Research on Credit Card Fraud Detection System Based on Federated Learning
Abstract
has profoundly changed our consumer behavior and the development model of the traditional financial industry. However, the accompanying risks are also being transmitted with unprecedented speed and complexity. Credit card fraud, as an important form of financial fraud, has
caused huge economic losses and a crisis of trust for both financial institutions and consumers. Therefore, the establishment of an efficient and
secure credit card fraud detection system has become an inevitable requirement for the continuous development of financial technology in the
new era. The purpose of this paper is to study and develop a credit card fraud detection system based on federated learning, which can balance
the positive and negative samples in credit card transaction data, protect the privacy of bank data, and effectively improve the accuracy and
efficiency of fraud detection.
Keywords
Full Text:
PDFReferences
[1] Zhu J, Ma X, Blaschko M B. Confidence-aware personalized federated learning via variational expectation maximization[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 24542-24551.
[2] Zhao J C, Elkordy A R, Sharma A, et al. The resource problem of using linear layer leakage attack in federated learning[C]//Proceedings
of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 3974-3983.
[3] Zhang R, Xu Q, Yao J, et al. Federated domain generalization with generalization adjustment[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 3954-3963.
[4] Bhagoji A N, Chakraborty S, Mittal P, et al. Analyzing federated learning through an adversarial lens[C]//International conference on
machine learning. PMLR, 2019: 634-643.
[5] Hochreiter S, Schmidhuber J. Long short-term memory[J]. Neural computation, 1997, 9(8): 1735-1780.
[6] Sherstinsky A. Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network[J]. Physica D: Nonlinear Phenomena, 2020, 404: 132306.
[7] Yi X, Paulet R, Bertino E, et al. Homomorphic encryption[M]. Springer International Publishing, 2014.
[8] Acar A, Aksu H, Uluagac A S, et al. A survey on homomorphic encryption schemes: Theory and implementation[J]. ACM Computing
Surveys (Csur), 2018, 51(4): 1-35.
[9] Dwork C. Differential privacy: A survey of results[C]//International conference on theory and applications of models of computation.
Berlin, Heidelberg: Springer Berlin Heidelberg, 2008: 1-19.
[10] Abadi M, Chu A, Goodfellow I, et al. Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC conference on
computer and communications security. 2016: 308-318.
DOI: http://dx.doi.org/10.18686/aitr.v2i3.4407
Refbacks
- There are currently no refbacks.