{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:45:52Z","timestamp":1732038352499},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71771212","U1711262"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["14YJA630075","15YJA630068"],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004260","name":"Renmin University of China","doi-asserted-by":"publisher","award":["15XNLQ08"],"id":[{"id":"10.13039\/501100004260","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1016\/j.ins.2019.05.023","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T02:50:45Z","timestamp":1557975045000},"page":"302-316","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":133,"special_numbering":"C","title":["HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture"],"prefix":"10.1016","volume":"557","author":[{"given":"Xinwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yaoci","family":"Han","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9080-5034","authenticated-orcid":false,"given":"Qili","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2019.05.023_bib0001","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","article-title":"Fraud detection system: a survey","volume":"68","author":"Abdallah","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"10.1016\/j.ins.2019.05.023_bib0002","first-page":"1533","article-title":"Convolutional neural networks for speech recognition","volume":"22","author":"Abdel-Hamid","year":"2014","journal-title":"IEEE-ACM Trans. Audio. Sp."},{"key":"10.1016\/j.ins.2019.05.023_bib0003","series-title":"Proceedings of the IEEE\/IAFE Computational Intelligence for Financial Engineering (CIFEr)","first-page":"220","article-title":"Cardwatch: a neural network based database mining system for credit card fraud detection","author":"Aleskerov","year":"1997"},{"issue":"3","key":"10.1016\/j.ins.2019.05.023_bib0004","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","article-title":"Data mining for credit card fraud: a comparative study","volume":"50","author":"Bhattacharyya","year":"2011","journal-title":"Decis. Support Syst."},{"issue":"3","key":"10.1016\/j.ins.2019.05.023_bib0005","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: a review","volume":"17","author":"Bolton","year":"2002","journal-title":"Stat. Sci."},{"key":"10.1016\/j.ins.2019.05.023_bib0006","first-page":"103","article-title":"Neural data mining for credit card fraud detection, in: international Conference on Tools with Artificial Intelligence","author":"Brause","year":"1999","journal-title":"IEEE Comput. Soc."},{"issue":"5","key":"10.1016\/j.ins.2019.05.023_bib0007","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1057\/jors.2014.50","article-title":"Improving credit scoring by differentiating defaulter behaviour","volume":"66","author":"Bravo","year":"2015","journal-title":"J. Oper. Res. Soc."},{"key":"10.1016\/j.ins.2019.05.023_bib0008","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.dss.2017.01.002","article-title":"A data mining based system for credit-card fraud detection in e-tail","volume":"95","author":"Carneiro","year":"2017","journal-title":"Decis. Support Syst."},{"issue":"10","key":"10.1016\/j.ins.2019.05.023_bib0009","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","article-title":"Learned lessons in credit card fraud detection from a practitioner perspective","volume":"41","author":"Dal Pozzolo","year":"2014","journal-title":"Expert Syst. Appl"},{"issue":"2","key":"10.1016\/j.ins.2019.05.023_bib0010","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","article-title":"Finding structure in time","volume":"14","author":"Elman","year":"1990","journal-title":"Cognitive Sci"},{"key":"10.1016\/j.ins.2019.05.023_bib0011","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.ins.2016.08.084","article-title":"Attention pooling-based convolutional neural network for sentence modelling","volume":"373","author":"Er","year":"2016","journal-title":"Inform. Sci."},{"key":"10.1016\/j.ins.2019.05.023_bib0012","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","article-title":"Using generative adversarial networks for improving classification effectiveness in credit card fraud detection","volume":"479","author":"Fiore","year":"2019","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.ins.2019.05.023_bib0013","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.ejor.2017.11.054","article-title":"Deep learning with long short-term memory networks for financial market predictions","volume":"270","author":"Fischer","year":"2018","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.ins.2019.05.023_bib0014","series-title":"International Conference on Neural Information Processing","first-page":"483","article-title":"Credit card fraud detection using convolutional neural networks","author":"Fu","year":"2016"},{"key":"10.1016\/j.ins.2019.05.023_bib0015","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.ins.2018.06.043","article-title":"A new deep belief network based on RBM with glial chains","volume":"463","author":"Geng","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.05.023_bib0016","series-title":"Proceedings of the 27th Hawaii International Conference on System Sciences","first-page":"621","article-title":"Credit card fraud detection with a neural-network","author":"Ghosh","year":"1994"},{"key":"10.1016\/j.ins.2019.05.023_bib0017","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"156","article-title":"Learning non-linear reconstruction models for image set classification","author":"Hayat","year":"2014"},{"issue":"1","key":"10.1016\/j.ins.2019.05.023_bib0018","first-page":"65","article-title":"Theory of the backpropagation neural network","volume":"1","author":"Hecht-Nielsen","year":"1988","journal-title":"Neural Netw."},{"issue":"7","key":"10.1016\/j.ins.2019.05.023_bib0019","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","article-title":"A fast learning algorithm for deep belief nets","volume":"18","author":"Hinton","year":"2006","journal-title":"Neural Comput"},{"key":"10.1016\/j.ins.2019.05.023_bib0020","series-title":"Strategic Database Marketing","author":"Hughes","year":"2000"},{"issue":"16","key":"10.1016\/j.ins.2019.05.023_bib0021","doi-asserted-by":"crossref","first-page":"12650","DOI":"10.1016\/j.eswa.2012.05.018","article-title":"Employing transaction aggregation strategy to detect credit card fraud","volume":"39","author":"Jha","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2019.05.023_bib0022","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1725","article-title":"Large-scale video classification with convolutional neural networks","author":"Karpathy","year":"2014"},{"key":"10.1016\/j.ins.2019.05.023_bib0023","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.dss.2017.10.001","article-title":"Decision support from financial disclosures with deep neural networks and transfer learning","volume":"104","author":"Kraus","year":"2017","journal-title":"Decis. Support Syst."