{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T21:41:23Z","timestamp":1772660483280,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Credit card fraud detection is a critical challenge in the financial sector due to the rapidly evolving tactics of fraudsters and the significant class imbalance betweenegitimate and fraudulent transactions. Traditional models, while effective to some extent, often suffer from high false positive rates and fail to generalize well to emerging fraud patterns. In this paper, we propose a novel approach that integrates a Mixture of Experts (MoE) model with a Deep Neural Network-based Synthetic Minority Over-sampling Technique (DNN-SMOTE) to enhance fraud detection performance. The MoE modeleverages multiple specialized expert networks, each trained to detect specific types of fraud, while the DNN-SMOTE generates high-quality synthetic samples to address the class imbalance. Our experimental results on a publicly available dataset demonstrate that the proposed method achieves a classification accuracy of 99.93%, a true positive rate of 84.69%, and a true negative rate of 99.95%. The Matthews Correlation Coefficient (MCC) of 0.7883 further highlights the model\u2019s balanced performance in detecting fraudulent transactions. These results underscore the effectiveness of combining MoE with DNN-SMOTE, offering a robust solution for real-world credit card fraud detection scenarios.<\/jats:p>","DOI":"10.3390\/bdcc8110151","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T05:30:53Z","timestamp":1730784653000},"page":"151","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Leveraging Mixture of Experts and Deep Learning-Based Data Rebalancing to Improve Credit Fraud Detection"],"prefix":"10.3390","volume":"8","author":[{"given":"Zeyuan","family":"Yang","sequence":"first","affiliation":[{"name":"College of Economics and Management, Nanjing Forestry University, Nanjing 210037, China"}]},{"given":"Yixuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York University, New York, NY 10012, USA"}]},{"given":"Haokun","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Sheffield, Sheffield S1 4DP, UK"}]},{"given":"Qiang","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Economics and Management, Nanjing Forestry University, Nanjing 210037, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.14445\/22312803\/IJCTT-V71I10P109","article-title":"Credit Card Analytics: A Review of Fraud Detection and Risk Assessment Techniques","volume":"71","author":"Patel","year":"2023","journal-title":"Int. J. Comput. Trends Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1016\/j.matpr.2021.04.323","article-title":"Big-data driven approaches in materials science for real-time detection and prevention of fraud","volume":"81","author":"Madhuri","year":"2023","journal-title":"Mater. Today Proc."},{"key":"ref_3","first-page":"145","article-title":"Credit card fraud detection in the era of disruptive technologies: A systematic review","volume":"35","author":"Cherif","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_4","first-page":"76","article-title":"Detection of credit card fraud: State of art","volume":"18","author":"Sadgali","year":"2018","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_5","first-page":"123","article-title":"Data-driven approaches in FinTech: A survey","volume":"49","author":"Tian","year":"2021","journal-title":"Inf. Discov. Deliv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s41060-021-00258-0","article-title":"Incrementalearning strategies for credit cards fraud detection","volume":"12","author":"Lebichot","year":"2021","journal-title":"Int. J. Data Sci. Anal."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1108\/13590790810907236","article-title":"Credit card fraud: Awareness and prevention","volume":"15","author":"Barker","year":"2008","journal-title":"J. Financ. Crime"},{"key":"ref_8","unstructured":"Fair, L. (2024, August 12). Facts About Fraud From the FTC\u2014And What It Means for Your Business, Available online: https:\/\/www.ftc.gov\/business-guidance\/blog\/2024\/02\/facts-about-fraud-ftc-what-it-means-your-business."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lin, T.H., and Jiang, J.R. (2021). Credit card fraud detection with autoencoder and probabilistic random forest. Mathematics, 9.","DOI":"10.3390\/math9212683"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Du, H., Lv, L., Guo, A., and Wang, H. (2023). AutoEncoder and LightGBM for credit card fraud detection problems. Symmetry, 15.","DOI":"10.3390\/sym15040870"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"83680","DOI":"10.1109\/ACCESS.2023.3302339","article-title":"Credit card fraud detection based on improved Variational Autoencoder Generative Adversarial Network","volume":"11","author":"Ding","year":"2023","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Pumsirirat, A., and Liu, Y. (2018). Credit card fraud detection using deepearning based on auto-encoder and restricted boltzmann machine. Int. J. Adv. Comput. Sci. Appl., 9.","DOI":"10.14569\/IJACSA.2018.090103"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"14277","DOI":"10.1109\/ACCESS.2018.2806420","article-title":"Credit card fraud detection using AdaBoost and majority voting","volume":"6","author":"Randhawa","year":"2018","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Khalid, A.R., Owoh, N., Uthmani, O., Ashawa, M., Osamor, J., and Adejoh, J. (2024). Enhancing credit card fraud detection: An ensemble machineearning approach. Big Data Cogn. Comput., 8.","DOI":"10.3390\/bdcc8010006"},{"key":"ref_15","first-page":"7103","article-title":"Mixture-of-experts with expert choice routing","volume":"35","author":"Zhou","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1109\/TNNLS.2012.2200299","article-title":"Twenty years of mixture of experts","volume":"23","author":"Yuksel","year":"2012","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: Synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"6390","DOI":"10.1109\/TNNLS.2021.3136503","article-title":"DeepSMOTE: Fusing deepearning and SMOTE for imbalanced data","volume":"34","author":"Dablain","year":"2022","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","article-title":"Intelligent financial fraud detection: A comprehensive review","volume":"57","author":"West","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_20","unstructured":"Raj, S.B.E., and Portia, A.A. (2011, January 18\u201319). Analysis on credit card fraud detection methods. Proceedings of the 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET), Tirunelveli, India."