2020
DOI: 10.17559/tv-20180427091048
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Different Distributions Dataset by Using Data Mining Techniques on Credit Card Fraud Detection

Abstract: Banks suffer multimillion-dollars losses each year for several reasons, the most important of which is due to credit card fraud. The issue is how to cope with the challenges we face with this kind of fraud. Skewed "class imbalance" is a very important challenge that faces this kind of fraud. Therefore, in this study, we explore four data mining techniques, namely naïve Bayesian (NB),Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Random Forest (RF), on actual credit card transactions from European c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…kNN can be defined as supervised learning approach that has been mainly utilized in the detection systems, also was extensively used in COVID-19 problems [21]. In such approach, new instance query has been classified on the basis of popular kNN distance measures, such as Minkowski distance, Euclidean distance, and Manhattan distance; we used the last one in this work.…”
Section: K-nearest Neighbors Modelmentioning
confidence: 99%
“…kNN can be defined as supervised learning approach that has been mainly utilized in the detection systems, also was extensively used in COVID-19 problems [21]. In such approach, new instance query has been classified on the basis of popular kNN distance measures, such as Minkowski distance, Euclidean distance, and Manhattan distance; we used the last one in this work.…”
Section: K-nearest Neighbors Modelmentioning
confidence: 99%
“…Previous reviews indicate that the transaction aggregation strategies are primarily important in the functionality engineering process. The dataset [14] contains the transactions carried out by a card holder over a period of 2 days of january 2017. Where there are in total 569,614 transactions, including 984, or 0.172% of the transactions are fraudulent transactions.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…In this study, we will use four well-known measures to assess the methodology, namely: precision, sensitivity, specificity and precision. These measures depend entirely on the four basic metrics (alarm rate), respectively "True Positive" (TP) of the number of fraudulent transactions which have been detected as a true alarm, "False Positive" (FP) the number of authentic transactions that were detected as a false alarm, "True Negative" (TN) the number of authentic transactions that were detected as a true alarm and "False Negative" (FN) are the number of fraudulent transactions missed [14], positive (P) means that the number of "fraudulent transactions" and negative (N) represents the number of "authentic transactions" the total of P and N means all transactions. Below are the equations for each measurement:…”
Section: Performance Measuresmentioning
confidence: 99%
See 2 more Smart Citations