-
641
Research on credit card transaction security supervision based on PU learning
Published 2023-06-01“…The complex and ever-evolving nature of credit card cash out methods and the emergence of various forms of fake transactions present challenges in obtaining accurate transaction information during customer interactions.In order to develop an accurate supervision method for detecting fake credit card transactions, a PU (positive-unlabeled learning) based security identification model for single credit card transactions was established.It was based on long-term transaction label data from cashed-up accounts in commercial banks’ credit card systems.A Spy mechanism was introduced into sample data annotation by selecting million positive samples of highly reliable cash-out transactions and 1.3 million samples of transactions to be labeled, and using a learner to predict the result distribution and label negative samples of non-cash-out transactions that were difficult to identify, resulting in 1.2 million relatively reliable negative sample labels.Based on these samples, 120 candidate variables were constructed, including credit card customer attributes, quota usage, and transaction preference characteristics.After importance screening of variables, nearly 50 candidate variables were selected.The XGBoost binary classification algorithm was used for model development and prediction.The results show that the proposed model achieve an identification accuracy of 94.20%, with a group stability index (PSI) of 0.10%, indicating that the single credit card transaction security identification model based on PU learning can effectively monitor fake transactions.This study improves the model discrimination performance of machine learning binary classification algorithm in scenarios where high-precision sample label data is difficult to obtain, providing a new method for transaction security monitoring in commercial bank credit card systems.…”
Get full text
Article -
642
Presenting a model for the diagnosis of heart failure using cumulative and deep learning algorithms: a case study of tehran heart center
Published 2022-03-01“…The present study aimed to determine the patterns of cardiovascular diseases using integrated classification techniques for analyzing the data of internal medicine patients who are at the risk of heart failure with 451 samples and 13 characteristics. …”
Get full text
Article -
643
-
644
QLearning based business differentiating routing mechanism in SDN architecture
Published 2018-09-01Get full text
Article -
645
The Exponential Diophantine Equation 2x+by=cz
Published 2014-01-01“…In this paper, a classification of all positive integer solutions (x,y,z) of the equation 2x+by=cz is given. …”
Get full text
Article -
646
Anomaly domains detection algorithm based on historical data
Published 2016-10-01Get full text
Article -
647
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
648
Deep belief network-based link quality prediction for wireless sensor network
Published 2017-11-01Get full text
Article -
649
Biology and Management of Spanish Needles (Bidens spp.) in Ornamental Crop Production
Published 2019-04-01Get full text
Article -
650
Clinical Insight into Congenital Hypothyroidism Among Children
Published 2025-01-01Get full text
Article -
651
Divisão territorial do trabalho na indústria. A participação da mão de obra feminina
Published 2024-03-01Get full text
Article -
652
Hypersurface Constrained Elasticae in Lorentzian Space Forms
Published 2015-01-01“…We characterize critical geodesics showing that they live fully immersed in a totally geodesic M13(c) and that they must be of three different types. …”
Get full text
Article -
653
-
654
Keystroke features recognition based on stable linear discriminant analysis
Published 2017-11-01Get full text
Article -
655
-
656
How to Start a Food Business: Basic Food Technology: Food Acidity
Published 2020-03-01Get full text
Article -
657
ASSESSMENT OF POSSIBLE USE OF CARBON ISOTOPE RATIOS IN AMINO ACIDS FOR MEAT PRODUCT GEOGRAPHICAL ORIGIN IDENTIFICATION
Published 2018-04-01“…Upon results of isotope ratio (δ13C) determination in amino acids after gas chromatographic separation samples were classified using Support Vector Machines and linear discriminate analysis. …”
Get full text
Article -
658
Le sarcophage de pierre du haut Moyen Âge, des critères pour une étude
Published 2021-11-01Get full text
Article -
659
-
660
Rapid Detection of Hybrid Maize Parental Lines Using Stacking Ensemble Machine Learning
Published 2022-01-01Get full text
Article