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","article-title":"Fraud detection system: A survey","volume":"68","author":"Abdallah","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"Bolton","year":"2002","journal-title":"Stat. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/jisp.2007070103","article-title":"A rule-based and game-theoretic approach to online credit card fraud detection","volume":"1","author":"Vatsa","year":"2007","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"ref_24","unstructured":"Gopal, R.K., and Meher, S.K. (2007). A Rule-Based Approach for Anomaly Detection in Subscriber Usage Pattern, World Academy of Science, Engineering and Technology."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Duffield, N., Haffner, P., Krishnamurthy, B., and Ringberg, H. (2009, January 19\u201325). Rule-based anomaly detection on IP flows. Proceedings of the IEEE INFOCOM 2009, Rio De Janeiro, Brazil.","DOI":"10.1109\/INFCOM.2009.5061947"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"759","DOI":"10.11591\/ijece.v14i1.pp759-771","article-title":"A rule-based machineearning model for financial fraud detection","volume":"14","author":"Islam","year":"2024","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/S0924-0136(03)00525-9","article-title":"Towards integration of hybrid models for optimized machining performance in intelligent manufacturing systems","volume":"139","author":"Jawahir","year":"2003","journal-title":"J. Mater. Process. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s10845-019-01488-7","article-title":"Tool wear predicting based on multi-domain feature fusion by deep convolutional neural network in milling operations","volume":"31","author":"Huang","year":"2020","journal-title":"J. Intell. Manuf."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/s10115-023-02016-z","article-title":"Enhanced autoencoder-based fraud detection: A novel approach with noise factor encoding and SMOTE","volume":"66","year":"2024","journal-title":"Knowl. Inf. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1198\/10618600152418584","article-title":"The art of data augmentation","volume":"10","author":"Meng","year":"2001","journal-title":"J. Comput. Graph. Stat."},{"key":"ref_31","unstructured":"Zhong, Z., Zheng, L., Kang, G., Li, S., and Yang, Y. (2020, January 7\u201312). Random erasing data augmentation. Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1007\/s11831-019-09344-w","article-title":"A survey of deepearning and its applications: A new paradigm to machineearning","volume":"27","author":"Dargan","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wong, S.C., Gatt, A., Stamatescu, V., and McDonnell, M.D. (December, January 30). Understanding data augmentation for classification: When to warp?. Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Gold Coast, QLD, Australia.","DOI":"10.1109\/DICTA.2016.7797091"},{"key":"ref_34","unstructured":"Jiang, L., Huang, D., Liu, M., and Yang, W. (2020, January 13\u201318). Beyond synthetic noise: Deepearning on controlled noisyabels. Proceedings of the International Conference on Machine Learning, PMLR, Virtual."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"100258","DOI":"10.1016\/j.array.2022.100258","article-title":"Data augmentation: A comprehensive survey of modern approaches","volume":"16","author":"Mumuni","year":"2022","journal-title":"Array"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Garcea, F., Serra, A., Lamberti, F., and Morra, L. (2023). Data augmentation for medical imaging: A systematiciterature review. Comput. Biol. Med., 152.","DOI":"10.1016\/j.compbiomed.2022.106391"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"025016","DOI":"10.1088\/2632-2153\/abd615","article-title":"Data augmentation with Mobius transformations","volume":"2","author":"Zhou","year":"2021","journal-title":"Mach. Learn. Sci. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"15503","DOI":"10.1007\/s00521-020-04748-3","article-title":"A survey on face data augmentation for the training of deep neural networks","volume":"32","author":"Wang","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_39","unstructured":"(2024, August 13). Worldline and the Machine Learning Group of ULB (Universit\u00e9 Libre de Bruxelles) Credit Card Fraud Detection. Available online: https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Awoyemi, J.O., Adetunmbi, A.O., and Oluwadare, S.A. (2017, January 29\u201331). Credit card fraud detection using machineearning techniques: A comparative analysis. Proceedings of the 2017 International Conference on Computing Networking and Informatics (ICCNI), Lagos, Nigeria.","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"78368","DOI":"10.1109\/ACCESS.2021.3084050","article-title":"The Matthews correlation coefficient (MCC) is more informative than Cohen\u2019s Kappa and Brier score in binary classification assessment","volume":"9","author":"Chicco","year":"2021","journal-title":"IEEE Access"},{"key":"ref_42","first-page":"307","article-title":"Receiver operating characteristic (ROC) methodology: The state of the art","volume":"29","author":"Hanley","year":"1989","journal-title":"Crit Rev Diagn Imaging"},{"key":"ref_43","first-page":"857","article-title":"Stochastic neighbor embedding","volume":"15","author":"Hinton","year":"2002","journal-title":"Adv. Neural Inf. Process. Syst."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/11\/151\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:26:24Z","timestamp":1760113584000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/11\/151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,5]]},"references-count":43,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["bdcc8110151"],"URL":"https:\/\/doi.org\/10.3390\/bdcc8110151","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,5]]}}}