{"id":"https://openalex.org/W4396852794","doi":"https://doi.org/10.1145/3647444.3647881","title":"Credit Card Fraud Detector for Lower Ranged Transactions using AI Algorithms","display_name":"Credit Card Fraud Detector for Lower Ranged Transactions using AI Algorithms","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852794","doi":"https://doi.org/10.1145/3647444.3647881"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647881","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072852695","display_name":"V.Shravan Kumar S. Udaya Kumar","orcid":"https://orcid.org/0009-0007-6570-0285"},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vani Kumar","raw_affiliation_strings":["Networking and Communication Department, SRM Institute of Science &amp; Technology, India"],"affiliations":[{"raw_affiliation_string":"Networking and Communication Department, SRM Institute of Science &amp; Technology, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103187536","display_name":"Vanshaj Bhardwaj","orcid":"https://orcid.org/0009-0001-8663-0104"},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vanshaj Bhardwaj","raw_affiliation_strings":["Networking and Communication, SRM Institute of Science and Technology, India"],"affiliations":[{"raw_affiliation_string":"Networking and Communication, SRM Institute of Science and Technology, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5097927797","display_name":"V Anbarasu","orcid":null},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V Anbarasu","raw_affiliation_strings":["Department of Networking and Communications, SRM Institute of Science and Technology, India"],"affiliations":[{"raw_affiliation_string":"Department of Networking and Communications, SRM Institute of Science and Technology, India","institution_ids":["https://openalex.org/I145286018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072852695"],"corresponding_institution_ids":["https://openalex.org/I145286018"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60890595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11653","display_name":"Financial Distress and Bankruptcy Prediction","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7310159802436829},{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.6983109712600708},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.6727731823921204},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4982180595397949},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4122195839881897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3576098084449768},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09754228591918945},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09224441647529602},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.07014957070350647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7310159802436829},{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.6983109712600708},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.6727731823921204},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4982180595397949},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4122195839881897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3576098084449768},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09754228591918945},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09224441647529602},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.07014957070350647}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647881","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2045049630","https://openalex.org/W2053529851","https://openalex.org/W2795064858","https://openalex.org/W2946967491","https://openalex.org/W2966434751","https://openalex.org/W2970146637","https://openalex.org/W3186353005","https://openalex.org/W4226183209","https://openalex.org/W4294192778","https://openalex.org/W4310736693","https://openalex.org/W4404399723"],"related_works":["https://openalex.org/W2483711049","https://openalex.org/W4224237387","https://openalex.org/W3150316110","https://openalex.org/W4313247660","https://openalex.org/W3153799676","https://openalex.org/W2984276143","https://openalex.org/W4281702918","https://openalex.org/W4283392145","https://openalex.org/W4281858644","https://openalex.org/W4318428678"],"abstract_inverted_index":{"Financial":[0],"institutions":[1],"and":[2,19,51,56,65,78,100,119],"cardholders":[3],"are":[4,30,83],"equally":[5],"at":[6],"risk":[7],"from":[8,112],"credit":[9,39,80],"card":[10,40,81],"fraud,":[11,104],"which":[12],"can":[13],"lead":[14],"to":[15,32,54,97,130],"large":[16],"financial":[17],"losses":[18],"compromised":[20],"data":[21,52],"security.":[22],"In":[23],"this":[24],"work,":[25],"artificial":[26],"intelligence":[27],"(AI)":[28],"techniques":[29],"used":[31],"demonstrate":[33],"a":[34,66,72],"sophisticated":[35],"method":[36],"of":[37,75,87,103],"detecting":[38],"fraud.":[41],"The":[42],"suggested":[43],"system":[44,127],"uses":[45],"anomaly":[46],"detection,":[47],"machine":[48,92],"learning":[49,93],"techniques,":[50],"analysis":[53],"effectively":[55],"accurately":[57],"identify":[58,98],"fraudulent":[59],"transactions.":[60],"Data":[61],"preprocessing,":[62],"feature":[63,105],"engineering,":[64],"model":[67,94],"that":[68],"was":[69],"trained":[70],"on":[71,108,123],"sizable":[73],"dataset":[74],"both":[76],"honest":[77],"dishonest":[79],"transactions":[82],"the":[84,91,126],"main":[85],"parts":[86],"our":[88],"system.":[89],"While":[90],"is":[95],"built":[96],"anomalies":[99],"patterns":[101],"suggestive":[102],"engineering":[106],"works":[107],"extracting":[109],"relevant":[110],"information":[111],"transaction":[113],"data.":[114],"By":[115],"implementing":[116],"retraining":[117],"processes":[118],"keeping":[120],"an":[121],"eye":[122],"developing":[124],"patterns,":[125],"continuously":[128],"adjusts":[129],"new":[131],"fraud":[132],"strategies.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
