{"id":"https://openalex.org/W3011682696","doi":"https://doi.org/10.1145/3377049.3377113","title":"Credit Card Fraud Detection using Data Pre-processing on Imbalanced Data - both Oversampling and Undersampling","display_name":"Credit Card Fraud Detection using Data Pre-processing on Imbalanced Data - both Oversampling and Undersampling","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3011682696","doi":"https://doi.org/10.1145/3377049.3377113","mag":"3011682696"},"language":"en","primary_location":{"id":"doi:10.1145/3377049.3377113","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377049.3377113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computing Advancements","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001768314","display_name":"Jalal Ahammad","orcid":null},"institutions":[{"id":"https://openalex.org/I32883739","display_name":"Stamford University Bangladesh","ror":"https://ror.org/0441jdk54","country_code":"BD","type":"education","lineage":["https://openalex.org/I32883739"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Jalal Ahammad","raw_affiliation_strings":["Stamford University Bangladesh, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Stamford University Bangladesh, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I32883739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037257059","display_name":"Nazia Hossain","orcid":null},"institutions":[{"id":"https://openalex.org/I32883739","display_name":"Stamford University Bangladesh","ror":"https://ror.org/0441jdk54","country_code":"BD","type":"education","lineage":["https://openalex.org/I32883739"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Nazia Hossain","raw_affiliation_strings":["Stamford University Bangladesh, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Stamford University Bangladesh, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I32883739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002525140","display_name":"Mohammad Shafiul Alam","orcid":"https://orcid.org/0000-0002-2393-0791"},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Mohammad Shafiul Alam","raw_affiliation_strings":["Ahsanullah University of Science and Technology, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science and Technology, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001768314"],"corresponding_institution_ids":["https://openalex.org/I32883739"],"apc_list":null,"apc_paid":null,"fwci":1.3256,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84413628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/undersampling","display_name":"Undersampling","score":0.972000002861023},{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.8259526491165161},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.7038813233375549},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7033697962760925},{"id":"https://openalex.org/keywords/debit-card","display_name":"Debit card","score":0.6752513647079468},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.6546914577484131},{"id":"https://openalex.org/keywords/purchasing","display_name":"Purchasing","score":0.5908790230751038},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4927826225757599},{"id":"https://openalex.org/keywords/transaction-data","display_name":"Transaction data","score":0.43994802236557007},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.42378056049346924},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4153323173522949},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33765706419944763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32119274139404297},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.294435054063797},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20134249329566956},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18539321422576904},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18315991759300232}],"concepts":[{"id":"https://openalex.org/C136536468","wikidata":"https://www.wikidata.org/wiki/Q1225894","display_name":"Undersampling","level":2,"score":0.972000002861023},{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.8259526491165161},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.7038813233375549},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7033697962760925},{"id":"https://openalex.org/C2777303138","wikidata":"https://www.wikidata.org/wiki/Q13499","display_name":"Debit card","level":4,"score":0.6752513647079468},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.6546914577484131},{"id":"https://openalex.org/C2778813691","wikidata":"https://www.wikidata.org/wiki/Q1369832","display_name":"Purchasing","level":2,"score":0.5908790230751038},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4927826225757599},{"id":"https://openalex.org/C127722929","wikidata":"https://www.wikidata.org/wiki/Q7833714","display_name":"Transaction data","level":3,"score":0.43994802236557007},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.42378056049346924},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4153323173522949},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33765706419944763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32119274139404297},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.294435054063797},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20134249329566956},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18539321422576904},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18315991759300232},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377049.3377113","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377049.3377113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computing Advancements","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1220184433","https://openalex.org/W1970532985","https://openalex.org/W2024223694","https://openalex.org/W2058504788","https://openalex.org/W2088402748","https://openalex.org/W2096266510","https://openalex.org/W2098250644","https://openalex.org/W2115008841","https://openalex.org/W2122535208","https://openalex.org/W2123166813","https://openalex.org/W2126536530","https://openalex.org/W2148143831","https://openalex.org/W2294246171","https://openalex.org/W2901698922","https://openalex.org/W2942805196"],"related_works":["https://openalex.org/W32988189","https://openalex.org/W4308469503","https://openalex.org/W2904737874","https://openalex.org/W2399571531","https://openalex.org/W4288337828","https://openalex.org/W80466363","https://openalex.org/W2947132063","https://openalex.org/W4287816717","https://openalex.org/W3016117175","https://openalex.org/W3199294801"],"abstract_inverted_index":{"Online":[0],"or":[1,6],"Offline":[2],"purchasing":[3],"using":[4],"credit":[5,49],"debit":[7],"card":[8,50],"has":[9,81,96],"been":[10,97],"popularized":[11],"rapidly":[12],"for":[13],"its":[14],"ease":[15],"and":[16,41,62,119,140],"flexibility":[17],"of":[18,24,43,46,104,116],"use.":[19],"With":[20],"the":[21,39,73,76,84,137],"growing":[22],"rate":[23],"online":[25],"purchasing,":[26],"fraudulent":[27,139],"transactions":[28],"have":[29,37],"also":[30],"increased":[31],"with":[32],"an":[33,67],"alarming":[34],"rate.":[35],"Researchers":[36],"investigated":[38],"reason":[40],"remedies":[42],"these":[44],"kind":[45],"acts.":[47],"However,":[48],"fraud":[51,61,64,93],"detection":[52,94],"can":[53,100],"be":[54],"categorized":[55],"into":[56],"two":[57],"sections":[58],"in":[59,86],"application":[60,68],"behavioral":[63,151],"aspects.":[65],"While":[66],"is":[69,133],"being":[70],"compromised":[71],"by":[72],"cyber-crimes,":[74],"then,":[75],"user":[77,105],"behavior":[78],"analytic":[79],"system":[80,95,144],"come":[82],"to":[83,135,149],"limelight":[85],"recent":[87],"days.":[88],"In":[89],"this":[90],"research,":[91],"a":[92,112],"built,":[98],"which":[99],"distinguish":[101,136],"three":[102],"types":[103],"from":[106],"pre-processed":[107],"transaction":[108],"logs.":[109],"To":[110],"prepare":[111],"balanced":[113],"dataset,":[114],"undersampling":[115],"majority":[117],"class":[118,126],"synthetic":[120],"minority":[121,125],"over-sampling":[122],"technique":[123],"on":[124,128],"applied":[127],"feature":[129],"vectors.":[130],"K-nearest":[131],"neighbor":[132],"used":[134],"legal,":[138],"enigmatic":[141],"users.":[142],"This":[143],"outperforms":[145],"current":[146],"state-of-art":[147],"techniques":[148],"get":[150],"analytics.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
