{"id":"https://openalex.org/W4390547231","doi":"https://doi.org/10.3390/bdcc8010006","title":"Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach","display_name":"Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4390547231","doi":"https://doi.org/10.3390/bdcc8010006"},"language":"en","primary_location":{"id":"doi:10.3390/bdcc8010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010006","pdf_url":"https://www.mdpi.com/2504-2289/8/1/6/pdf?version=1704285744","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-2289/8/1/6/pdf?version=1704285744","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102455393","display_name":"Abdul Rehman Khalid","orcid":null},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abdul Rehman Khalid","raw_affiliation_strings":["Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006442034","display_name":"Nsikak Owoh","orcid":"https://orcid.org/0000-0002-4840-9345"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nsikak Owoh","raw_affiliation_strings":["Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK"],"raw_orcid":"https://orcid.org/0000-0002-4840-9345","affiliations":[{"raw_affiliation_string":"Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072343124","display_name":"Omair Uthmani","orcid":null},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Omair Uthmani","raw_affiliation_strings":["Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085428147","display_name":"Moses Ashawa","orcid":"https://orcid.org/0000-0002-1016-0791"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Moses Ashawa","raw_affiliation_strings":["Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK"],"raw_orcid":"https://orcid.org/0000-0002-1016-0791","affiliations":[{"raw_affiliation_string":"Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067594566","display_name":"Jude Osamor","orcid":"https://orcid.org/0000-0002-3739-8521"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jude Osamor","raw_affiliation_strings":["Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK"],"raw_orcid":"https://orcid.org/0000-0002-3739-8521","affiliations":[{"raw_affiliation_string":"Department of Cyber Security and Networks, Glasgow Caledonian University, Glasgow G4 0BA, UK","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093495470","display_name":"John Adejoh","orcid":"https://orcid.org/0009-0007-6133-6092"},"institutions":[{"id":"https://openalex.org/I2799873615","display_name":"African Institute of Science and Technology","ror":"https://ror.org/05rcqrz41","country_code":"NG","type":"education","lineage":["https://openalex.org/I2799873615"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"John Adejoh","raw_affiliation_strings":["Department of Software Engineering, African University of Science and Technology, Abuja 900107, Nigeria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, African University of Science and Technology, Abuja 900107, Nigeria","institution_ids":["https://openalex.org/I2799873615"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006442034"],"corresponding_institution_ids":["https://openalex.org/I195939026"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":51.9882,"has_fulltext":true,"cited_by_count":157,"citation_normalized_percentile":{"value":0.99913972,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":"1","first_page":"6","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11653","display_name":"Financial Distress and Bankruptcy Prediction","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.8800656795501709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7974278926849365},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7690860033035278},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.7242722511291504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6770610809326172},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6485226154327393},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.640600323677063},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.6340739130973816},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5570404529571533},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.5302174687385559},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.4978513717651367},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4451201260089874},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42688262462615967}],"concepts":[{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.8800656795501709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7974278926849365},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7690860033035278},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.7242722511291504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6770610809326172},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6485226154327393},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.640600323677063},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.6340739130973816},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5570404529571533},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.5302174687385559},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.4978513717651367},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4451201260089874},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42688262462615967},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/bdcc8010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010006","pdf_url":"https://www.mdpi.com/2504-2289/8/1/6/pdf?version=1704285744","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire_cris_publications/b7d661f0-e11d-4bd4-a0bd-c2ee0c61a304","is_oa":true,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/b7d661f0-e11d-4bd4-a0bd-c2ee0c61a304","pdf_url":"https://researchonline.gcu.ac.uk/ws/files/83214139/83184093.pdf","source":{"id":"https://openalex.org/S7407055385","display_name":"ResearchOnline","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rehman