An Autoencoder Based Model for Detecting Fraudulent Credit Card Transaction

被引:28
作者
Misra, Sumit [1 ]
Thakur, Soumyadeep [1 ]
Ghosh, Manosij [1 ]
Saha, Sanjoy Kumar [1 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Fraud Detection; Financial Transaction; Autoencoder;
D O I
10.1016/j.procs.2020.03.219
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth in credit card based financial transactions, it has become important to identify the fraudulent ones. In this work, a two stage model is proposed to identify such fraudulent transactions. To make a fraud detection system trustworthy, both miss in fraud detection and false alarms are to minimized Understanding and learning the complex associations among the transaction attributes is a major problem. To address this issue, at the first stage of the proposed model an autoencoder is used to transform the transaction attributes to a feature vector of lower dimension. The feature vector thus obtained is used as the input to a classifier at the second stage. Experiment is done on a benchmarked dataset. It is observed that in terms of F1-measure, proposed two stage model performs better than the systems relying on only classifier and other autoencoder based systems. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:254 / 262
页数:9
相关论文
共 28 条
[1]   Fraud detection system: A survey [J].
Abdallah, Aisha ;
Maarof, Mohd Aizaini ;
Zainal, Anazida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :90-113
[2]  
Alexopoulos P, 2007, ICE-B 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON E-BUSINESS, P269
[3]  
Allan G, 2010, PALGR MAC STUD FAM, P1
[4]  
[Anonymous], 2012, INT J SCI ENG TECHNO
[5]  
Awoyemi JO, 2017, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON COMPUTING NETWORKING AND INFORMATICS (ICCNI 2017)
[6]  
Baldi P., 2012, P ICML WORKSH UNS TR, V27, P37
[7]   USING MUTUAL INFORMATION FOR SELECTING FEATURES IN SUPERVISED NEURAL-NET LEARNING [J].
BATTITI, R .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (04) :537-550
[8]  
Bolton RJ, 2002, STAT SCI, V17, P235
[9]  
Brause R., 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence, P103, DOI 10.1109/TAI.1999.809773
[10]   A LIMITED MEMORY ALGORITHM FOR BOUND CONSTRAINED OPTIMIZATION [J].
BYRD, RH ;
LU, PH ;
NOCEDAL, J ;
ZHU, CY .
SIAM JOURNAL ON SCIENTIFIC COMPUTING, 1995, 16 (05) :1190-1208