Citation: | Y. Xie, M. C. Zhou, G. Liu, H. Zhu, L. Wei, and P. Meo, “A transactional-behavior-based hierarchical gated network for credit card fraud detection,” IEEE/CAA J. Autom. Sinica, 2025. doi: 10.1109/JAS.2025.125243 |
[1] |
X. Chen, W. Sun, B. Wang, Z. Li, X. Wang, and Y. Ye, “Spectral clustering of customer transaction data with a two-level subspace weighting method,” IEEE Trans. on Cybernetics, vol. 49, no. 9, pp. 3230–3241, 2019. doi: 10.1109/TCYB.2018.2836804
|
[2] |
A. C. Bahnsen, D. Aouada, A. Stojanovic, and B. Ottersten, “Feature engineering strategies for credit card fraud detection,” Expert Systems with Applications., vol. 51, pp. 134–142, 2016. doi: 10.1016/j.eswa.2015.12.030
|
[3] |
A. Ravi, M. Msahli, H. Qiu, G. Memmi, A. Bifet, and M. Qiu, “Wangiri fraud: Pattern analysis and machine-learning-based detection,” IEEE Internet of Things Journal, vol. 10, no. 8, pp. 6794–6802, 2023. doi: 10.1109/JIOT.2022.3174143
|
[4] |
J. Wu, Q. Yuan, D. Lin, W. You, W. Chen, C. Chen, and Z. Zheng, “Who are the phishers? phishing scam detection on ethereum via network embedding,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 52, no. 2, pp. 1156–1166, 2022. doi: 10.1109/TSMC.2020.3016821
|
[5] |
Y. Lin, X. Wang, F. Hao, Y. Jiang, Y. Wu, G. Min, D. He, S. Zhu, and W. Zhao, “Dynamic control of fraud information spreading in mobile social networks,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 51, no. 6, pp. 3725–3738, 2021. doi: 10.1109/TSMC.2019.2930908
|
[6] |
Y. Xie, G. Liu, C. Yan, C. Jiang, and M. Zhou, “Time-aware attention-based gated network for credit card fraud detection by extracting transactional behaviors,” IEEE Trans. on Computational Social Systems, vol. 10, no. 3, pp. 1004–1016, 2023. doi: 10.1109/TCSS.2022.3158318
|
[7] |
V. D. M. Laurens and G. Hinton, “Visualizing data using T-SNE,” Journal of Machine Learning Research, vol. 9, no. 2605, pp. 2579–2605, 2008.
|
[8] |
D. Cheng, X. Wang, Y. Zhang, and L. Zhang, “Graph neural network for fraud detection via spatial-temporal attention,” IEEE Trans. on Knowledge and Data Engineering, vol. 34, no. 8, pp. 3800–3813, 2022. doi: 10.1109/TKDE.2020.3025588
|
[9] |
F. Carcillo, Y.-A. Le Borgne, O. Caelen, Y. Kessaci, F. Oblé, and G. Bontempi, “Combining unsupervised and supervised learning in credit card fraud detection,” Information sciences, vol. 557, pp. 317–331, 2021. doi: 10.1016/j.ins.2019.05.042
|
[10] |
R. Li, Z. Liu, Y. Ma, D. Yang, and S. Sun, “Internet financial fraud detection based on graph learning,” IEEE Trans. on Computational Social Systems, vol. 10, no. 3, pp. 1394–1401, 2023. doi: 10.1109/TCSS.2022.3189368
|
[11] |
C. Wang, S. Chai, H. Zhu, and C. Jiang, “Caesar: An online payment anti-fraud integration system with decision explainability,” IEEE Trans. on Dependable and Secure Computing, vol. 20, no. 3, pp. 2565–2577, 2023. doi: 10.1109/TDSC.2022.3186733
|
[12] |
H. V. Dang, H. Tran-Ngoc, T. V. Nguyen, T. Bui-Tien, G. De Roeck, and H. X. Nguyen, “Data-driven structural health monitoring using feature fusion and hybrid deep learning,” IEEE Trans. on Automation Science and Engineering, vol. 18, no. 4, pp. 2087–2103, 2021. doi: 10.1109/TASE.2020.3034401
|
[13] |
Z. Zhang, Z. Wei, and L. Ma, “UBRMTC: User behavior recognition model with transaction character,” IEEE Trans. on Computational Social Systems, pp. 1–13, 2023.
|
[14] |
Y. Wu, Z. Xie, S. Ji, Z. Liu, X. Zhang, C. Lin, S. Deng, J. Zhou, T. Wang, and R. A. Beyah, “Fraud-agents detection in online microfinance: A large-scale empirical study,” IEEE Trans. on Dependable and Secure Computing, pp. 1–1, 2022.
