Affiliation:
1. Department of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur India
2. Computer Science & Engineering R.V.R & J.C. College of Engineering Andhra Pradesh Guntur India
3. Mechanical Engineering R.V.R & J.C. College of Engineering Guntur Andhra Pradesh India
Abstract
SummaryDigital transactions based on credit cards are gradually increasing concept due to expediency. The amount of fraudulent transactions has intensely enlarged in modern days, because of the fast development of e‐services, namely e‐finance, mobile payments, and e‐commerce as well as the promotion of credit cards. Criminal fraud behaviors and user's payment behaviors are frequently varying, thus performance improvement of the fraud identification method and its stability are more challenging processes. The Shuffled Shepherd Political Optimization‐based Deep Residual network (SSPO‐based DRN) scheme is established for credit card fraud identification in this research. The SSPO is developed by merging the Political Optimization (PO) and Shuffled Shepherd Optimization Algorithm (SSOA). The quantile normalization model is an effective preprocessing technique, which normalizes the data for effective detection. Moreover, fisher score and class information gain effectively select the required features. Data augmentation is employed for increasing the data size, thereby the detection performance is improved. The Deep Residual Network (DRN) is employed for credit card fraud recognition, which is trained by devised SSPO algorithm. The SSPO‐based DRN approach achieved enhanced performance with testing sensitivity of 0.9279, specificity of 0.9023, and accuracy of 0.9120.
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference44 articles.
1. Comprehensive Review of Cybercrime Detection Techniques
2. AdilM MadaniR TavakkolS DavoudiA.A first‐order numerical algorithm without matrix operations.arXiv:2203.05027.2022.
3. A bio‐inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking;Darwish SM;J Amb Intell Humaniz Comput,2020
4. NoSQL injection: data security on web vulnerability;Alazeez MA;Int Jf Secur Appl,2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献