pisco_log
banner

Research on Credit Card Fraud Detection System Based on Federated Learning

Ya Wen

Abstract


With the rapid development of the mobile Internet, financial technology, especially artificial intelligence and blockchain technology,
has profoundly changed our consumer behavior and the development model of the traditional financial industry. However, the accompanying risks are also being transmitted with unprecedented speed and complexity. Credit card fraud, as an important form of financial fraud, has
caused huge economic losses and a crisis of trust for both financial institutions and consumers. Therefore, the establishment of an efficient and
secure credit card fraud detection system has become an inevitable requirement for the continuous development of financial technology in the
new era. The purpose of this paper is to study and develop a credit card fraud detection system based on federated learning, which can balance
the positive and negative samples in credit card transaction data, protect the privacy of bank data, and effectively improve the accuracy and
efficiency of fraud detection.

Keywords


Federated learning; Privacy protection; Fraud detection

Full Text:

PDF

Included Database


References


[1] Zhu J, Ma X, Blaschko M B. Confidence-aware personalized federated learning via variational expectation maximization[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 24542-24551.

[2] Zhao J C, Elkordy A R, Sharma A, et al. The resource problem of using linear layer leakage attack in federated learning[C]//Proceedings

of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 3974-3983.

[3] Zhang R, Xu Q, Yao J, et al. Federated domain generalization with generalization adjustment[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 3954-3963.

[4] Bhagoji A N, Chakraborty S, Mittal P, et al. Analyzing federated learning through an adversarial lens[C]//International conference on

machine learning. PMLR, 2019: 634-643.

[5] Hochreiter S, Schmidhuber J. Long short-term memory[J]. Neural computation, 1997, 9(8): 1735-1780.

[6] Sherstinsky A. Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network[J]. Physica D: Nonlinear Phenomena, 2020, 404: 132306.

[7] Yi X, Paulet R, Bertino E, et al. Homomorphic encryption[M]. Springer International Publishing, 2014.

[8] Acar A, Aksu H, Uluagac A S, et al. A survey on homomorphic encryption schemes: Theory and implementation[J]. ACM Computing

Surveys (Csur), 2018, 51(4): 1-35.

[9] Dwork C. Differential privacy: A survey of results[C]//International conference on theory and applications of models of computation.

Berlin, Heidelberg: Springer Berlin Heidelberg, 2008: 1-19.

[10] Abadi M, Chu A, Goodfellow I, et al. Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC conference on

computer and communications security. 2016: 308-318.




DOI: http://dx.doi.org/10.18686/aitr.v2i3.4407

Refbacks

  • There are currently no refbacks.