Fraud detection in credit card transaction using neural networks

被引:8
作者
Sadgali, Imane [1 ]
Sael, Nawal [1 ]
Benabbou, Faouzia [1 ]
机构
[1] Univ Hassan II Casablanca, Fac Sci Ben MSIK, Lab Modeling & Informat Technol, Casablanca, Morocco
来源
4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19) | 2019年
关键词
Fraud detection; machine learning; credit card; neural network; deep learning;
D O I
10.1145/3368756.3369082
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Banking transactions, such as online transactions, credit card transactions and the mobile wallet, are gaining popularity. People are shopping more and more using credit cards. Credit cards have become a necessity, to the virtual world, for digitized and paperless transactions. Millions of online transactions take place every day and all of these transactions are subject to various types of fraud. There are many techniques developed to analyze, detect and prevent credit card fraud, these techniques are no longer sufficient for current needs. In recent years, several studies have used machine Learning techniques to find solutions to this problem. In this paper, we present a comparative study of different techniques of machine learning, especially neural network, applied to the same dataset. Our analysis aims to propose a comprehensive guide to choose the best techniques for credit card fraud detection.
引用
收藏
页数:4
相关论文
共 30 条
  • [1] Askari SMS, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P446, DOI 10.1109/CCAA.2017.8229897
  • [2] Barker KJ., 2008, J FINANCIAL CRIME, V15, P398, DOI DOI 10.1108/13590790810907236
  • [3] Bengio Y, 2013, INT CONF ACOUST SPEE, P8624, DOI 10.1109/ICASSP.2013.6639349
  • [4] Bolton R. J., 2001, C CRED SCOR CRED CON
  • [5] Carcillo F., 2017, INT J DATA SCI ANAL, P1
  • [6] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [7] Criado R., 2017, ARXIV170601953V1, P1
  • [8] Cristianini N., 2000, INTRO SUPPORT VECTOR, DOI DOI 10.1017/CBO9780511801389
  • [9] Dai Y, 2016, IEEE TRUST BIG, P1644, DOI [10.1109/TrustCom.2016.251, 10.1109/TrustCom.2016.0253]
  • [10] Devi J V, 2017, INT C CURR TRENDS CO