A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Y. Xie, M. C. Zhou, G. Liu, H. Zhu, L. Wei, and P. Meo, “A transactional-behavior-based hierarchical gated network for credit card fraud detection,” IEEE/CAA J. Autom. Sinica, 2025. doi: 10.1109/JAS.2025.125243
Citation: Y. Xie, M. C. Zhou, G. Liu, H. Zhu, L. Wei, and P. Meo, “A transactional-behavior-based hierarchical gated network for credit card fraud detection,” IEEE/CAA J. Autom. Sinica, 2025. doi: 10.1109/JAS.2025.125243

A Transactional-Behavior-Based Hierarchical Gated Network for Credit Card Fraud Detection

doi: 10.1109/JAS.2025.125243
Funds:  This work was supported in part by the National Natural Science Foundation of China (61972241), the Natural Science Foundation of Shanghai (24ZR1427500, 22ZR1427100), the Key Projects of Natural Science Research in Anhui Higher Education Institutions (2022AH051909), and Bengbu University 2021 High-Level Scientific Research and Cultivation Project (2021pyxm04)
More Information
  • The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit card companies have used rule-based approaches to detect fraudulent transactions, but these have proven inadequate due to the complexity of fraud strategies and have been replaced by much more powerful solutions based on machine learning or deep learning algorithms. Despite significant progress, the current approaches to fraud detection suffer from a number of limitations: for example, it is unclear whether some transaction features are more effective than others in discriminating fraudulent transactions, and they often neglect possible correlations among transactions, even though they could reveal illicit behaviour. In this paper, we propose a novel credit card fraud detection (CCFD) method based on a transaction behaviour-based hierarchical gated network. First, we introduce a feature-oriented extraction module capable of identifying key features from original transactions, and such analysis is effective in revealing the behavioural characteristics of fraudsters. Second, we design a transaction-oriented extraction module capable of capturing the correlation between users’ historical and current transactional behaviour. Such information is crucial for revealing users’ sequential behaviour patterns. Our approach, called transactional-behaviour-based hierarchical gated network model (TbHGN), extracts two types of new transactional features, which are then combined in a feature interaction module to learn the final transactional representations used for CCFD. We have conducted extensive experiments on a real-world credit card transaction dataset with an increase in average F1 between 1.42% and 6.53% and an improvement in average AUC between 0.63% and 2.78% over the state of the art.

     

  • loading
  • [1]
    X. Chen, W. Sun, B. Wang, Z. Li, X. Wang, and Y. Ye, “Spectral clustering of customer transaction data with a two-level subspace weighting method,” IEEE Trans. on Cybernetics, vol. 49, no. 9, pp. 3230–3241, 2019. doi: 10.1109/TCYB.2018.2836804
    [2]
    A. C. Bahnsen, D. Aouada, A. Stojanovic, and B. Ottersten, “Feature engineering strategies for credit card fraud detection,” Expert Systems with Applications., vol. 51, pp. 134–142, 2016. doi: 10.1016/j.eswa.2015.12.030
    [3]
    A. Ravi, M. Msahli, H. Qiu, G. Memmi, A. Bifet, and M. Qiu, “Wangiri fraud: Pattern analysis and machine-learning-based detection,” IEEE Internet of Things Journal, vol. 10, no. 8, pp. 6794–6802, 2023. doi: 10.1109/JIOT.2022.3174143
    [4]
    J. Wu, Q. Yuan, D. Lin, W. You, W. Chen, C. Chen, and Z. Zheng, “Who are the phishers? phishing scam detection on ethereum via network embedding,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 52, no. 2, pp. 1156–1166, 2022. doi: 10.1109/TSMC.2020.3016821
    [5]
    Y. Lin, X. Wang, F. Hao, Y. Jiang, Y. Wu, G. Min, D. He, S. Zhu, and W. Zhao, “Dynamic control of fraud information spreading in mobile social networks,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 51, no. 6, pp. 3725–3738, 2021. doi: 10.1109/TSMC.2019.2930908
    [6]
    Y. Xie, G. Liu, C. Yan, C. Jiang, and M. Zhou, “Time-aware attention-based gated network for credit card fraud detection by extracting transactional behaviors,” IEEE Trans. on Computational Social Systems, vol. 10, no. 3, pp. 1004–1016, 2023. doi: 10.1109/TCSS.2022.3158318
    [7]
    V. D. M. Laurens and G. Hinton, “Visualizing data using T-SNE,” Journal of Machine Learning Research, vol. 9, no. 2605, pp. 2579–2605, 2008.
