Comparative Evaluation of Machine Learning Algorithms for Credit Card Fraud Detection

被引:0
作者
Singh, Kiran Jot [1 ]
Thakur, Khushal [1 ]
Kapoor, Divneet Singh [1 ]
Sharma, Anshul [1 ]
Bajpai, Sakshi [2 ]
Sirawag, Neeraj [2 ]
Mehta, Riya [2 ]
Chaudhary, Chitransh [2 ]
Singh, Utkarsh [2 ]
机构
[1] Chandigarh Univ, Elect & Commun Engn Dept, Mohali 140413, Punjab, India
[2] Chandigarh Univ, Comp Sci & Engn Dept, Mohali 140413, Punjab, India
来源
THIRD CONGRESS ON INTELLIGENT SYSTEMS, CIS 2022, VOL 1 | 2023年 / 608卷
关键词
Credit card fraud; Machine learning; Data science default model prediction; Credit cards; Risk prediction;
D O I
10.1007/978-981-19-9225-4_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Banks are the backbone of the economy of any country, and hence, it is essential that they function properly so as to achieve a booming and sustainable economy. The major barrier for banks is the defaults on the credits they give to the customer. As banks profit mostly from the loans they give to customer, hence, it is required that they possess a solid and efficient model to minimize the losses they incur via the credit defaults. This article assesses the credit card default prediction's performance. Earlier the credit card defaults were tallied using standard tools such as FICO scores, but with the development of machine learning, it became much easier to build highly effective risk prediction model. Anyone with a bit of machine learning knowledge would know that credit risk prediction is nothing but a mere binary classification problem. Thus, various machine learning models such as KNN, decision tree, random forest, and logistics regression have been applied. When we look into the credit risk of credit card clients, it indicates that random forest best specifies the aspects to examine with an accuracy of 82% and an area under curve of roughly 77%.
引用
收藏
页码:69 / 78
页数:10
相关论文
共 17 条
  • [1] Abor J. Y., 2019, MONEY BANKING AFRICA, P311, DOI [10.1007/978-3-319-77458-9_15, DOI 10.1007/978-3-319-77458-9_15]
  • [2] A Survey of Random Forest Based Methods for Intrusion Detection Systems
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03)
  • [3] An Intelligent Proposed Model for Task Offloading in Fog-Cloud Collaboration Using Logistics Regression
    Bukhari, Muhammad Mazhar
    Ghazal, Taher M.
    Abbas, Sagheer
    Khan, M. A.
    Farooq, Umer
    Wahbah, Hasan
    Ahmad, Munir
    Adnan, Khan Muhammad
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [4] Problem formulations and solvers in linear SVM: a review
    Chauhan, Vinod Kumar
    Dahiya, Kalpana
    Sharma, Anuj
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (02) : 803 - 855
  • [5] Dai Q., 2016, International Journal of Database Theory and Application, V9, P1, DOI [10.14257/ijdta.2016.9.5.01, DOI 10.14257/IJDTA.2016.9.5.01]
  • [6] Recent Advances in Handling Big Data for Wireless Sensor Networks
    Jawhar Q.
    Thakur K.
    Singh K.J.
    [J]. IEEE Potentials, 2020, 39 (06): : 22 - 27
  • [7] An Improved Algorithm for Data Gathering in Large-Scale Wireless Sensor Networks
    Jawhar, Quosain
    Thakur, Khushal
    [J]. PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 141 - 151
  • [8] Consumer credit scores as a novel tool for identifying health in urban US neighborhoods
    Knapp, Emily A.
    Dean, Lorraine T.
    [J]. ANNALS OF EPIDEMIOLOGY, 2018, 28 (10) : 724 - 729
  • [9] Preventing Identity Theft: Perspectives on Technological Solutions from Industry Insiders
    Piquero, Nicole Leeper
    Piquero, Alex R.
    Gies, Stephen
    Green, Brandn
    Bobnis, Amanda
    Velasquez, Eva
    [J]. VICTIMS & OFFENDERS, 2021, 16 (03) : 444 - 463
  • [10] Sachdeva P, 2015, 2015 2 INT C REC ADV, P1, DOI [10.1109/RAECS.2015.7453356, DOI 10.1109/RAECS.2015.7453356]