{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:52:18Z","timestamp":1776275538227,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>The surge in credit fraud incidents poses a critical threat to financial systems, driving the need for robust and adaptive fraud detection solutions. While various predictive models have been developed, existing approaches often struggle with two persistent challenges: extreme class imbalance and delays in detecting fraudulent activity. In this study, we propose an unsupervised Adversarial Autoencoder (AAE) framework designed to tackle these challenges simultaneously. The results highlight the potential of our approach as a scalable, interpretable, and adaptive solution for real-world credit fraud detection systems.<\/jats:p>","DOI":"10.3390\/bdcc9070168","type":"journal-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T05:53:13Z","timestamp":1750917193000},"page":"168","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Addressing Credit Card Fraud Detection Challenges with Adversarial Autoencoders"],"prefix":"10.3390","volume":"9","author":[{"given":"Shiyu","family":"Ma","sequence":"first","affiliation":[{"name":"Faculty of Science, National University of Singapore, Singapore 117546, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5522-4058","authenticated-orcid":false,"given":"Carol Anne","family":"Hargreaves","sequence":"additional","affiliation":[{"name":"Faculty of Science, National University of Singapore, Singapore 117546, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,26]]},"reference":[{"key":"ref_1","unstructured":"Federal Trade Commission (FTC) (2025, June 15). Consumer Sentinel Network Data Book, Available online: https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/CSN+Annual+Data+Book+2021+Final+PDF.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"Bolton","year":"2002","journal-title":"Stat. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","article-title":"Combining unsupervised and supervised learning in credit card fraud detection","volume":"517","author":"Carcillo","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_4","unstructured":"Phua, C., Lee, V., Smith, K., and Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research. arXiv."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"12650","DOI":"10.1016\/j.eswa.2012.05.018","article-title":"Employing transaction aggregation strategy to detect credit card fraud","volume":"39","author":"Jha","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.gltp.2021.01.006","article-title":"Credit card fraud detection using artificial neural network","volume":"2","author":"Asha","year":"2021","journal-title":"Glob. Transit. Proc."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","article-title":"The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature","volume":"50","author":"Ngai","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_8","unstructured":"Aleskerov, E., Freisleben, B., and Rao, B. (1997, January 24\u201325). CARDWATCH: A neural network-based database mining system for credit card fraud detection. Proceedings of the IEEE\/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), New York, NY, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Stojanovic, A., Aouada, D., and Ottersten, B. (2013, January 4\u20137). Cost-sensitive credit card fraud detection using Bayes minimum risk. Proceedings of the 2013 12th International Conference on Machine Learning and Applications, ICMLA 2013, Washington, DC, USA.","DOI":"10.1109\/ICMLA.2013.68"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., and Chawla, S. (2019). Deep Learning for Anomaly Detection: A Survey. arXiv.","DOI":"10.1145\/3394486.3406704"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","article-title":"Using generative adversarial networks for improving classification effectiveness in credit card fraud detection","volume":"479","author":"Fiore","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_12","unstructured":"(2025, June 15). Kaggle Credit Card Fraud Detection Dataset 2023. Available online: https:\/\/www.kaggle.com\/datasets\/nelgiriyewithana\/credit-card-fraud-detection-dataset-2023."},{"key":"ref_13","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014). Generative adversarial nets. Adv. Neural Inf. Process. Syst., 27."},{"key":"ref_14","unstructured":"Niu, X., Wang, L., and Yang, X. (2019). A comparison study of credit card fraud detection: Supervised versus unsupervised. arXiv."},{"key":"ref_15","first-page":"57","article-title":"Credit card fraud and detection techniques: A review","volume":"4","author":"Delamaire","year":"2009","journal-title":"Banks Bank Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"24","DOI":"10.3991\/ijim.v15i05.17173","article-title":"Credit card fraud detection using fuzzy rough nearest neighbor and sequential minimal optimization with logistic regression","volume":"15","author":"Hussein","year":"2021","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/IDA-195011","article-title":"Comparative study on credit card fraud detection based on different support vector machines","volume":"25","author":"Li","year":"2021","journal-title":"Intell. Data Anal."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Jeragh, M., and AlSulaimi, M. (2018, January 30\u201331). Combining auto encoders and one class support vectors machine for fraudulant credit card transactions detection. Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.","DOI":"10.1109\/WorldS4.2018.8611624"},{"key":"ref_19","first-page":"1060","article-title":"Credit card fraud detection using local outlier factor and isolation forest","volume":"7","author":"John","year":"2019","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_20","first-page":"18","article-title":"Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine","volume":"9","author":"Pumsirirat","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s10115-003-0132-7","article-title":"Using artificial anomalies to detect unknown and known network intrusions","volume":"6","author":"Fan","year":"2004","journal-title":"Knowl. Inf. Syst."