H.","family":"Egami","sequence":"first","affiliation":[]},{"given":"Amr A.","family":"Abd El-Mageed","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Gafar","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Abohany","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2026,1,9]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"109300","DOI":"10.1016\/j.cie.2023.109300","article-title":"Effective feature selection strategy for supervised classification based on an improved binary Aquila optimization algorithm","volume":"181","author":"Abd El-Mageed","year":"2023","journal-title":"Comput. Ind. Eng"},{"key":"B2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1186\/s40537-023-00858-6","article-title":"CNN-IKOA: convolutional neural network with improved Kepler optimization algorithm for image segmentation: experimental validation and numerical exploration","volume":"11","author":"Abdel-Basset","year":"2024","journal-title":"J. Big Data"},{"key":"B3","doi-asserted-by":"publisher","first-page":"110454","DOI":"10.1016\/j.knosys.2023.110454","article-title":"Kepler optimization algorithm: a new metaheuristic algorithm inspired by Kepler's laws of planetary motion","volume":"268","author":"Abdel-Basset","year":"","journal-title":"Knowl. Based Syst"},{"key":"B4","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.aej.2023.09.072","article-title":"A novel binary Kepler optimization algorithm for 0-1 knapsack problems: methods and applications","volume":"82","author":"Abdel-Basset","year":"","journal-title":"Alex. Eng. J"},{"key":"B5","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.3390\/s20082311","article-title":"An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks","volume":"20","author":"Adil","year":"2020","journal-title":"Sensors"},{"key":"B6","doi-asserted-by":"publisher","first-page":"4003","DOI":"10.3390\/electronics11234003","article-title":"Survey of credit card anomaly and fraud detection using sampling techniques","volume":"11","author":"Alamri","year":"2022","journal-title":"Electronics"},{"key":"B7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.32604\/iasc.2023.036247","article-title":"An efficient approach based on remora optimization algorithm and levy flight for intrusion detection","volume":"37","author":"Alashjaee","year":"2023","journal-title":"Intell. Autom. Soft Comput"},{"key":"B8","first-page":"98","article-title":"An investigator digital forensics frequencies particle swarm optimization for dectection and classification of apt attack in fog computing enviroment (IDF-FPSO)","volume":"15","author":"Almaiah","year":"2020","journal-title":"J. Theor. Appl. Inf. Technol"},{"key":"B9","doi-asserted-by":"publisher","first-page":"13686","DOI":"10.1109\/ACCESS.2025.3531662","article-title":"Imbalanced data problem in machine learning: a review","volume":"13","author":"Altalhan","year":"2025","journal-title":"IEEE Access"},{"key":"B10","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10791-008-9066-8","article-title":"A comparison of extrinsic clustering evaluation metrics based on formal constraints","volume":"12","author":"Amig\u00f3","year":"2009","journal-title":"Inf. Retr. Boston"},{"key":"B11","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1613\/jair.3401","article-title":"Combining evaluation metrics via the unanimous improvement ratio and its application to clustering tasks","volume":"42","author":"Amig\u00f3","year":"2011","journal-title":"J. Artif. Intell. Res"},{"key":"B12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.gltp.2021.01.006","article-title":"Credit card fraud detection using artificial neural network","volume":"2","author":"Asha","year":"2021","journal-title":"Glob. Tran. Proc"},{"key":"B13","unstructured":"CIC-MalMem-2022 Dataset\n          \n          2022"},{"key":"B14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-030-31277-0_15","article-title":"\u201cAn efficient network ids for cloud environments based on a combination of deep learning and an optimized self-adaptive heuristic search algorithm,\u201d","volume-title":"Networked Systems: 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19-21, 2019, Revised Selected Papers 7","author":"Chiba","year":"2019"},{"key":"B15","first-page":"17","article-title":"\u201cProcess mining based on clustering: a quest for precision,\u201d","volume-title":"International Conference on Business Process Management","author":"De Medeiros","year":"2007"},{"key":"B16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","article-title":"A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms","volume":"1","author":"Derrac","year":"2011","journal-title":"Swarm Evol. Comput"},{"key":"B17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s40537-025-01125-6","article-title":"Enhanced