    [8]
    D. Cheng, X. Wang, Y. Zhang, and L. Zhang, “Graph neural network for fraud detection via spatial-temporal attention,” IEEE Trans. on Knowledge and Data Engineering, vol. 34, no. 8, pp. 3800–3813, 2022. doi: 10.1109/TKDE.2020.3025588
    [9]
    F. Carcillo, Y.-A. Le Borgne, O. Caelen, Y. Kessaci, F. Oblé, and G. Bontempi, “Combining unsupervised and supervised learning in credit card fraud detection,” Information sciences, vol. 557, pp. 317–331, 2021. doi: 10.1016/j.ins.2019.05.042
    [10]
    R. Li, Z. Liu, Y. Ma, D. Yang, and S. Sun, “Internet financial fraud detection based on graph learning,” IEEE Trans. on Computational Social Systems, vol. 10, no. 3, pp. 1394–1401, 2023. doi: 10.1109/TCSS.2022.3189368
    [11]
    C. Wang, S. Chai, H. Zhu, and C. Jiang, “Caesar: An online payment anti-fraud integration system with decision explainability,” IEEE Trans. on Dependable and Secure Computing, vol. 20, no. 3, pp. 2565–2577, 2023. doi: 10.1109/TDSC.2022.3186733
    [12]
    H. V. Dang, H. Tran-Ngoc, T. V. Nguyen, T. Bui-Tien, G. De Roeck, and H. X. Nguyen, “Data-driven structural health monitoring using feature fusion and hybrid deep learning,” IEEE Trans. on Automation Science and Engineering, vol. 18, no. 4, pp. 2087–2103, 2021. doi: 10.1109/TASE.2020.3034401
    [13]
    Z. Zhang, Z. Wei, and L. Ma, “UBRMTC: User behavior recognition model with transaction character,” IEEE Trans. on Computational Social Systems, pp. 1–13, 2023.
    [14]
    Y. Wu, Z. Xie, S. Ji, Z. Liu, X. Zhang, C. Lin, S. Deng, J. Zhou, T. Wang, and R. A. Beyah, “Fraud-agents detection in online microfinance: A large-scale empirical study,” IEEE Trans. on Dependable and Secure Computing, pp. 1–1, 2022.
    [15]
    L. Zheng, G. Liu, C. Yan, C. Jiang, M. Zhou, and M. Li, “Improved tradaboost and its application to transaction fraud detection,” IEEE Trans. on Computational Social Systems, vol. 7, no. 5, pp. 1304–1316, 2020. doi: 10.1109/TCSS.2020.3017013
    [16]
    N. Jiang, F. Duan, H. Chen, W. Huang, and X. Liu, “MAFI: Gnn-based multiple aggregators and feature interactions network for fraud detection over heterogeneous graph,” IEEE Trans. on Big Data, vol. 8, no. 4, pp. 905–919, 2022. doi: 10.1109/TBDATA.2021.3132672
    [17]
    J. Jurgovsky, M. Granitzer, K. Ziegler, S. Calabretto, P.-E. Portier, L. He-Guelton, and O. Caelen, “Sequence classification for credit-card fraud detection,” Expert Systems with Applications., vol. 100, pp. 234–245, 2018. doi: 10.1016/j.eswa.2018.01.037
    [18]
    T. Li, G. Kou, Y. Peng, and P. S. Yu, “An integrated cluster detection, optimization, and interpretation approach for financial data,” IEEE Trans. on Cybernetics, vol. 52, p. 12, 2022.
    [19]
    Z. Salekshahrezaee, J. L. Leevy, and T. M. Khoshgoftaar, “The effect of feature extraction and data sampling on credit card fraud detection,” Journal of Big Data, vol. 10, p. 1, 2023. doi: 10.1186/s40537-022-00674-4
    [20]
    M. Habibpour, H. Gharoun, M. Mehdipour, A. Tajally, H. Asgharnezhad, A. Shamsi, A. Khosravi, and S. Nahavandi, “Uncertainty-aware credit card fraud detection using deep learning,” Engineering Applications of Artificial Intelligence, vol. 123, p. 106248, 2023. doi: 10.1016/j.engappai.2023.106248
    [21]
    H. Zhu, M. Zhou, Y. Xie, and A. Albeshri, “A self-adapting and efficient dandelion algorithm and its application to feature selection for credit card fraud detection,” IEEE/CAA Journal of Automatica Sinica, vol. 11, no. 2, pp. 38–51, 2024.