},{"issue":"8","key":"10.1016\/j.ins.2019.05.023_bib0024","doi-asserted-by":"crossref","first-page":"6070","DOI":"10.1016\/j.eswa.2010.02.119","article-title":"A hybrid model for plastic card fraud detection systems","volume":"37","author":"Krivko","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2019.05.023_bib0025","series-title":"International Conference on Machine Learning","first-page":"609","article-title":"Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations","author":"Lee","year":"2009"},{"key":"10.1016\/j.ins.2019.05.023_bib0026","series-title":"Advances in Neural Information Processing Systems","first-page":"1096","article-title":"Unsupervised feature learning for audio classification using convolutional deep belief networks","author":"Lee","year":"2009"},{"key":"10.1016\/j.ins.2019.05.023_bib0027","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.dss.2018.08.010","article-title":"Exploring the use of deep neural networks for sales forecasting in fashion retail","volume":"114","author":"Loureiro","year":"2018","journal-title":"Decis. Support Syst."},{"issue":"5","key":"10.1016\/j.ins.2019.05.023_bib0028","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1016\/j.eswa.2014.10.037","article-title":"Detecting credit card fraud by modified fisher discriminant analysis","volume":"42","author":"Mahmoudi","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2019.05.023_bib0029","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.dss.2017.10.007","article-title":"Integrated framework for profit-based feature selection and SVM classification in credit scoring","volume":"104","author":"Maldonado","year":"2017","journal-title":"Decis. Support Syst."},{"issue":"2","key":"10.1016\/j.ins.2019.05.023_bib0030","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02295996","article-title":"Note on the sampling error of the difference between correlated proportions or percentages","volume":"12","author":"Mcnemar","year":"1947","journal-title":"Psychometrika"},{"issue":"4","key":"10.1016\/j.ins.2019.05.023_bib0031","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","article-title":"Credit card fraud detection: a fusion approach using Dempster\u2013Shafer theory and Bayesian learning","volume":"10","author":"Panigrahi","year":"2009","journal-title":"Inf. Fusion"},{"issue":"2","key":"10.1016\/j.ins.2019.05.023_bib0032","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/j.ejor.2008.02.015","article-title":"On the communal analysis suspicion scoring for identity crime in streaming credit applications","volume":"195","author":"Phua","year":"2009","journal-title":"Eur. J. Oper. Res."},{"issue":"4","key":"10.1016\/j.ins.2019.05.023_bib0033","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1016\/j.eswa.2007.08.093","article-title":"Real-time credit card fraud detection using computational intelligence","volume":"35","author":"Quah","year":"2008","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2019.05.023_bib0034","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","article-title":"Neural networks for deceptive opinion spam detection: an empirical study","volume":"385","author":"Ren","year":"2017","journal-title":"Inform. Sciences"},{"key":"10.1016\/j.ins.2019.05.023_bib0035","series-title":"International Conference on Service Systems and Service Management","first-page":"1","article-title":"Application of classification models on credit card fraud detection","author":"Shen","year":"2007"},{"key":"10.1016\/j.ins.2019.05.023_bib0036","series-title":"Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management","first-page":"101","article-title":"A latent semantic model with convolutional-pooling structure for information retrieval","author":"Shen","year":"2014"},{"issue":"4","key":"10.1016\/j.ins.2019.05.023_bib0037","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","article-title":"A systematic analysis of performance measures for classification tasks","volume":"45","author":"Sokolova","year":"2009","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"10.1016\/j.ins.2019.05.023_bib0038","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/TDSC.2007.70228","article-title":"Credit card fraud detection using hidden Markov model","volume":"5","author":"Srivastava","year":"2008","journal-title":"IEEE Trans. Depend. Secure"},{"key":"10.1016\/j.ins.2019.05.023_bib0039","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","article-title":"APATE: a novel approach for automated credit card transaction fraud detection using network-based extensions","volume":"75","author":"Van Vlasselaer","year":"2015","journal-title":"Decis. Support Syst."},{"issue":"C","key":"10.1016\/j.ins.2019.05.023_bib0040","first-page":"81","article-title":"Accelerating wrapper-based feature selection with k-nearest-neighbor","volume":"83","author":"Wang","year":"2015","journal-title":"Knowl-based. Syst."},{"issue":"1","key":"10.1016\/j.ins.2019.05.023_bib0041","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s10618-008-0116-z","article-title":"Transaction aggregation as a strategy for credit card fraud detection","volume":"18","author":"Whitrow","year":"2009","journal-title":"Data Min. Knowl. Disc."},{"issue":"2","key":"10.1016\/j.ins.2019.05.023_bib0042","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s10707-017-0314-1","article-title":"Spatio-temporal prediction of crop disease severity for agricultural emergency management based on recurrent neural networks","volume":"22","author":"Xu","year":"2018","journal-title":"Geoinformatica"},{"issue":"1","key":"10.1016\/j.ins.2019.05.023_bib0043","first-page":"48","article-title":"Credit card fraud detection using self-organizing maps","volume":"18","author":"Zaslavsky","year":"2006","journal-title":"Inf. Secur."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002551930427X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002551930427X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T07:37:46Z","timestamp":1655969866000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002551930427X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":43,"alternative-id":["S002002551930427X"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.05.023","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2021,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.05.023","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}