binary kepler optimization algorithm for effective feature selection of supervised learning classification","volume":"12","author":"El-Mageed","year":"2025","journal-title":"J. Big Data"},{"key":"B18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s40537-024-00902-z","article-title":"Gene selection via improved nuclear reaction optimization algorithm for cancer classification in high-dimensional data","volume":"11","author":"El-Mageed","year":"2024","journal-title":"J. Big Data"},{"key":"B19","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.14569\/IJACSA.2024.01508124","article-title":"Under sampling techniques for handling unbalanced data with various imbalance rates: a comparative study","volume":"15","author":"Elsoud","year":"2024","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"B20","doi-asserted-by":"publisher","first-page":"119562","DOI":"10.1016\/j.eswa.2023.119562","article-title":"A novel combined approach based on deep autoencoder and deep classifiers for credit card fraud detection","volume":"217","author":"Fanai","year":"2023","journal-title":"Expert Syst. Appl"},{"key":"B21","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1631\/FITEE.1601491","article-title":"Discovering optimal features using static analysis and a genetic search based method for android malware detection","volume":"19","author":"Firdaus","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng"},{"key":"B22","doi-asserted-by":"publisher","first-page":"116768","DOI":"10.1109\/ACCESS.2021.3105914","article-title":"Training neural networks by enhance grasshopper optimization algorithm for spam detection system","volume":"9","author":"Ghaleb","year":"2021","journal-title":"IEEE Access"},{"key":"B23","doi-asserted-by":"publisher","first-page":"111960","DOI":"10.1016\/j.knosys.2024.111960","article-title":"Improved kepler optimization algorithm for enhanced feature selection in liver disease classification","volume":"297","author":"Houssein","year":"2024","journal-title":"Knowl. Based Syst"},{"key":"B24","doi-asserted-by":"publisher","first-page":"116964","DOI":"10.1016\/j.cma.2024.116964","article-title":"CGKOA: an enhanced Kepler optimization algorithm for multi-domain optimization problems","volume":"425","author":"Hu","year":"2024","journal-title":"Comput. Methods Appl. Mech. Eng"},{"key":"B25","doi-asserted-by":"publisher","first-page":"111616","DOI":"10.1016\/j.knosys.2024.111616","article-title":"Improved binary meerkat optimization algorithm for efficient feature selection of supervised learning classification","volume":"292","author":"Hussien","year":"2024","journal-title":"Knowl. Based Syst"},{"key":"B26","unstructured":"European Credit Card Transactions Dataset\n          \n          2013"},{"key":"B27","unstructured":"Synthetic Financial Transaction Log for Fraud Detection\n          \n          2016"},{"key":"B28","unstructured":"Real vs Fake Job Postings Prediction Dataset\n          \n          2020"},{"key":"B29","doi-asserted-by":"publisher","first-page":"871","DOI":"10.14569\/IJACSA.2024.0150387","article-title":"Enhancing cryptojacking detection through hybrid black widow optimization and generative adversarial networks","volume":"15","author":"Kale","year":"2024","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"B30","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.3390\/electronics14101988","article-title":"Performance analysis of cloud computing task scheduling using metaheuristic algorithms in ddos and normal environments","volume":"14","author":"Kaplan","year":"2025","journal-title":"Electronics"},{"key":"B31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2017.09.010","article-title":"Opposition based learning: a literature review","volume":"39","author":"Mahdavi","year":"2018","journal-title":"Swarm Evol. Comput"},{"key":"B32","doi-asserted-by":"publisher","first-page":"112776","DOI":"10.1109\/ACCESS.2023.3323842","article-title":"A novel framework for credit card fraud detection","volume":"11","author":"Mniai","year":"2023","journal-title":"IEEE Access"},{"key":"B33","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1038\/s41598-024-52416-6","article-title":"Novel hybrid kepler optimization algorithm for parameter estimation of photovoltaic modules","volume":"14","author":"Mohamed","year":"2024","journal-title":"Sci. Rep"},{"key":"B34","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.3390\/math12142250","article-title":"CCFD: efficient credit card fraud detection using meta-heuristic techniques and machine learning algorithms","volume":"12","author":"Mosa","year":"2024","journal-title":"Mathematics"},{"key":"B35","doi-asserted-by":"publisher","first-page":"1398565","DOI":"10.3389\/fmed.2024.1398565","article-title":"Compact