skip to main content
10.1145/3529399.3529429acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmltConference Proceedingsconference-collections
research-article

A Transformer-based Model Integrated with Feature Selection for Credit Card Fraud Detection

Published:10 June 2022Publication History

ABSTRACT

Credit card fraud has grabbed a lot of attention in data science domain in the past several years. Most previous works tackled this problem by using machine learning methods equipped with hand-crafted features. In this paper, we proposed a novel multi-stage method combing both feature selection by a machine learning method, as well as a transformer-based model as a classifier. Concretely, we firstly extracted the top-k important features from the original dataset, where they are further used to train the self-designed deep learning model. Experimental results shown that our model can achieve better results compared to the baseline models. Since we also incorporated transformer layer into our deep learning model, we also tested its performance and the results proves the effectiveness.

References

  1. Maja Puh, Ljiljana Brkić, "Detecting Credit Card Fraud Using Selected Machine Learning Algorithms", Information and Communication Technology Electronics and Microelectronics (MIPRO) 2019 42nd International Convention on, pp. 1250-1255, 2019.Google ScholarGoogle Scholar
  2. S. Dhankhad, E. Mohammed and B. Far, "Supervised Machine Learning Algorithms for Credit Card Fraudulent Transaction Detection: A Comparative Study," 2018 IEEE International Conference on Information Reuse and Integration (IRI), 2018, pp. 122-125, doi: 10.1109/IRI.2018.00025.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sun S, Zhang Z, Huang B C, Sparse-softmax: A Simpler and Faster Alternative Softmax Transformation[J]. arXiv preprint arXiv:2112.12433, 2021.Google ScholarGoogle Scholar
  4. Roy, A. , Sun, J. , Mahoney, R. , Alonzi, L. , Adams, S. , & Beling, P. . (2018). Deep learning detecting fraud in credit card transactions. 2018 Systems and Information Engineering Design Symposium (SIEDS). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  5. Cao, Jiarun, "CONNER: A Cascade Count and Measurement Extraction Tool for Scientific Discourse." Proceedings of the 15th International Workshop on Semantic Evaluation (SemEval-2021). 2021.Lin, Y., & Wu, J. (2021). Detection of gravitational waves using Bayesian neural networks. Physical Review D, 103(6).Google ScholarGoogle Scholar
  6. Zou J, Zhang J, Jiang P. Credit card fraud detection using autoencoder neural network[J]. arXiv preprint arXiv:1908.11553, 2019.Google ScholarGoogle Scholar
  7. Shantanu Rajora, Dong-Lin Li, Chandan Jha, Neha Bharill, Om Prakash Patel, Sudhanshu Joshi, Deepak Puthal, Mukesh Prasad, "A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance", Computational Intelligence (SSCI) 2018 IEEE Symposium Series on, pp. 1958-1963, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  8. Save, P., Tiwarekar, P., N., K., & Mahyavanshi, N. (2017). A Novel Idea for Credit Card Fraud Detection using Decision Tree. International Journal Of Computer Applications, 161(13), 6-9. https://doi.org/10.5120/ijca2017913413Google ScholarGoogle Scholar
  9. Sylvester, EVA, Bentzen, P, Bradbury, IR, et al. Applications of random forest feature selection for fine-scale genetic population assignment. Evol Appl. 2018; 11: 153– 165. https://doi.org/10.1111/eva.12524.Google ScholarGoogle Scholar
  10. Cao J, Ananiadou S. GenerativeRE: Incorporating a Novel Copy Mechanism and Pretrained Model for Joint Entity and Relation Extraction[C]//Findings of the Association for Computational Linguistics: EMNLP 2021. 2021: 2119-2126.Google ScholarGoogle Scholar
  11. Graves A., Fernández S., Schmidhuber J. (2005) Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition. In: Duch W., Kacprzyk J., Oja E., Zadrożny S. (eds) Artificial Neural Networks: Formal Models and Their Applications – ICANN 2005. ICANN 2005. Lecture Notes in Computer Science, vol 3697. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11550907_126Google ScholarGoogle ScholarCross RefCross Ref
  12. Vaswani A, Shazeer N, Parmar N, Attention is all you need[C]//Advances in neural information processing systems. 2017: 5998-6008.Google ScholarGoogle Scholar
  13. Sun S, Zhang Z, Huang B C, Sparse-softmax: A Simpler and Faster Alternative Softmax Transformation[J]. arXiv preprint arXiv:2112.12433, 2021.Google ScholarGoogle Scholar
  14. Shantanu Rajora, Dong-Lin Li, Chandan Jha, Neha Bharill, Om Prakash Patel, Sudhanshu Joshi, Deepak Puthal, Mukesh Prasad, "A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance", Computational Intelligence (SSCI) 2018 IEEE Symposium Series on, pp. 1958-1963, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  15. Cao J, Wang C, Gao L. A joint model for text and image semantic feature extraction[C]//Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence. 2018: 1-8.Google ScholarGoogle Scholar

Index Terms

  1. A Transformer-based Model Integrated with Feature Selection for Credit Card Fraud Detection
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICMLT '22: Proceedings of the 2022 7th International Conference on Machine Learning Technologies
            March 2022
            291 pages
            ISBN:9781450395748
            DOI:10.1145/3529399

            Copyright © 2022 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 10 June 2022

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)171
            • Downloads (Last 6 weeks)22

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format