Black-Box Attack-Based Security Evaluation Framework for Credit Card Fraud Detection Models
Author
Abstract
Suggested Citation
DOI: 10.1287/ijoc.2023.1297
Download full text from publisher
References listed on IDEAS
- Douglas Heaven, 2019. "Why deep-learning AIs are so easy to fool," Nature, Nature, vol. 574(7777), pages 163-166, October.
- Namsik Chang & Olivia R. Liu Sheng, 2008. "Decision-Tree-Based Knowledge Discovery: Single- vs. Multi-Decision-Tree Induction," INFORMS Journal on Computing, INFORMS, vol. 20(1), pages 46-54, February.
- Anna Ye Du & Sanjukta Das & R. Ramesh, 2013. "Efficient Risk Hedging by Dynamic Forward Pricing: A Study in Cloud Computing," INFORMS Journal on Computing, INFORMS, vol. 25(4), pages 625-642, November.
- J. Paul Brooks, 2011. "Support Vector Machines with the Ramp Loss and the Hard Margin Loss," Operations Research, INFORMS, vol. 59(2), pages 467-479, April.
- Sanjukta Das & Anna Ye Du & Ram Gopal & R. Ramesh, 2011. "Risk Management and Optimal Pricing in Online Storage Grids," Information Systems Research, INFORMS, vol. 22(4), pages 756-773, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jian Luo & Shu-Cherng Fang & Zhibin Deng & Xiaoling Guo, 2016. "Soft Quadratic Surface Support Vector Machine for Binary Classification," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 33(06), pages 1-22, December.
- Michaela Sprenger & Tobias Mettler & Robert Winter, 0. "A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
- Shao-Bo Lin & Shaojie Tang & Yao Wang & Di Wang, 2022. "Toward Efficient Ensemble Learning with Structure Constraints: Convergent Algorithms and Applications," INFORMS Journal on Computing, INFORMS, vol. 34(6), pages 3096-3116, November.
- Tobias Widmer & Paul Karaenke & Vijayan Sugumaran, 2021. "Two‐sided service markets: Effects of quality differentiation on market efficiency," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 42(3), pages 588-604, April.
- Blanquero, R. & Carrizosa, E. & Jiménez-Cordero, A. & Martín-Barragán, B., 2019. "Functional-bandwidth kernel for Support Vector Machine with Functional Data: An alternating optimization algorithm," European Journal of Operational Research, Elsevier, vol. 275(1), pages 195-207.
- Galaz, Victor & Centeno, Miguel A. & Callahan, Peter W. & Causevic, Amar & Patterson, Thayer & Brass, Irina & Baum, Seth & Farber, Darryl & Fischer, Joern & Garcia, David & McPhearson, Timon & Jimenez, 2021. "Artificial intelligence, systemic risks, and sustainability," Technology in Society, Elsevier, vol. 67(C).
- Xianning Wang & Zhengang Ma & Jiusheng Chen & Jingrong Dong, 2023. "Can Regional Eco-Efficiency Forecast the Changes in Local Public Health: Evidence Based on Statistical Learning in China," IJERPH, MDPI, vol. 20(2), pages 1-19, January.
- Pedro Duarte Silva, A., 2017. "Optimization approaches to Supervised Classification," European Journal of Operational Research, Elsevier, vol. 261(2), pages 772-788.
- Mingli Chen & Andreas Joseph & Michael Kumhof & Xinlei Pan & Xuan Zhou, 2021. "Deep Reinforcement Learning in a Monetary Model," Papers 2104.09368, arXiv.org, revised Jan 2023.
- Tahir, Muhammad Faizan & Yousaf, Muhammad Zain & Tzes, Anthony & El Moursi, Mohamed Shawky & El-Fouly, Tarek H.M., 2024. "Enhanced solar photovoltaic power prediction using diverse machine learning algorithms with hyperparameter optimization," Renewable and Sustainable Energy Reviews, Elsevier, vol. 200(C).
- Zhiling Guo & Jin Li & Ram Ramesh, 2019. "Optimal Management of Virtual Infrastructures Under Flexible Cloud Service Agreements," Information Systems Research, INFORMS, vol. 30(4), pages 1424-1446, April.
- Ying-Ju Chen & Ke-Wei Huang, 2016. "Pricing Data Services: Pricing by Minutes, by Gigs, or by Megabytes per Second?," Information Systems Research, INFORMS, vol. 27(3), pages 596-617.
- Carrizosa, Emilio & Nogales-Gómez, Amaya & Romero Morales, Dolores, 2017. "Clustering categories in support vector machines," Omega, Elsevier, vol. 66(PA), pages 28-37.
- Manuel A. Nunez & Xue Bai & Linna Du, 2021. "Leveraging Slack Capacity in IaaS Contract Cloud Services," Production and Operations Management, Production and Operations Management Society, vol. 30(4), pages 883-901, April.
- J. Paul Brooks & Eva K. Lee, 2014. "Solving a Multigroup Mixed-Integer Programming-Based Constrained Discrimination Model," INFORMS Journal on Computing, INFORMS, vol. 26(3), pages 567-585, August.
- Rajib L. Saha & Sumanta Singha & Subodha Kumar, 2021. "Does Congestion Always Hurt? Managing Discount Under Congestion in a Game-Theoretic Setting," Information Systems Research, INFORMS, vol. 32(4), pages 1347-1367, December.
- Chen, Huazhou & Chen, An & Xu, Lili & Xie, Hai & Qiao, Hanli & Lin, Qinyong & Cai, Ken, 2020. "A deep learning CNN architecture applied in smart near-infrared analysis of water pollution for agricultural irrigation resources," Agricultural Water Management, Elsevier, vol. 240(C).
- Baldomero-Naranjo, Marta & Martínez-Merino, Luisa I. & Rodríguez-Chía, Antonio M., 2020. "Tightening big Ms in integer programming formulations for support vector machines with ramp loss," European Journal of Operational Research, Elsevier, vol. 286(1), pages 84-100.
- Ching-Chin Chern & Weng-U Lei & Kwei-Long Huang & Shu-Yi Chen, 2021. "A decision tree classifier for credit assessment problems in big data environments," Information Systems and e-Business Management, Springer, vol. 19(1), pages 363-386, March.
- Pietro Belotti & Pierre Bonami & Matteo Fischetti & Andrea Lodi & Michele Monaci & Amaya Nogales-Gómez & Domenico Salvagnin, 2016. "On handling indicator constraints in mixed integer programming," Computational Optimization and Applications, Springer, vol. 65(3), pages 545-566, December.
More about this item
Keywords
nonlinear optimization; credit card fraud detection models; security evaluation; black-box attack; adversarial examples; machine learning;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orijoc:v:35:y:2023:i:5:p:986-1001. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.