|
[15] |
L. Zheng, G. Liu, C. Yan, C. Jiang, M. Zhou, and M. Li, “Improved tradaboost and its application to transaction fraud detection,” IEEE Trans. on Computational Social Systems, vol. 7, no. 5, pp. 1304–1316, 2020. doi: 10.1109/TCSS.2020.3017013
|
[16] |
N. Jiang, F. Duan, H. Chen, W. Huang, and X. Liu, “MAFI: Gnn-based multiple aggregators and feature interactions network for fraud detection over heterogeneous graph,” IEEE Trans. on Big Data, vol. 8, no. 4, pp. 905–919, 2022. doi: 10.1109/TBDATA.2021.3132672
|
[17] |
J. Jurgovsky, M. Granitzer, K. Ziegler, S. Calabretto, P.-E. Portier, L. He-Guelton, and O. Caelen, “Sequence classification for credit-card fraud detection,” Expert Systems with Applications., vol. 100, pp. 234–245, 2018. doi: 10.1016/j.eswa.2018.01.037
|
[18] |
T. Li, G. Kou, Y. Peng, and P. S. Yu, “An integrated cluster detection, optimization, and interpretation approach for financial data,” IEEE Trans. on Cybernetics, vol. 52, p. 12, 2022.
|
[19] |
Z. Salekshahrezaee, J. L. Leevy, and T. M. Khoshgoftaar, “The effect of feature extraction and data sampling on credit card fraud detection,” Journal of Big Data, vol. 10, p. 1, 2023. doi: 10.1186/s40537-022-00674-4
|
[20] |
M. Habibpour, H. Gharoun, M. Mehdipour, A. Tajally, H. Asgharnezhad, A. Shamsi, A. Khosravi, and S. Nahavandi, “Uncertainty-aware credit card fraud detection using deep learning,” Engineering Applications of Artificial Intelligence, vol. 123, p. 106248, 2023. doi: 10.1016/j.engappai.2023.106248
|
[21] |
H. Zhu, M. Zhou, Y. Xie, and A. Albeshri, “A self-adapting and efficient dandelion algorithm and its application to feature selection for credit card fraud detection,” IEEE/CAA Journal of Automatica Sinica, vol. 11, no. 2, pp. 38–51, 2024.
|
[22] |
R. Saia and S. Carta, “Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks,” Future Generation Computer Systems, vol. 93, pp. 18–32, 2019. doi: 10.1016/j.future.2018.10.016
|
[23] |
S. Barra, S. M. Carta, A. Corriga, A. S. Podda, and D. R. Recupero, “Deep learning and time series-to-image encoding for financial forecasting,” IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 3, pp. 683–692, 2020. doi: 10.1109/JAS.2020.1003132
|
[24] |
P. Mrozek, J. Panneerselvam, and O. Bagdasar, “Efficient resampling for fraud detection during anonymised credit card transactions with unbalanced datasets,” in 2020 IEEE/ACM 13th Int. Conf. on Utility and Cloud Computing (UCC). IEEE, 2020, pp. 426–433.
|
[25] |
R. Saia, “Unbalanced data classification in fraud detection by introducing a multidimensional space analysis,” in IoTBDS, 2018, pp. 29–40.
|
[26] |
M.-C. Lee, J.-C. Lin, and E. G. Gran, “RePAD: real-time proactive anomaly detection for time series,” in Advanced Information Networking and Applications: Proc. the 34th Int. Conf. on Advanced Information Networking and Applications (AINA-2020). Springer, 2020, pp. 1291–1302.
|
[27] |
J. Cui, C. Yan, and C. Wang, “Remember: Ranking metric embedding-based multicontextual behavior profiling for online banking fraud detection,” IEEE Trans. on Computational Social Systems, vol. 8, no. 3, pp. 643–654, 2021. doi: 10.1109/TCSS.2021.3052950
|
[28] |
H. Zhu, M. Zhou, G. Liu, Y. Xie, S. Liu, and C. Guo, “NUS: Noisy-sample-removed undersampling scheme for imbalanced classification and application to credit card fraud detection,” IEEE Trans. on Computational Social Systems, pp. 1–12, 2023.
|
[29] |
S. Han, K. Zhu, M. Zhou, and X. Cai, “Competition-driven multimodal multiobjective optimization and its application to feature selection for credit card fraud detection,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7845–7857, 2022. doi: 10.1109/TSMC.2022.3171549
|
[30] |
X. Niu, L. Wang, and X. Yang, “A comparison study of credit card fraud detection: Supervised versus unsupervised,” arXiv preprint arXiv: 1904.10604, 2019.
|
[31] |
A. Dal Pozzolo, G. Boracchi, O. Caelen, C. Alippi, and G. Bontempi, “Credit card fraud detection: a realistic modeling and a novel learning strategy,” IEEE Trans. on Neural Networks and Learning Systems., vol. 29, no. 9, pp. 3784–3797, 2018.
|
[32] |
R. Cao, G. Liu, Y. Xie, and C. Jiang, “Two-level attention model of representation learning for fraud detection,” IEEE Trans. on Computational Social Systems, vol. 8, no. 6, pp. 1291–1301, 2021. doi: 10.1109/TCSS.2021.3074175
|
[33] |
C. Whitrow, D. J. Hand, P. Juszczak, D. Weston, and N. M. Adams, “Transaction aggregation as a strategy for credit card fraud detection,” Data Mining and Knowledge Discovery., vol. 18, no. 1, pp. 30–55, 2009. doi: 10.1007/s10618-008-0116-z
|
[34] |
X. Zhang, Y. Han, W. Xu, and Q. Wang, “HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture,” Information Sciences, vol. 557, pp. 302–316, 2021. doi: 10.1016/j.ins.2019.05.023
|
[35] |
C. Wang and H. Zhu, “Representing fine-grained co-occurrences for behavior-based fraud detection in online payment services,” IEEE Trans. on Dependable and Secure Computing, vol. 19, no. 1, pp. 301–315, 2022. doi: 10.1109/TDSC.2020.2991872
|
[36] |
P. De Meo, F. Messina, D. Rosaci, and G. M. Sarné, “Combining trust and skills evaluation to form e-learning classes in online social networks,” Information Sciences, vol. 405, pp. 107–122, 2017. doi: 10.1016/j.ins.2017.04.002
|
[37] |
J. Du, C.-M. Vong, and C. L. P. Chen, “Novel efficient rnn and lstm-like architectures: Recurrent and gated broad learning systems and their applications for text classification,” IEEE Trans. on Cybernetics, vol. 51, no. 3, pp. 1586–1597, 2021. doi: 10.1109/TCYB.2020.2969705
|
[38] |
J. Guo, G. Liu, Y. Zuo, and J. Wu, “Learning sequential behavior representations for fraud detection,” in 2018 IEEE Int. Conf. on Data Mining (ICDM), Singapore, 2018, pp. 127–136.
|
[39] |
D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv: 1412.6980, 2014.
|
[40] |
Y. Xie, G. Liu, C. Yan, C. Jiang, M. Zhou, and M. Li, “Learning transactional behavioral representations for credit card fraud detection,” IEEE Trans. on Neural Networks and Learning Systems, vol. 35, no. 4, pp. 5735–5748, 2024. doi: 10.1109/TNNLS.2022.3208967
|
[41] |
Y. Xie, G. Liu, M. Zhou, L. Wei, H. Zhu, and R. Zhou, “A spatial-temporal gated network for credit card fraud detection,” in 2023 IEEE Int. Conf. on Networking, Sensing and Control (ICNSC), Marseille, France, vol. 1, 2023, pp. 1–6.
|
[42] |
J. Abreu, L. Fred, D. Macêdo, and C. Zanchettin, “Hierarchical attentional hybrid neural networks for document classification,” arXiv preprint arXiv: 1901.06610, 2019.
|
[43] |
P. De Meo, F. Messina, D. Rosaci, and G. M. Sarné, “Forming time-stable homogeneous groups into online social networks,” Information Sciences, vol. 414, pp. 117–132, 2017. doi: 10.1016/j.ins.2017.05.048
|
[44] |
Y.-H. Yoo, U.-H. Kim, and J.-H. Kim, “Recurrent reconstructive network for sequential anomaly detection,” IEEE Trans. on Cybernetics, vol. 51, no. 3, pp. 1704–1715, 2021. doi: 10.1109/TCYB.2019.2933548
|
[45] |
L. Li, Z. Liu, C. Chen, Y.-L. Zhang, J. Zhou, and X. Li, “A time attention based fraud transaction detection framework,” arXiv preprint arXiv: 1912.11760, 2019.
|
[46] |
Y. Zhu, H. Li, Y. Liao, B. Wang, Z. Guan, H. Liu, and D. Cai, “What to do next: Modeling user behaviors by time-lstm.” in IJCAI, vol. 17, 2017, pp. 3602–3608.
|
[47] |
D. Cheng, S. Xiang, C. Shang, Y. Zhang, F. Yang, and L. Zhang, “Spatio-temporal attention-based neural network for credit card fraud detection,” in Proc. the AAAI Conf. on Artificial Intelligence, vol. 34, no. 01, 2020, pp. 362–369.
|
[48] |
M. Wang, Z. Ding, P. Zhao, W. Yu, and C. Jiang, “A dynamic data slice approach to the vulnerability analysis of e-commerce systems,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 50, no. 10, pp. 3598–3612, 2020. doi: 10.1109/TSMC.2018.2862387
|
[49] |
D. D. Wu, D. L. Olson, and C. Luo, “A decision support approach for accounts receivable risk management,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 44, no. 12, pp. 1624–1632, 2014. doi: 10.1109/TSMC.2014.2318020
|
[50] |
U. Fiore, A. D. Santis, F. Perla, P. Zanetti, and F. Palmieri, “Using generative adversarial networks for improving classification effectiveness in credit card fraud detection,” Information Sciences., vol. 479, pp. 448–455, 2017.
|
[51] |
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting,” The Journal of Machine Learning Research., vol. 15, no. 1, pp. 1929–1958, 2014.
|
[52] |
O. Ozyegen, I. Ilic, and M. Cevik, “Evaluation of interpretability methods for multivariate time series forecasting,” Applied Intelligence, pp. 1–17, 2022.
|