skip to main content
10.1145/3297280.3297586acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Multiple perspectives HMM-based feature engineering for credit card fraud detection

Published:08 April 2019Publication History

ABSTRACT

Machine learning and data mining techniques have been used extensively in order to detect credit card frauds. However, most studies consider credit card transactions as isolated events and not as a sequence of transactions.

In this article, we model a sequence of credit card transactions from three different perspectives, namely (i) does the sequence contain a Fraud? (ii) Is the sequence obtained by fixing the card-holder or the payment terminal? (iii) Is it a sequence of spent amount or of elapsed time between the current and previous transactions? Combinations of the three binary perspectives give eight sets of sequences from the (training) set of transactions. Each one of these sets is modelled with a Hidden Markov Model (HMM). Each HMM associates a likelihood to a transaction given its sequence of previous transactions. These likelihoods are used as additional features in a Random Forest classifier for fraud detection. This multiple perspectives HMM-based approach enables an automatic feature engineering in order to model the sequential properties of the dataset with respect to the classification task. This strategy allows for a 15% increase in the precision-recall AUC compared to the state of the art feature engineering strategy for credit card fraud detection.

References

  1. Bahnsen A. C., Aouada D., Stojanovic A., and Ottersten B. (2016) Feature engineering strategies for credit card fraud detection. Expert Systems With Applications.Google ScholarGoogle Scholar
  2. Bolton R. and Hand D. J. (2001). Unsupervised profiling methods for fraud detection. Credit scoring and credit control VII.Google ScholarGoogle Scholar
  3. Davis J. and Goadrich M. (2006). The relationship between precision-recall and roc curves. ICML 06 Proceedings of the 23rd international conference on Machine learning. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Whitrow C., Hand D. J., Juszczak P., Weston D. J., and Adams N. M. (2008). Transaction aggregation strategy for credit card fraud detection. Data Mining and Knowledge Discovery 18(1). Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
    April 2019
    2682 pages
    ISBN:9781450359337
    DOI:10.1145/3297280

    Copyright © 2019 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 April 2019

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader