Credit Card Fraud Detection Using Machine Learning Techniques

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 5, 2024 at 12:54 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Avanish Kumar Singh, Himanshu Singh

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar, Research Scholar, MCA Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, MCA Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, Maharashtra, Maharashtra, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nCredit card fraud has become a significant concern in today’s digital economy, with billions of dollars being lost annually to fraudulent transactions. Conventional rule-based approaches frequently prove inadequate in addressing the constantly changing strategies employed by fraudsters. Machine learning methods have emerged as robust solutions for detecting credit card fraud, presenting the capability to accurately identify fraudulent transactions promptly. In this study, we investigate the efficiency of three widely-used machine learning algorithms—Logistic Regression, Random Forest, and Decision Tree—for the detection of credit card fraud. Through an extensive comparative study, we analyse the performance, accuracy, and efficiency of each algorithm on a real-world credit card transaction dataset. Our findings provide valuable insights into the strengths and limitations of these techniques in addressing the challenges posed by credit card fraud.

n

n

n

Keywords: Credit Card Frauds; Training system through Decision Tree Classifiers; Random Forest Algorithms, and Logistic Regression.

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Open Source Developments(joosd)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Open Source Developments(joosd)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Avanish Kumar Singh, Himanshu Singh Credit Card Fraud Detection Using Machine Learning Techniques joosd April 5, 2024; 11:-

n

How to cite this URL: Avanish Kumar Singh, Himanshu Singh Credit Card Fraud Detection Using Machine Learning Techniques joosd April 5, 2024 {cited April 5, 2024};11:-. Available from: https://journals.stmjournals.com/joosd/article=April 5, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘joosd’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Roy A, Sun J, Mahoney R, Alonzi L, Adams S, Beling P. Deep learning detecting fraud in credit card transactions. In2018 systems and information engineering design symposium (SIEDS) 2018 Apr 27 (pp. 129-134). IEEE.
  2. Randhawa K, Loo CK, Seera M, Lim CP, Nandi AK. Credit card fraud detection using AdaBoost and majority voting. IEEE access. 2018 Feb 15;6:14277-84.
  3. Xuan S, Liu G, Li Z, Zheng L, Wang S, Jiang C. Random forest for credit card fraud detection. In2018 IEEE 15th international conference on networking, sensing and control (ICNSC) 2018 Mar 27 (pp. 1-6). IEEE.
  4. Khare N, Sait SY. Credit card fraud detection using machine learning models and collating machine learning models. International Journal of Pure and Applied Mathematics. 2018;118(20):825-38.
  5. Melo-Acosta GE, Duitama-Munoz F, Arias-Londoño JD. Fraud detection in big data using supervised and semi-supervised learning techniques. In2017 IEEE Colombian conference on communications and computing (COLCOM) 2017 Aug 16 (pp. 1-6). IEEE.
  6. Thennakoon A, Bhagyani C, Premadasa S, Mihiranga S, Kuruwitaarachchi N. Real-time credit card fraud detection using machine learning. In2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2019 Jan 10 (pp. 488-493). IEEE.
  7. Jiang C, Song J, Liu G, Zheng L, Luan W. Credit card fraud detection: A novel approach using aggregation strategy and feedback mechanism. IEEE Internet of Things Journal. 2018 Mar 15;5(5):3637-47.
  8. Yang MY, Kumaar S, Lyu Y, Nex F. Real-time semantic segmentation with context aggregation network. ISPRS journal of photogrammetry and remote sensing. 2021 Aug 1;178:124-34.
  9. Sun Y, Cheng H, Zhang S, Mohan MK, Ye G, De Schutter G. Prediction & optimization of alkali-activated concrete based on the random forest machine learning algorithm. Construction and Building Materials. 2023 Jul 3;385:131519.
  10. Amro A, Al-Akhras M, Hindi KE, Habib M, Shawar BA. Instance reduction for avoiding overfitting in decision trees. Journal of Intelligent Systems. 2021 Jan 1;30(1):438-59.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Open Source Developments

n

[if 344 not_equal=””]ISSN: 2395-6704[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received February 29, 2024
Accepted March 26, 2024
Published April 5, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]