{"id":"https://openalex.org/W7128617325","doi":"https://doi.org/10.1109/icnsc66229.2025.00072","title":"A Behavioral Drift-Aware Generative Adversarial Network for Financial Transaction Fraud Detection","display_name":"A Behavioral Drift-Aware Generative Adversarial Network for Financial Transaction Fraud Detection","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W7128617325","doi":"https://doi.org/10.1109/icnsc66229.2025.00072"},"language":null,"primary_location":{"id":"doi:10.1109/icnsc66229.2025.00072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc66229.2025.00072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Networking, Sensing and Control (ICNSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101508921","display_name":"Yu Xie","orcid":"https://orcid.org/0000-0002-0928-3823"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Xie","raw_affiliation_strings":["College of Information Engineering Shanghai Maritime University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering Shanghai Maritime University,Shanghai,China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125637870","display_name":"Zhanchao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanchao Wang","raw_affiliation_strings":["College of Information Engineering Shanghai Maritime University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering Shanghai Maritime University,Shanghai,China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082048467","display_name":"Jiamin Yao","orcid":"https://orcid.org/0000-0002-7269-2064"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiamin Yao","raw_affiliation_strings":["College of Information Engineering Shanghai Maritime University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering Shanghai Maritime University,Shanghai,China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115751382","display_name":"MengChu Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"MengChu Zhou","raw_affiliation_strings":["New Jersey Institute of Technology,Department of Electrical and Computer Engineering,Newark,USA"],"affiliations":[{"raw_affiliation_string":"New Jersey Institute of Technology,Department of Electrical and Computer Engineering,Newark,USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101508921"],"corresponding_institution_ids":["https://openalex.org/I96733725"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84800438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.8206999897956848,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.8206999897956848,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11653","display_name":"Financial Distress and Bankruptcy Prediction","score":0.07810000330209732,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.022199999541044235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6740000247955322},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5752000212669373},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.5482000112533569},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4975999891757965},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.47589999437332153},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4368000030517578},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.3977000117301941},{"id":"https://openalex.org/keywords/financial-fraud","display_name":"Financial fraud","score":0.397599995136261},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.3971000015735626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7333999872207642},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6740000247955322},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5752000212669373},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.5482000112533569},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4975999891757965},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4747999906539917},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4368000030517578},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43529999256134033},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3977000117301941},{"id":"https://openalex.org/C2985140798","wikidata":"https://www.wikidata.org/wiki/Q28813","display_name":"Financial fraud","level":2,"score":0.397599995136261},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.3971000015735626},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C127722929","wikidata":"https://www.wikidata.org/wiki/Q7833714","display_name":"Transaction data","level":3,"score":0.3695000112056732},{"id":"https://openalex.org/C2778068216","wikidata":"https://www.wikidata.org/wiki/Q55019500","display_name":"Malice","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.3425000011920929},{"id":"https://openalex.org/C164516710","wikidata":"https://www.wikidata.org/wiki/Q1166072","display_name":"Financial transaction","level":3,"score":0.336899995803833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3231000006198883},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3133000135421753},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.29420000314712524},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C109574028","wikidata":"https://www.wikidata.org/wiki/Q647525","display_name":"Behavioral economics","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C2989277270","wikidata":"https://www.wikidata.org/wiki/Q168338","display_name":"Behavioral analysis","level":2,"score":0.2615000009536743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnsc66229.2025.00072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc66229.2025.00072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Networking, Sensing and Control (ICNSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5940473675727844,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G2278996545","display_name":null,"funder_award_id":"24ZR1427500","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"surge":[1],"in":[2,13,30,69,157],"online":[3],"financial":[4],"activities":[5],"has":[6],"been":[7],"accompanied":[8],"by":[9],"a":[10,22,42,82,104,110],"parallel":[11],"rise":[12],"fraudulent":[14,38],"transactions,":[15],"rendering":[16],"Financial":[17],"Transaction":[18],"Fraud":[19],"Detection":[20],"(FTFD)":[21],"pressing":[23],"and":[24,97],"complex":[25],"challenge.":[26],"A":[27],"primary":[28],"obstacle":[29],"FTFD":[31,158],"is":[32],"the":[33,46,50,71,131,136,150],"class":[34],"imbalance":[35],"issue,":[36,64],"where":[37],"instances":[39],"represent":[40],"only":[41],"small":[43],"fraction":[44],"of":[45,52,74,127,152],"data,":[47],"thereby":[48],"impeding":[49],"effectiveness":[51,151],"model":[53,121],"training.":[54],"While":[55],"existing":[56],"data":[57],"augmentation":[58],"methods":[59],"attempt":[60],"to":[61,89,114,119,139],"alleviate":[62],"this":[63,78],"they":[65],"often":[66],"fall":[67],"short":[68],"capturing":[70],"behavioral":[72,123],"drift":[73],"fraudsters.":[75],"To":[76],"bridge":[77],"gap,":[79],"we":[80],"introduce":[81],"Behavioral":[83],"Drift-Aware":[84],"Generative":[85],"Adversarial":[86],"Network":[87],"(BDAGAN)":[88],"generate":[90],"synthetic":[91],"fraud":[92,100,142],"samples":[93],"that":[94],"reflect":[95],"realistic":[96],"temporally":[98,105],"evolving":[99],"patterns.":[101],"It":[102],"incorporates":[103],"adaptive":[106],"recurrent":[107],"discriminator":[108],"with":[109],"gating":[111],"mechanism":[112],"sensitive":[113],"inter-transaction":[115],"intervals,":[116],"enabling":[117],"it":[118],"well":[120],"time-dependent":[122],"dynamics.":[124],"This":[125],"integration":[126],"temporal":[128],"context":[129],"into":[130],"adversarial":[132],"learning":[133],"process":[134],"enhances":[135],"generator's":[137],"ability":[138],"mimic":[140],"authentic":[141],"progression.":[143],"Extensive":[144],"experiments":[145],"on":[146],"real-world":[147],"datasets":[148],"validate":[149],"BDAGAN,":[153],"revealing":[154],"marked":[155],"improvements":[156],"performance.":[159]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-12T00:00:00"}