machine learning model for the accurate prediction of first 24-hour survival of mechanically ventilated patients","volume":"11","author":"Nguyen","year":"2024","journal-title":"Front. Med"},{"key":"B36","doi-asserted-by":"publisher","first-page":"2693022","DOI":"10.1155\/2023\/2693022","article-title":"Oppositional cat swarm optimization-based feature selection approach for credit card fraud detection","volume":"2023","author":"Prabhakaran","year":"2023","journal-title":"Comput. Intell. Neurosci"},{"key":"B37","doi-asserted-by":"publisher","first-page":"15387","DOI":"10.1007\/s00521-020-04986-5","article-title":"A stacked ensemble learning model for intrusion detection in wireless network","volume":"34","author":"Rajadurai","year":"2022","journal-title":"Neural Comput. Appl"},{"key":"B38","doi-asserted-by":"publisher","first-page":"48343","DOI":"10.1109\/ACCESS.2025.3550378","article-title":"Leveraging cyberattack news tweets for advanced threat detection and classification using ensemble of deep learning models with wolverine optimization algorithm","volume":"13","author":"Ramesh","year":"2025","journal-title":"IEEE Access"},{"key":"B39","doi-asserted-by":"publisher","first-page":"101207","DOI":"10.1016\/j.elerap.2022.101207","article-title":"Fraud detection and prevention in e-commerce: a systematic literature review","volume":"56","author":"Rodrigues","year":"2022","journal-title":"Electron. Commer. Res. Appl"},{"key":"B40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0007087400001813","article-title":"Kepler's laws of planetary motion: 1609-1666","volume":"2","author":"Russell","year":"1964","journal-title":"Br. J. Hist. Sci"},{"key":"B41","doi-asserted-by":"publisher","first-page":"1468015","DOI":"10.1155\/2022\/1468015","article-title":"Financial fraud detection approach based on firefly optimization algorithm and support vector machine","volume":"2022","author":"Singh","year":"2022","journal-title":"Appl. Comput. Intell. Soft Comput"},{"key":"B42","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/CISES54857.2022.9844381","article-title":"\u201cMachine learning based intrusion detection system for minority attacks classification,\u201d","volume-title":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","author":"Singh","year":"2022"},{"key":"B43","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.aej.2024.06.040","article-title":"Credit card fraud detection using the brown bear optimization algorithm","volume":"104","author":"Sorour","year":"2024","journal-title":"Alex. Eng. J"},{"key":"B44","volume-title":"Kepler's Physical Astronomy, Volume 13","author":"Stephenson","year":"2012"},{"key":"B45","doi-asserted-by":"publisher","first-page":"134779","DOI":"10.1109\/ACCESS.2024.3415355","article-title":"Meta-sonifieddroid: metaheuristics for optimizing sonified android malware detection","volume":"12","author":"Tarwireyi","year":"2024","journal-title":"IEEE Access"},{"key":"B46","first-page":"695","article-title":"\u201cOpposition-based learning: a new scheme for machine intelligence,\u201d","volume-title":"International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), Volume 1","author":"Tizhoosh","year":"2005"},{"key":"B47","doi-asserted-by":"publisher","first-page":"111722","DOI":"10.1016\/j.asoc.2024.111722","article-title":"Processing 2d barcode data with metaheuristic based cnn models and detection of malicious pdf files","volume":"161","author":"To\u011fa\u00e7ar","year":"2024","journal-title":"Appl. Soft Comput"},{"key":"B48","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.dcan.2023.03.002","article-title":"NFA: a neural factorization autoencoder based online telephony fraud detection","volume":"10","author":"Wahid","year":"2023","journal-title":"Digit. Commun. Netw"},{"key":"B49","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-981-4585-18-7_2","article-title":"\u201cAn application of oversampling, undersampling, bagging and boosting in handling imbalanced datasets,\u201d","volume-title":"Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)","author":"Yap","year":"2014"}],"container-title":["Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1710387\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T06:38:16Z","timestamp":1767940696000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1710387\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,9]]},"references-count":49,"alternative-id":["10.3389\/frai.2025.1710387"],"URL":"https:\/\/doi.org\/10.3389\/frai.2025.1710387","relation":{},"ISSN":["2624-8212"],"issn-type":[{"value":"2624-8212","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,9]]},"article-number":"1710387"}}