2021
DOI: 10.1155/2021/6079582
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication

Abstract: In today’s era of technology, especially in the Internet commerce and banking, the transactions done by the Mastercards have been increasing rapidly. The card becomes the highly useable equipment for Internet shopping. Such demanding and inflation rate causes a considerable damage and enhancement in fraud cases also. It is very much necessary to stop the fraud transactions because it impacts on financial conditions over time the anomaly detection is having some important application to detect the fraud detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
42
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 75 publications
(43 citation statements)
references
References 12 publications
1
42
0
Order By: Relevance
“…Polycom, or mobile TV, facilitates audio and video communications between two or more individuals in two or more locations. Kiosks in e-Health are selfcontained devices (usually PCs) that provide interactive information to users [18,19]. Interoperable e-Healthcare services apply databases in the form of local data warehouses or cloud storage to enable decentralized query-driven deci-sion support [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…Polycom, or mobile TV, facilitates audio and video communications between two or more individuals in two or more locations. Kiosks in e-Health are selfcontained devices (usually PCs) that provide interactive information to users [18,19]. Interoperable e-Healthcare services apply databases in the form of local data warehouses or cloud storage to enable decentralized query-driven deci-sion support [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…To simplify, the weight and bias coefficients are denoted as v k and the nonlinear activation function as c k ∈ S 3 , respectively, in the formula [11]. e channels of every one feature in y (i,j,z)ʹ are mapped to the feature map using the same shared weight coefficients.…”
Section: Internal Structures Of the Networkmentioning
confidence: 99%
“…For example, the mainstream distributed systems Apache Spark and Apache Flink have adapted for the dimension table association scenario. Apache Spark proposed Spark Streaming to improve computing latency and provide stream computing support [14]. This computing model minimizes each elastic distributed dataset by splitting the unlimited streaming data into discrete (discredited) streams (Resilient Distributed Dataset, RDD) size, built microbatch data set, to achieve the effect similar to stream computing, and the delay of stream computing at this stage is 100 ms.…”
Section: Related Workmentioning
confidence: 99%