    [22]
    R. Saia and S. Carta, “Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks,” Future Generation Computer Systems, vol. 93, pp. 18–32, 2019. doi: 10.1016/j.future.2018.10.016
    [23]
    S. Barra, S. M. Carta, A. Corriga, A. S. Podda, and D. R. Recupero, “Deep learning and time series-to-image encoding for financial forecasting,” IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 3, pp. 683–692, 2020. doi: 10.1109/JAS.2020.1003132
    [24]
    P. Mrozek, J. Panneerselvam, and O. Bagdasar, “Efficient resampling for fraud detection during anonymised credit card transactions with unbalanced datasets,” in 2020 IEEE/ACM 13th Int. Conf. on Utility and Cloud Computing (UCC). IEEE, 2020, pp. 426–433.
    [25]
    R. Saia, “Unbalanced data classification in fraud detection by introducing a multidimensional space analysis,” in IoTBDS, 2018, pp. 29–40.
    [26]
    M.-C. Lee, J.-C. Lin, and E. G. Gran, “RePAD: real-time proactive anomaly detection for time series,” in Advanced Information Networking and Applications: Proc. the 34th Int. Conf. on Advanced Information Networking and Applications (AINA-2020). Springer, 2020, pp. 1291–1302.
    [27]
    J. Cui, C. Yan, and C. Wang, “Remember: Ranking metric embedding-based multicontextual behavior profiling for online banking fraud detection,” IEEE Trans. on Computational Social Systems, vol. 8, no. 3, pp. 643–654, 2021. doi: 10.1109/TCSS.2021.3052950
    [28]
    H. Zhu, M. Zhou, G. Liu, Y. Xie, S. Liu, and C. Guo, “NUS: Noisy-sample-removed undersampling scheme for imbalanced classification and application to credit card fraud detection,” IEEE Trans. on Computational Social Systems, pp. 1–12, 2023.
    [29]
    S. Han, K. Zhu, M. Zhou, and X. Cai, “Competition-driven multimodal multiobjective optimization and its application to feature selection for credit card fraud detection,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7845–7857, 2022. doi: 10.1109/TSMC.2022.3171549
    [30]
    X. Niu, L. Wang, and X. Yang, “A comparison study of credit card fraud detection: Supervised versus unsupervised,” arXiv preprint arXiv: 1904.10604, 2019.
    [31]
    A. Dal Pozzolo, G. Boracchi, O. Caelen, C. Alippi, and G. Bontempi, “Credit card fraud detection: a realistic modeling and a novel learning strategy,” IEEE Trans. on Neural Networks and Learning Systems., vol. 29, no. 9, pp. 3784–3797, 2018.
    [32]
    R. Cao, G. Liu, Y. Xie, and C. Jiang, “Two-level attention model of representation learning for fraud detection,” IEEE Trans. on Computational Social Systems, vol. 8, no. 6, pp. 1291–1301, 2021. doi: 10.1109/TCSS.2021.3074175
    [33]
    C. Whitrow, D. J. Hand, P. Juszczak, D. Weston, and N. M. Adams, “Transaction aggregation as a strategy for credit card fraud detection,” Data Mining and Knowledge Discovery., vol. 18, no. 1, pp. 30–55, 2009. doi: 10.1007/s10618-008-0116-z
    [34]
    X. Zhang, Y. Han, W. Xu, and Q. Wang, “HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture,” Information Sciences, vol. 557, pp. 302–316, 2021. doi: 10.1016/j.ins.2019.05.023
    [35]
    C. Wang and H. Zhu, “Representing fine-grained co-occurrences for behavior-based fraud detection in online payment services,” IEEE Trans. on Dependable and Secure Computing, vol. 19, no. 1, pp. 301–315, 2022. doi: 10.1109/TDSC.2020.2991872
    [36]
    P. De Meo, F. Messina, D. Rosaci, and G. M. Sarné, “Combining trust and skills evaluation to form e-learning classes in online social networks,” Information Sciences, vol. 405, pp. 107–122, 2017. doi: 10.1016/j.ins.2017.04.002
    [37]
    J. Du, C.-M. Vong, and C. L. P. Chen, “Novel efficient rnn and lstm-like architectures: Recurrent and gated broad learning systems and their applications for text classification,” IEEE Trans. on Cybernetics, vol. 51, no. 3, pp. 1586–1597, 2021. doi: 10.1109/TCYB.2020.2969705
    [38]
    J. Guo, G. Liu, Y. Zuo, and J. Wu, “Learning sequential behavior representations for fraud detection,” in 2018 IEEE Int. Conf. on Data Mining (ICDM), Singapore, 2018, pp. 127–136.
