1,580
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Improving transaction safety via anti-fraud protection based on blockchain

, , , &
Article: 2163983 | Received 07 Sep 2022, Accepted 27 Dec 2022, Published online: 01 Feb 2023

References

  • Ammour, N., Bashmal, L., Bazi, Y., Al Rahhal, M. M., & Zuair, M. (2018). Asymmetric adaptation of deep features for cross-domain classification in remote sensing imagery. IEEE Geoscience and Remote Sensing Letters, 15(4), 597–601. https://doi.org/10.1109/LGRS.2018.2800642
  • Balagolla, E., Fernando, W., Rathnayake, R., Wijesekera, M., Senarathne, A., & Abeywardhana, K. (2021). Credit Card Fraud Prevention Using Blockchain. 2021 6th International Conference for Convergence in Technology (I2CT). Institute of Electrical and Electronic Engineers. https://doi.org/10.1109/I2CT51068.2021.9418192
  • Boot, P., Volk, A., & de Haas, W. B. (2016). Evaluating the role of repeated patterns in folk song classification and compression. Journal of New Music Research, 45(3), 223–238. https://doi.org/10.1080/09298215.2016.1208666
  • Bottou, L., Curtis, F. E., & Nocedal, J. (2018). Optimization methods for large-scale machine learning. Siam Review, 60(2), 223–311. https://doi.org/10.1137/16M1080173
  • Castrillón-Santana, M., De Marsico, M., Nappi, M., & Riccio, D. (2017). MEG: Texture operators for multi-expert gender classification. Computer Vision and Image Understanding, 156(3), 4–18. https://doi.org/10.1016/j.cviu.2016.09.004
  • Ding, Y., Pu, H., Liang, Y., & Wang, H. (2019). Blockchain technology in the registration and protection of digital copyright. In International Conference on Applications and Techniques in Cyber Security and Intelligence (pp. 608–616).
  • Eom, C., Kaizoji, T., Kang, S. H., & Pichl, L. (2019). Bitcoin and investor sentiment: Statistical characteristics and predictability. Physica A: Statistical Mechanics and Its Applications, 514(1), 511–521. https://doi.org/10.1016/j.physa.2018.09.063
  • Fernández, A., Chawla, N. V., & Herrera, F. (2017). An insight into imbalanced big data classification: outcomes and challenges. Complex and Intelligent Systems, 3(2), 105–120. https://doi.org/10.1007/s40747-017-0037-9
  • Granik, M., & Mesyura, V. (2017). Fake news detection using naive Bayes classifier. In 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON) (pp. 900–903). IEEE, Institute of Electrical and Electronic Engineers.
  • Gupta, S., Malhotra, V., & Singh, S. N. (2020). Securing IoT-driven remote healthcare data through blockchain. In Advances in data and information sciences (pp. 47–56). Springer.
  • Hitaj, B., Ateniese, G., & Perez-Cruz, F. (2017). Deep models under the GAN: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 603–618). ACM.
  • Kasa, N., Dahbura, A., Ravoori, C., & Adams, S. (2019). Improving credit card fraud detection by profiling and clustering accounts. In 2019 Systems and Information Engineering Design Symposium (SIEDS) (pp. 1–6). Institute of Electrical and Electronic Engineers.
  • Kumar, Y. (n.d.). AI techniques in blockchain technology for fraud detection and prevention. In Security engineering for embedded and cyber-physical systems (pp. 235–252). CRC Press.
  • Lebichot, B., Borgne, Y. A. L., He-Guelton, L., Oblé, F., & Bontempi, G. (2019). Deep-learning domain adaptation techniques for credit cards fraud detection. In Recent advances in big data and deep learning (pp. 78–88). Springer.
  • Li, P., & Wang, E. A. (2016). High-performance personalized heartbeat classification model for long-term ECG signal. IEEE Transactions on Biomedical Engineering, 64(1), 78–86. https://doi.org/10.1109/10.650355
  • Liu, J., Li, B., Chen, L., Hou, M., Xiang, F., & Wang, P. (2018). A data storage method based on blockchain for decentralization DNS. In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (pp. 189–196). IEEE, Institute of Electrical and Electronic Engineers.
  • Mahapatra, S., Sinha, D., & Kumar Das, A. (2022). A secure health management framework with anti-fraud healthcare insurance using blockchain. In Pattern recognition and data analysis with applications (pp. 491–505). Springer.
