skip to main content
10.1145/3558819.3565092acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

The Application of Neural Networks to Fraud Detection

Published:26 October 2022Publication History

ABSTRACT

Nowadays, with the rapid development of the Internet, social reviews conducted through the Internet have become the main source for people to obtain product information. These reviews help individuals, companies and institutions make decisions. Although social commentary can help people provide more objective and comprehensive information, some individuals or organizations use this method to spread false and untrue information to the outside world, thereby affecting the outside world's judgment on the authenticity of the information, resulting in economic losses. Here is a study of user behavior and comment language to address the difficulties of money fraud. Social fraud detection uses a framework of three key components for review: the review itself, the user performing the review, and the item being reviewed are three key components used by social fraud detection. Under this framework, we do this through appropriate sequence modeling methods, Hidden Markov Models (HMM) and Artificial Neural Networks (ANN) are two examples. By summarizing and expanding the contributions of key persons in the subject of financial fraud, we assist new scholars in the field in providing some theoretical support.

References

  1. F. Carcillo, Y.-A. Le Borgne, O. Caelen, Y. Kessaci, F. Oblé, G. Bontempi, “Combining unsupervised and supervised learning in credit card fraud detection,” Information Sciences. 557 (2021) 317–331.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Błaszczyński, A.T. de Almeida Filho, A. Matuszyk, M. Szeląg, R. Słowiński, “Auto loan fraud detection using dominance-based rough set approach versus machine learning methods,” Expert Systems with Applications. 163 (2021) 113740.Google ScholarGoogle ScholarCross RefCross Ref
  3. Z. Li, M. Huang, G. Liu, C. Jiang, “A hybrid method with dynamic weighted entropy for handling the problem of class imbalance with overlap in credit card fraud detection,” Expert Systems with Applications. 175 (2021) 114750.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Forough, S. Momtazi, “Ensemble of deep sequential models for credit card fraud detection,” Applied Soft Computing. 99 (2021) 106883.Google ScholarGoogle ScholarCross RefCross Ref
  5. Y. Liu, X. Ao, Z. Qin, J. Chi, J. Feng, H. Yang, , “Pick and choose: A GNN-based imbalanced learning approach for fraud detection,” Proceedings of the Web Conference 2021. (2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Zhou, G. Sun, S. Fu, L. Wang, J. Hu, Y. Gao, “Internet financial fraud detection based on a distributed big data approach with node2vec,” IEEE Access. 9 (2021) 43378–43386.Google ScholarGoogle ScholarCross RefCross Ref
  7. K.G. Al-Hashedi, P. Magalingam, “Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019,” Computer Science Review. 40 (2021) 100402.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Lucas, J. Jurgovsky, “Credit Card Fraud Detection Using Machine Learning: A Survey,” ArXiv.org. (2020). https://arxiv.org/abs/2010.06479 (accessed March 27, 2022).Google ScholarGoogle Scholar
  9. S. Shehnepoor, R. Togneri, W. Liu, M. Bennamoun, “Social Fraud Detection Review: Methods, challenges and analysis,” ArXiv.org. (2021). https://arxiv.org/abs/2111.05645 (accessed March 27, 2022).Google ScholarGoogle Scholar
  10. Y. You, T. Chen, Y. Sui, T. Chen, Z. Wang, & Y. Shen, Graph contrastive learning with augmentations. Advances in Neural Information Processing Systems, 33, 5812-5823. (2020).Google ScholarGoogle Scholar

Index Terms

  1. The Application of Neural Networks to Fraud Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
      September 2022
      1094 pages
      ISBN:9781450397414
      DOI:10.1145/3558819

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format