• Corpus ID: 212510891

Credit card fraud detection using anti-k nearest neighbor algorithm

  title={Credit card fraud detection using anti-k nearest neighbor algorithm},
  author={Venkata Ratnam Ganji},
Banks have used early fraud warning systems for some years. Improved fraud detection thus has become essential to maintain the viability of the payment system. Outlier mining in data mining is an important functionality of the existing algorithms which can be divided into methods based on statistical, distance based methods, density based methods and deviation based methods. In this article I propose the concept of credit card fraud detection by using a data stream outlier detection algorithm… 

Figures from this paper

Analysis on Credit Card Fraud Identification based on KNN and Outlier Detection

Techniques of KNN and outlier detection are implemented to optimize the best result for the fraud detection problem and slash the false alarm rates and enlarge the fraud Detection rate.

Survey on Credit Card Fraud Detection Methods

A survey of various techniques used in credit card fraud detection mechanisms is presented and it is shown that many modern techniques based on Artificial Intelligence, Data mining, Neural Network, Bayesian Network, Fuzzy logic, Artificial Immune System, K- nearest neighbor algorithm, Support Vector Machine etc., has evolved in detecting various credit card fraudulent transactions.

A Novel Fraud Detection Scheme for Credit Card Usage Employing Random Forest Algorithm Combined with Feedback Mechanism

A three phase scheme to detect the fraudulent activities, a profile for the card users based on their behavior is created by employing machine learning technique, and if an emerging transaction is found to be fraudulent, a feedback is taken which resolves the quandary caused by the drift in the notion.

Fraudulent Transaction Detection in FinTech using Machine Learning Algorithms

  • Khadija AbdulsattarM. Hammad
  • Computer Science
    2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)
  • 2020
A binary classification problem is considered where a transaction can be classified as either fraudulent or legitimate transaction and it is found that the accuracy percentage of all the five classifiers for Task1 and Task2 datasets is ranging between 97.78% to 98.1%, with no major difference.

Novel Machine Learning Approach for Analyzing Anonymous Credit Card Fraud Patterns

The proposed process performed well when using the misclassified instances in the test dataset used in the previous work, while demonstrating a larger and clearer classification breakdown, which aids in achieving higher precision rate and improved recall rate.

Credit Card Fraud Detection Model Based on LSTM Recurrent Neural Networks

A credit card fraud detection system that employs Long Short-Term Memory (LSTM) networks as a sequence learner to include transaction sequences and gives strong results and its accuracy is quite high.

Outlier Detection with Data Mining Techniques and Statistical Methods

A method for detecting values that can be considered as outliers in a nominal database is proposed and shows that the method is able to detect all introduced values, which were previously labeled to be differentiated.

A Cost-Sensitive Cosine Similarity K-Nearest Neighbor for Credit Card Fraud Detection

A novel cost-sensitive KNN approach that is based on the K-Nearest Neighbor (KNN) classifier and developed using Cosine Similarity (CoS) is presented, which is proved to be a better approach than other KNN algorithms.



Based on the flow of anti-k nearest neighbors algorithm for data mining outliers

The empirical study verify the feasibility and effectiveness of X*tree index structure which supports knn searching and the SODRNN algorithm, which needs only one pass of scan for the current sliding window.

Survey of fraud detection techniques

The goal of this paper is to provide a comprehensive review of different techniques to detect frauds and present a survey of current techniques used in credit card fraud detection, telecommunication Fraud detection, and computer intrusion detection.

Feature bagging for outlier detection

A novel feature bagging approach for detecting outliers in very large, high dimensional and noisy databases is proposed, which combines results from multiple outlier detection algorithms that are applied using different set of features.

Incremental Local Outlier Detection for Data Streams

The paper provides theoretical evidence that insertion of a new data point as well as deletion of an old data point influence only limited number of their closest neighbors and thus the number of updates per such insertion/deletion does not depend on the total number of points in the data set.

Ranking Outliers Using Symmetric Neighborhood Relationship

A simple but effective measure on local outliers based on a symmetric neighborhood relationship that considers both neighbors and reverse neighbors of an object when estimating its density distribution and shows that it is more effective in ranking outliers.

MAIDS: mining alarming incidents from data streams

This paper presents a demonstration of our recent research and development of the MAIDS system, which mines alarming incidents from data streams, with the following major analysis functions: (1)

Reverse spatial and textual k nearest neighbor search

This paper defines Reverse Spatial Textual k Nearest Neighbor (RSTkNN) query, and proposes a hybrid index tree called IUR-tree (Intersection-Union R-Tree) that effectively combines location proximity with textual similarity.

An effective and efficient algorithm for high-dimensional outlier detection

New techniques for outlier detection that find the outliers by studying the behavior of projections from the data set are discussed.

Gao Cong; Reverse Spatial and Textual k Nearest Neighbor Search; in proceedings of SIGMOD'11

  • 2011

WeiFan,Andreas Prodromidis,andSalvatore J.Stolfo; Distributed Data Mining in Credit Card Fraud Detection; Submitted to IEEE Intelligent Systems Special Issue onDataMining,1999

  • 1999