Ensemble and Mixed Learning Techniques for Credit Card Fraud Detection
- URL: http://arxiv.org/abs/2112.02627v1
- Date: Sun, 5 Dec 2021 17:17:04 GMT
- Title: Ensemble and Mixed Learning Techniques for Credit Card Fraud Detection
- Authors: Daniel H. M. de Souza and Claudio J. Bordin Jr
- Abstract summary: We use a mixed learning technique that uses K-means preprocessing before trained classification to the problem at hand.
We introduce an adapted detector ensemble technique that uses OR-logic algorithm aggregation to enhance the detection rate.
We observed from simulation results that the proposed methods diminished computational cost and enhanced performance.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Spurious credit card transactions are a significant source of financial
losses and urge the development of accurate fraud detection algorithms. In this
paper, we use machine learning strategies for such an aim. First, we apply a
mixed learning technique that uses K-means preprocessing before trained
classification to the problem at hand. Next, we introduce an adapted detector
ensemble technique that uses OR-logic algorithm aggregation to enhance the
detection rate. Then, both strategies are deployed in tandem in numerical
simulations using real-world transactions data. We observed from simulation
results that the proposed methods diminished computational cost and enhanced
performance concerning state-of-the-art techniques.
Related papers
- A Data Balancing and Ensemble Learning Approach for Credit Card Fraud Detection [1.8921747725821432]
This research introduces an innovative method for identifying credit card fraud by combining the SMOTE-KMEANS technique with an ensemble machine learning model.
The proposed model was benchmarked against traditional models such as logistic regression, decision trees, random forests, and support vector machines.
Results demonstrated that the proposed model achieved superior performance, with an AUC of 0.96 when combined with the SMOTE-KMEANS algorithm.
arXiv Detail & Related papers (2025-03-27T04:59:45Z) - Learning for Cross-Layer Resource Allocation in MEC-Aided Cell-Free Networks [71.30914500714262]
Cross-layer resource allocation over mobile edge computing (MEC)-aided cell-free networks can sufficiently exploit the transmitting and computing resources to promote the data rate.
Joint subcarrier allocation and beamforming optimization are investigated for the MEC-aided cell-free network from the perspective of deep learning.
arXiv Detail & Related papers (2024-12-21T10:18:55Z) - Financial Fraud Detection using Jump-Attentive Graph Neural Networks [0.0]
A significant portion of the financial services sector employs various machine learning algorithms, such as XGBoost, Random Forest, and neural networks, to model transaction data.
We propose a novel algorithm that employs an efficient neighborhood sampling method, effective for camouflage detection and preserving crucial feature information from non-similar nodes.
arXiv Detail & Related papers (2024-11-07T05:12:51Z) - Neural Active Learning Beyond Bandits [69.99592173038903]
We study both stream-based and pool-based active learning with neural network approximations.
We propose two algorithms based on the newly designed exploitation and exploration neural networks for stream-based and pool-based active learning.
arXiv Detail & Related papers (2024-04-18T21:52:14Z) - Credit Card Fraud Detection with Subspace Learning-based One-Class
Classification [18.094622095967328]
One-Class Classification (OCC) algorithms excel in handling imbalanced data distributions.
These algorithms integrate subspace learning into the data description.
These algorithms transform the data into a lower-dimensional subspace optimized for OCC.
arXiv Detail & Related papers (2023-09-26T12:26:28Z) - Representation Learning with Multi-Step Inverse Kinematics: An Efficient
and Optimal Approach to Rich-Observation RL [106.82295532402335]
Existing reinforcement learning algorithms suffer from computational intractability, strong statistical assumptions, and suboptimal sample complexity.
We provide the first computationally efficient algorithm that attains rate-optimal sample complexity with respect to the desired accuracy level.
Our algorithm, MusIK, combines systematic exploration with representation learning based on multi-step inverse kinematics.
arXiv Detail & Related papers (2023-04-12T14:51:47Z) - Optimized preprocessing and Tiny ML for Attention State Classification [2.7810511835091427]
We present a new approach to mental state classification from EEG signals by combining signal processing techniques and machine learning algorithms.
We evaluate the performance of the proposed method on a dataset of EEG recordings collected during a cognitive load task.
arXiv Detail & Related papers (2023-03-20T18:17:35Z) - Large-Scale Sequential Learning for Recommender and Engineering Systems [91.3755431537592]
In this thesis, we focus on the design of an automatic algorithms that provide personalized ranking by adapting to the current conditions.
For the former, we propose novel algorithm called SAROS that take into account both kinds of feedback for learning over the sequence of interactions.
The proposed idea of taking into account the neighbour lines shows statistically significant results in comparison with the initial approach for faults detection in power grid.
arXiv Detail & Related papers (2022-05-13T21:09:41Z) - Improving robustness of jet tagging algorithms with adversarial training [56.79800815519762]
We investigate the vulnerability of flavor tagging algorithms via application of adversarial attacks.
We present an adversarial training strategy that mitigates the impact of such simulated attacks.
arXiv Detail & Related papers (2022-03-25T19:57:19Z) - Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning [0.0]
Recently published attacks against deep neural networks (DNNs) have stressed the importance of methodologies and tools to assess the security risks of using this technology in critical systems.
We propose a new technique for defending deep neural network classifiers, and convolutional ones in particular.
Our defense is cheap in the sense that it requires less power despite a small cost to pay in terms of detection accuracy.
arXiv Detail & Related papers (2021-08-31T04:56:58Z) - Information Theoretic Meta Learning with Gaussian Processes [74.54485310507336]
We formulate meta learning using information theoretic concepts; namely, mutual information and the information bottleneck.
By making use of variational approximations to the mutual information, we derive a general and tractable framework for meta learning.
arXiv Detail & Related papers (2020-09-07T16:47:30Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling
Methods [2.741266294612776]
This study uses stacked generalization, which is a two-step process of combining machine learning methods, called meta or super learners, for improving the performance of algorithms.
Building a test harness that accounts for all permutations of algorithm sample set pairs demonstrates that the complex, intrinsic data structures are all thoroughly tested.
arXiv Detail & Related papers (2020-04-03T20:38:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.