Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    A Novel Strategy for Mining Highly Imbalanced Data in Credit Card Transactions

    Masoumeh Zareapoor, Jie Yang

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 721-727, 2018, DOI:10.1080/10798587.2017.1321228

    Abstract The design of an efficient credit card fraud detection technique is, however, particularly challenging, due to the most striking characteristics which are; imbalancedness and non-stationary environment of the data. These issues in credit card datasets limit the machine learning algorithm to show a good performance in detecting the frauds. The research in the area of credit card fraud detection focused on detection the fraudulent transaction by analysis of normality and abnormality concepts. Balancing strategy which is designed in this paper can facilitate classification and retrieval problems in this domain. In this paper, we consider the classification problem in supervised learning… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access

    ARTICLE

    A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid

    Khelifi Naim1, *, Benahmed Khelifa2, Bounaama Fateh3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 97-117, 2020, DOI:10.32604/cmc.2020.09391

    Abstract In order to strengthen their security issues, electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields. Having been treated earlier by several researchers, various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses, aiming primarily to the identification of suspicious incoming hazards. Wireless meshes have been extensively used in smart grid communication architectures due to their facility, lightness of conception and low cost installation; however, the communicated packets are still exposed to be intercepted maliciously in order either… More >

  • Open Access

    ARTICLE

    A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data Analytics

    Hangjun Zhou1,2,*, Guang Sun1,3, Sha Fu1, Wangdong Jiang1, Juan Xue1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 179-192, 2019, DOI:10.32604/cmc.2019.05214

    Abstract With the rapid development of mobile Internet and finance technology, online e-commerce transactions have been increasing and expanding very fast, which globally brings a lot of convenience and availability to our life, but meanwhile, chances of committing frauds also come in all shapes and sizes. Moreover, fraud detection in online e-commerce transactions is not totally the same to that in the existing areas due to the massive amounts of data generated in e-commerce, which makes the fraudulent transactions more covertly scattered with genuine transactions than before. In this article, a novel scalable and comprehensive approach for fraud detection in online… More >

  • Open Access

    ARTICLE

    Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media

    Chengzhang Zhu1, 2, Wentao Zhao2, *, Qian Li1, Pan Li2, Qiaobo Da3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 317-333, 2019, DOI:10.32604/cmc.2019.05677

    Abstract Detecting collaborative fraudsters who manipulate opinions in social media is becoming extremely important in order to provide reliable information, in which, however, the diversity in different groups of collaborative fraudsters presents a significant challenge to existing collaborative fraudsters detection methods. These methods often detect collaborative fraudsters as the largest group of users who have the strongest relation with each other in the social media, consequently overlooking the other groups of fraudsters that are with strong user relation yet small group size. This paper introduces a novel network embedding-based framework NEST and its instance BEST to address this issue. NEST detects… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

Displaying 21-30 on page 3 of 26. Per Page