  • Maillo, J., Ramírez, S., Triguero, I., & Herrera, F. (2017). kNN-IS: An iterative spark-based design of the k-nearest neighbors classifier for big data. Knowledge-Based Systems, 117(2), 3–15. https://doi.org/10.1016/j.knosys.2016.06.012
  • Mayhew, K., & Chen, W. (2019). Blockchain-can it solve the security issues and fraud expenses for credit card commerce? In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (Bigdatasecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (pp. 37–41). Institute of Electrical and Electronic Engineers.
  • Nguyen, G., & Kim, K. (2018). A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems, 14(1), 101–128. https://doi.org/10.3745/JIPS.01.0024
  • Pan, Z., Wang, Y., & Ku, W. (2017). A new k-harmonic nearest neighbor classifier based on the multi-local means. Expert Systems with Applications, 67(1), 115–125. https://doi.org/10.1016/j.eswa.2016.09.031
  • Pang, G., Cao, L., Chen, L., & Liu, H. (2018). Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 2041–2050). ACM.
  • Pang, G., & Shen, C. (2019). Deep anomaly detection with deviation networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 353–362). ACM.
  • Pang, G., Ting, K. M., & Albrecht, D. (2015). LeSiNN: Detecting anomalies by identifying least similar nearest neighbours. In 2015 IEEE International Conference on Data Mining Workshop (ICDMW) (pp. 623–630). IEEE, Institute of Electrical and Electronic Engineers.
  • Priscilla, C. V., & Prabha, D. P. (2020). Influence of optimizing XGBoost to handle class imbalance in credit card fraud detection. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1309–1315). Institute of Electrical and Electronic Engineers.
  • Rani, P., Shokeen, J., Agarwal, A., Bhatghare, A., Majithia, A., & Malhotra, J. (2022). Credit card fraud detection using blockchain and simulated annealing K-means algorithm. In International Conference on Innovative Computing and Communications (pp. 51–59). Springer.
  • Ruff, L., Vandermeulen, R., Goernitz, N., Deecke, L., Siddiqui, S. A., Binder, A., Kloft, M., & Kloft, M. (2018). Deep one-class classification. In Proceedings of the 35th International Conference on Machine Learning (pp. 4393–4402). PMLR.
  • Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research, 57(7), 2117–2135. https://doi.org/10.1080/00207543.2018.1533261
  • Saia, R., & Carta, S. (2019). Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. Future Generation Computer Systems, 93(4), 18–32. https://doi.org/10.1016/j.future.2018.10.016
  • Shafay, M., Ahmad, R. W., Salah, K., Yaqoob, I., Jayaraman, R., & Omar, M. (2022). Blockchain for deep learning: Review and open challenges. Cluster Computing, 1–25.
  • Tanha, J., van Someren, M., & Afsarmanesh, H. (2017). Semi-supervised self-training for decision tree classifiers. International Journal of Machine Learning and Cybernetics, 8(1), 355–370. https://doi.org/10.1007/s13042-015-0328-7
  • Vardhani, P. R., Priyadarshini, Y. I., & Narasimhulu, Y. (2019). CNN data mining algorithm for detecting credit card fraud. In Soft computing and medical bioinformatics (pp. 85–93). Springer.
  • Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, & Mohd Zakree Ahmad Nazri (2017). Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Systems with Applications, 67(1), 296–303. https://doi.org/10.1016/j.eswa.2016.09.041
  • Xu, H., Pang, G., Wang, Y., & Wang, Y. (2022). Deep isolation forest for anomaly detection. arXiv preprint arXiv:2206.06602.
  • Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., & Gao, C z. (2018). Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. Journal of Network and Computer Applications, 107(4), 113–124. https://doi.org/10.1016/j.jnca.2018.01.014
  • Zhang, G., Zhang, X., Bilal, M., Dou, W., Xu, X., & Rodrigues, J. J. (2022). Identifying fraud in medical insurance based on blockchain and deep learning. Future Generation Computer Systems, 130(5), 140–154. https://doi.org/10.1016/j.future.2021.12.006
  • Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352–375. https://doi.org/10.1504/IJWGS.2018.095647