3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Feature generation and contribution comparison for electronic fraud detection

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Modern money transfer services are convenient, attracting fraudulent actors to run scams in which victims are deceived into transferring funds to fraudulent accounts. Machine learning models are broadly applied due to the poor fraud detection performance of traditional rule-based approaches. Learning directly from raw transaction data is impractical due to its high-dimensional nature; most studies construct features instead by extracting patterns from raw transaction data. Past literature categorizes these features into recency, frequency, monetary, and anomaly detection features. We use various machine learning algorithms to examine the performance of features in these four categories with real transaction data; we compare them with the performance of our feature generation guideline based on the statistical perspectives and characteristics of (non)-fraudulent accounts. The results show that except for the monetary category, other feature categories used in the literature perform poorly regardless of which machine learning algorithm is used; anomaly detection features perform the worst. We find that even statistical features generated based on financial knowledge yield limited performance on a real transaction dataset. Our atypical detection characteristic of normal accounts improves the ability to distinguish them from fraudulent accounts and hence improves the overall detection results, outperforming other existent methods.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          Data mining for credit card fraud: A comparative study

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Sequence classification for credit-card fraud detection

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Feature engineering strategies for credit card fraud detection

                Bookmark

                Author and article information

                Contributors
                cameldai@mail.nctu.edu.tw
                Journal
                Sci Rep
                Sci Rep
                Scientific Reports
                Nature Publishing Group UK (London )
                2045-2322
                27 October 2022
                27 October 2022
                2022
                : 12
                : 18042
                Affiliations
                [1 ]GRID grid.510443.7, ISNI 0000 0004 8343 6706, College of Artificial Intelligence, , Yango University, ; Fuzhou, Fujian 350001 China
                [2 ]GRID grid.260539.b, ISNI 0000 0001 2059 7017, Institute of Finance, , National Yang Ming Chiao Tung University, ; Hsinchu, 30010 Taiwan
                [3 ]GRID grid.260539.b, ISNI 0000 0001 2059 7017, Department of Information Management and Finance and Institute of Finance, , National Yang Ming Chiao Tung University, ; Hsinchu, 30010 Taiwan
                [4 ]GRID grid.260539.b, ISNI 0000 0001 2059 7017, Institute of Computer Science and Engineering, , National Yang Ming Chiao Tung University, ; Hsinchu, 30010 Taiwan
                [5 ]GRID grid.412087.8, ISNI 0000 0001 0001 3889, Department of Information and Finance Management, , National Taipei University of Technology, ; Taipei, 10608 Taiwan
                Article
                22130
                10.1038/s41598-022-22130-2
                9613914
                36302818
                4fcc0279-5ac6-4bf5-beda-9e20c7b533a2
                © The Author(s) 2022

                Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

                History
                : 5 December 2021
                : 10 October 2022
                Categories
                Article
                Custom metadata
                © The Author(s) 2022

                Uncategorized
                computer science,information technology
                Uncategorized
                computer science, information technology

                Comments

                Comment on this article