    [39]
    D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv: 1412.6980, 2014.
    [40]
    Y. Xie, G. Liu, C. Yan, C. Jiang, M. Zhou, and M. Li, “Learning transactional behavioral representations for credit card fraud detection,” IEEE Trans. on Neural Networks and Learning Systems, vol. 35, no. 4, pp. 5735–5748, 2024. doi: 10.1109/TNNLS.2022.3208967
    [41]
    Y. Xie, G. Liu, M. Zhou, L. Wei, H. Zhu, and R. Zhou, “A spatial-temporal gated network for credit card fraud detection,” in 2023 IEEE Int. Conf. on Networking, Sensing and Control (ICNSC), Marseille, France, vol. 1, 2023, pp. 1–6.
    [42]
    J. Abreu, L. Fred, D. Macêdo, and C. Zanchettin, “Hierarchical attentional hybrid neural networks for document classification,” arXiv preprint arXiv: 1901.06610, 2019.
    [43]
    P. De Meo, F. Messina, D. Rosaci, and G. M. Sarné, “Forming time-stable homogeneous groups into online social networks,” Information Sciences, vol. 414, pp. 117–132, 2017. doi: 10.1016/j.ins.2017.05.048
    [44]
    Y.-H. Yoo, U.-H. Kim, and J.-H. Kim, “Recurrent reconstructive network for sequential anomaly detection,” IEEE Trans. on Cybernetics, vol. 51, no. 3, pp. 1704–1715, 2021. doi: 10.1109/TCYB.2019.2933548
    [45]
    L. Li, Z. Liu, C. Chen, Y.-L. Zhang, J. Zhou, and X. Li, “A time attention based fraud transaction detection framework,” arXiv preprint arXiv: 1912.11760, 2019.
    [46]
    Y. Zhu, H. Li, Y. Liao, B. Wang, Z. Guan, H. Liu, and D. Cai, “What to do next: Modeling user behaviors by time-lstm.” in IJCAI, vol. 17, 2017, pp. 3602–3608.
    [47]
    D. Cheng, S. Xiang, C. Shang, Y. Zhang, F. Yang, and L. Zhang, “Spatio-temporal attention-based neural network for credit card fraud detection,” in Proc. the AAAI Conf. on Artificial Intelligence, vol. 34, no. 01, 2020, pp. 362–369.
    [48]
    M. Wang, Z. Ding, P. Zhao, W. Yu, and C. Jiang, “A dynamic data slice approach to the vulnerability analysis of e-commerce systems,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 50, no. 10, pp. 3598–3612, 2020. doi: 10.1109/TSMC.2018.2862387
    [49]
    D. D. Wu, D. L. Olson, and C. Luo, “A decision support approach for accounts receivable risk management,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 44, no. 12, pp. 1624–1632, 2014. doi: 10.1109/TSMC.2014.2318020
    [50]
    U. Fiore, A. D. Santis, F. Perla, P. Zanetti, and F. Palmieri, “Using generative adversarial networks for improving classification effectiveness in credit card fraud detection,” Information Sciences., vol. 479, pp. 448–455, 2017.
    [51]
    N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting,” The Journal of Machine Learning Research., vol. 15, no. 1, pp. 1929–1958, 2014.
    [52]
    O. Ozyegen, I. Ilic, and M. Cevik, “Evaluation of interpretability methods for multivariate time series forecasting,” Applied Intelligence, pp. 1–17, 2022.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(4)  / Tables(7)

    Article Metrics

    Article views (86) PDF downloads(17) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return