},{"key":"ref_22","unstructured":"Schreyer, M., Sattarov, T., Borth, D., Dengel, A., and Reimer, B. (2017). Detection of anomalies in large scale accounting data using deep autoencoder networks. arXiv."},{"key":"ref_23","unstructured":"Schreyer, M., Sattarov, T., Schulze, C., Reimer, B., and Borth, D. (2019). Detection of accounting anomalies in the latent space using adversarial autoencoder neural networks. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.neunet.2018.02.015","article-title":"Generative adversarial network-based telecom fraud detection at the receiving bank","volume":"102","author":"Zheng","year":"2018","journal-title":"Neural Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Herrera, J.L.L., Figueroa, H.V.R., and Ram\u00edrez, E.J.R. (2018, January 21\u201323). Deep fraud. A fraud intention recognition framework in public transport context using a deep-learning approach. Proceedings of the 2018 International Conference on Electronics, Communications and Computers (CONIELECOMP), Cholula, Mexico.","DOI":"10.1109\/CONIELECOMP.2018.8327186"},{"key":"ref_26","first-page":"39","article-title":"A review of fraud detection techniques: Credit card","volume":"45","author":"Chaudhary","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_27","unstructured":"Zou, J., Zhang, J., and Jiang, P. (2019). Credit card fraud detection using autoencoder neural network. arXiv."},{"key":"ref_28","unstructured":"Sweers, T., Heskes, T., and Krijthe, J. (2018). Autoencoding Credit Card Fraud. [Bachelor\u2019s Thesis, Radboud University]."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kazemi, Z., and Zarrabi, H. (2017, January 22). Using deep networks for fraud detection in credit card transactions. Proceedings of the 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran.","DOI":"10.1109\/KBEI.2017.8324876"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.procs.2020.03.219","article-title":"An autoencoder based model for detecting fraudulent credit card transactions","volume":"167","author":"Misra","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Raghavan, P., and El Gayar, N. (2019, January 11\u201312). Fraud detection using machine learning and deep learning. Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates.","DOI":"10.1109\/ICCIKE47802.2019.9004231"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Rushin, G., Stancil, C., Sun, M., Adams, S., and Beling, P. (2017, January 28). Horse race analysis in credit card fraud\u2014Deep learning, logistic regression, and gradient boosted tree. Proceedings of the 2017 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA.","DOI":"10.1109\/SIEDS.2017.7937700"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Vynokurova, O., Peleshko, D., Zhernova, P., Perova, I., and Kovalenko, A. (2019, January 25\u201329). Solving fraud detection tasks based on wavelet- neuro autoencoder. Proceedings of the International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence\u201d, Zalizniy Port, Ukraine.","DOI":"10.1007\/978-3-030-54215-3_34"},{"key":"ref_34","unstructured":"Zheng, P., Yuan, S., Wu, X., Li, J., and Lu, A. (March, January 25). One-class adversarial nets for fraud detection. Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, PA, USA."},{"key":"ref_35","unstructured":"Shapley, L.S. (1951). Notes on the n-Person Game\u2014II: The Value of an n-Person Game, RAND Corporation."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Takeishi, N. (2019, January 8\u201311). Shapley values reconstruction errors of pca for explaining anomaly detection. Proceedings of the 2019 international conference on data mining workshops (icdmw), Beijing, China.","DOI":"10.1109\/ICDMW.2019.00117"},{"key":"ref_37","unstructured":"Takeishi, N., and Kawahara, Y. (2020). On anomaly interpretation via shapley values. arXiv."},{"key":"ref_38","unstructured":"Antwarg, L., Miller, R.M., Shapira, B., and Rokach, L. (2019). Explaining anomalies detected by autoencoders using SHAP. arXiv."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"115736","DOI":"10.1016\/j.eswa.2021.115736","article-title":"Explaining anomalies detected by autoencoders using shapley additive explanations","volume":"186","author":"Antwarg","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_40","unstructured":"Olsen, L.H.B., Glad, I.K., Jullum, M., and Aas, K. (2021). Using shapley values and variational autoencoders to explain predictive models with dependent mixed features. arXiv."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1002\/aic.690370209","article-title":"Nonlinear principal component analysis using auto associative neural networks","volume":"37","author":"Kramer","year":"1991","journal-title":"AIChE J."},{"key":"ref_42","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfel-low, I., and Frey, B. (2015). Adversarial autoencoders. arXiv."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1080\/08839514.2013.785791","article-title":"One-class support vector machines approach anomaly detection","volume":"27","author":"Hejazi","year":"2013","journal-title":"Appl. Artif. Intell."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2133360.2133363","article-title":"Isolation-based anomaly detection","volume":"6","author":"Liu","year":"2012","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"ref_45","first-page":"582","article-title":"Support vector method for novelty detection","volume":"12","author":"Scho","year":"1999","journal-title":"Adv. Neural Inf. Process. Syst."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/7\/168\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:58:55Z","timestamp":1760032735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/7\/168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,26]]},"references-count":45,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["bdcc9070168"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9070168","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,26]]}}}