{"id":"https://openalex.org/W4411208263","doi":"https://doi.org/10.1109/isdfs65363.2025.11011957","title":"detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card Transactions","display_name":"detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card Transactions","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4411208263","doi":"https://doi.org/10.1109/isdfs65363.2025.11011957"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs65363.2025.11011957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11011957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101429121","display_name":"Irin Sultana","orcid":"https://orcid.org/0000-0003-0195-0721"},"institutions":[{"id":"https://openalex.org/I93131583","display_name":"Emporia State University","ror":"https://ror.org/04e6r1478","country_code":"US","type":"education","lineage":["https://openalex.org/I93131583"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Irin Sultana","raw_affiliation_strings":["School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA","institution_ids":["https://openalex.org/I93131583"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007169850","display_name":"Syed Mustavi Maheen","orcid":null},"institutions":[{"id":"https://openalex.org/I93131583","display_name":"Emporia State University","ror":"https://ror.org/04e6r1478","country_code":"US","type":"education","lineage":["https://openalex.org/I93131583"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Syed Mustavi Maheen","raw_affiliation_strings":["School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA","institution_ids":["https://openalex.org/I93131583"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040347462","display_name":"Naresh Kshetri","orcid":"https://orcid.org/0000-0002-3282-7331"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naresh Kshetri","raw_affiliation_strings":["Rochester Institute of Technology,Department of Cybersecurity,Rochester,NY,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology,Department of Cybersecurity,Rochester,NY,USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116444083","display_name":"Md Nasim Fardous Zim","orcid":"https://orcid.org/0009-0002-8290-2886"},"institutions":[{"id":"https://openalex.org/I93131583","display_name":"Emporia State University","ror":"https://ror.org/04e6r1478","country_code":"US","type":"education","lineage":["https://openalex.org/I93131583"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Nasim Fardous Zim","raw_affiliation_strings":["School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA","institution_ids":["https://openalex.org/I93131583"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101429121"],"corresponding_institution_ids":["https://openalex.org/I93131583"],"apc_list":null,"apc_paid":null,"fwci":19.3836,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.99133995,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11653","display_name":"Financial Distress and Bankruptcy Prediction","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9506999850273132,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7010031938552856},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.6255363821983337},{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.519605815410614},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.43389058113098145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38644298911094666},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.19354555010795593},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14615720510482788}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7010031938552856},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.6255363821983337},{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.519605815410614},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.43389058113098145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38644298911094666},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.19354555010795593},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14615720510482788},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs65363.2025.11011957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11011957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2483711049","https://openalex.org/W4224237387","https://openalex.org/W3150316110","https://openalex.org/W4313247660","https://openalex.org/W3153799676","https://openalex.org/W2984276143","https://openalex.org/W4281702918","https://openalex.org/W4391267261","https://openalex.org/W4281858644","https://openalex.org/W4283392145"],"abstract_inverted_index":{"Credit":[0],"card":[1],"fraud":[2,18,28,41,75,177],"is":[3],"a":[4,47,84,101,148,152],"major":[5],"issue":[6],"nowadays,":[7],"costing":[8],"huge":[9],"money":[10],"and":[11,26,57,69,76,121,132,151,170,179],"affecting":[12],"trust":[13],"in":[14,87,118,191],"financial":[15,189],"systems.":[16],"Traditional":[17],"detection":[19,42,78],"methods":[20,117],"often":[21],"fail":[22],"to":[23,39,72,105,167,172,183],"detect":[24],"advanced":[25,64],"growing":[27],"techniques.":[29],"This":[30,141],"study":[31],"focuses":[32],"on":[33,162],"using":[34],"Graph":[35],"Neural":[36,95],"Networks":[37],"(GNNs)":[38],"improve":[40,77],"by":[43,89],"analyzing":[44],"transactions":[45,190],"as":[46,54],"network":[48],"of":[49,175],"connected":[50],"data":[51,130],"points,":[52],"such":[53],"accounts,":[55],"traders,":[56],"devices.":[58],"The":[59,80,98,124],"proposed":[60],"\u201cdetectGNN\u201d":[61],"model":[62,125,184],"uses":[63],"features":[65],"like":[66],"time-based":[67],"patterns":[68,178],"dynamic":[70],"updates":[71],"expose":[73],"hidden":[74],"accuracy.":[79],"BRIGHT":[81],"framework":[82],"demonstrates":[83],"significant":[85],"reduction":[86],"P99latency":[88],"over":[90],"75%":[91],"through":[92],"their":[93],"Lambda":[94],"Network":[96],"architecture.":[97],"system":[99],"achieves":[100],"7.8x":[102],"speedup":[103],"compared":[104],"traditional":[106,116],"GNN":[107],"approaches.":[108],"Tests":[109],"show":[110],"that":[111,144],"GNNs":[112,145],"perform":[113],"better":[114],"than":[115],"finding":[119],"complex":[120],"multi-layered":[122,185],"fraud.":[123,157],"also":[126],"addresses":[127],"real-time":[128,176],"processing,":[129],"imbalance,":[131],"privacy":[133],"concerns,":[134],"making":[135,163],"it":[136],"practical":[137],"for":[138,155],"real-world":[139],"use.":[140],"research":[142],"shows":[143],"can":[146],"provide":[147],"powerful,":[149],"accurate,":[150],"scalable":[153],"solution":[154],"detecting":[156],"Future":[158],"work":[159],"will":[160],"focus":[161],"the":[164,192],"models":[165],"easier":[166],"understand,":[168],"privacy-friendly,":[169],"adaptable":[171],"new":[173],"types":[174],"hierarchical":[180],"graph":[181],"construction":[182],"relationships.,":[186],"ensuring":[187],"safer":[188],"digital":[193],"world.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