Khalid, A, Owoh, N, Uthmani, O, Ashawa, M, Osamor, J & Adejoh, J 2024, 'Enhancing credit card fraud detection: an ensemble machine learning approach', Big Data and Cognitive Computing, vol. 8, no. 1, 6. https://doi.org/10.3390/bdcc8010006","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:a9bd2a0e916f4726b6917d748bed9ab5","is_oa":true,"landing_page_url":"https://doaj.org/article/a9bd2a0e916f4726b6917d748bed9ab5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing, Vol 8, Iss 1, p 6 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/bdcc8010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010006","pdf_url":"https://www.mdpi.com/2504-2289/8/1/6/pdf?version=1704285744","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390547231.pdf"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W2078464577","https://openalex.org/W2135107501","https://openalex.org/W2590489721","https://openalex.org/W2779931100","https://openalex.org/W2785637175","https://openalex.org/W2804765537","https://openalex.org/W2805595195","https://openalex.org/W2811256290","https://openalex.org/W2867605356","https://openalex.org/W2903262167","https://openalex.org/W2917802572","https://openalex.org/W2921850216","https://openalex.org/W2936311765","https://openalex.org/W2966244084","https://openalex.org/W2977753948","https://openalex.org/W3004442222","https://openalex.org/W3006782564","https://openalex.org/W3036230325","https://openalex.org/W3040219594","https://openalex.org/W3095164600","https://openalex.org/W3134465474","https://openalex.org/W3172695087","https://openalex.org/W3197309288","https://openalex.org/W3199196172","https://openalex.org/W4210242534","https://openalex.org/W4210384905","https://openalex.org/W4241699496","https://openalex.org/W4242188481","https://openalex.org/W4281482079","https://openalex.org/W4283211166","https://openalex.org/W4310579731","https://openalex.org/W4318559683","https://openalex.org/W4323021758","https://openalex.org/W4377969630","https://openalex.org/W4391668356","https://openalex.org/W6753394987","https://openalex.org/W6760681988","https://openalex.org/W6768499823","https://openalex.org/W6823339084","https://openalex.org/W6838480525","https://openalex.org/W6847437350"],"related_works":["https://openalex.org/W4224237387","https://openalex.org/W2483711049","https://openalex.org/W3150316110","https://openalex.org/W3153799676","https://openalex.org/W4313247660","https://openalex.org/W2984276143","https://openalex.org/W4281702918","https://openalex.org/W4283392145","https://openalex.org/W3111672143","https://openalex.org/W4281858644"],"abstract_inverted_index":{"In":[0],"the":[1,6,13,26,107,121,134,156,182,194,198,216,224,234,243,249],"era":[2],"of":[3,8,15,28,47,77,133,155,197,226,251],"digital":[4],"advancements,":[5],"escalation":[7],"credit":[9,39,114,144,205,264],"card":[10,40,115,145,206,265],"fraud":[11,19,41,55,207,256,266],"necessitates":[12],"development":[14,250],"robust":[16],"and":[17,69,100,120,166,177,190,213,254],"efficient":[18,174],"detection":[20,56,257],"systems.":[21],"This":[22,103,221],"paper":[23,222],"delves":[24],"into":[25],"application":[27],"machine":[29,128,187],"learning":[30,129,188],"models,":[31],"specifically":[32],"focusing":[33],"on":[34,126],"ensemble":[35,84,104,184,199,217,227],"methods,":[36,189],"to":[37,269],"enhance":[38],"detection.":[42,208],"Through":[43],"an":[44],"extensive":[45],"review":[46],"existing":[48,219],"literature,":[49],"we":[50,80],"identified":[51],"limitations":[52],"in":[53,71,200,233,248],"current":[54],"technologies,":[57],"including":[58],"issues":[59],"like":[60],"data":[61,160],"imbalance,":[62],"concept":[63],"drift,":[64],"false":[65],"positives/negatives,":[66],"limited":[67],"generalisability,":[68],"challenges":[70,202],"real-time":[72],"processing.":[73],"To":[74],"address":[75],"some":[76,127],"these":[78],"shortcomings,":[79],"propose":[81],"a":[82,88,137,148,230],"novel":[83],"model":[85,105,135,158,164,175],"that":[86],"integrates":[87],"Support":[89],"Vector":[90],"Machine":[91],"(SVM),":[92],"K-Nearest":[93],"Neighbor":[94],"(KNN),":[95],"Random":[96],"Forest":[97],"(RF),":[98],"Bagging,":[99],"Boosting":[101],"classifiers.":[102],"tackles":[106],"dataset":[108,138],"imbalance":[109],"problem":[110],"associated":[111,203],"with":[112,168,204],"most":[113],"datasets":[116],"by":[117],"implementing":[118],"under-sampling":[119],"Synthetic":[122],"Over-sampling":[123],"Technique":[124],"(SMOTE)":[125],"algorithms.":[130],"The":[131,153,239],"evaluation":[132],"utilises":[136],"comprising":[139],"transaction":[140],"records":[141],"from":[142],"European":[143],"holders,":[146],"providing":[147],"realistic":[149],"scenario":[150],"for":[151,245],"assessment.":[152],"methodology":[154],"proposed":[157,183],"encompasses":[159],"pre-processing,":[161],"feature":[162],"engineering,":[163],"selection,":[165],"evaluation,":[167],"Google":[169],"Colab":[170],"computational":[171],"capabilities":[172],"facilitating":[173],"training":[176],"testing.":[178],"Comparative":[179],"analysis":[180],"between":[181],"model,":[185],"traditional":[186],"individual":[191],"classifiers":[192],"reveals":[193],"superior":[195],"performance":[196],"mitigating":[201],"Across":[209],"accuracy,":[210],"precision,":[211],"recall,":[212],"F1-score":[214],"metrics,":[215],"outperforms":[218],"models.":[220],"underscores":[223],"efficacy":[225],"methods":[228],"as":[229,263],"valuable":[231],"tool":[232],"battle":[235],"against":[236],"fraudulent":[237],"transactions.":[238],"findings":[240],"presented":[241],"lay":[242],"groundwork":[244],"future":[246],"advancements":[247],"more":[252],"resilient":[253],"adaptive":[255],"systems,":[258],"which":[259],"will":[260],"become":[261],"crucial":[262],"techniques":[267],"continue":[268],"evolve.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":14},{"year":2025,"cited_by_count":93},{"year":2024,"cited_by_count":50}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2024-01-04T00:00:00"}
