Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment

IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu
{"title":"Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment","authors":"Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu","doi":"10.1142/s0218843023500247","DOIUrl":null,"url":null,"abstract":"When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cooperative Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/s0218843023500247","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.
云计算环境下基于深度学习超参数调优的银行财务欺诈检测
当收入、资产、销售和利润被夸大,而支出、债务和损失被人为地降低时,结果就是一组欺诈性财务报表(FFS)。手工审计和检查是发现这些虚假陈述的耗时、低效和昂贵的选择。审计师在分析几份财务报表时,会发现使用智能方法有很大的帮助。由于越来越多的个人使用互联网进行金融交易,现在比以往任何时候都更容易遭受金融欺诈。而且,欺诈行为正变得越来越复杂,它们绕过了银行已经实施的保护措施。在本文中,我们提供了一种使用NLP模型检测欺诈的新方法:一个由前馈神经网络(fnn)和长短期记忆(LSTMs)组成的集成模型。斑点鬣狗优化器是一种独特的元启发式优化技术,用于选择LSTM (SHO)的权重和偏差。提出的方法从万有引力定律中获得灵感,旨在模仿斑点鬣狗的群体动力学。提出了寻找猎物、包围猎物和攻击猎物这三个基本阶段的数学模型和讨论。我们建立了一个用户消费习惯的模型,并寻找可疑的异常值来识别欺诈行为。我们通过使用集成机制来做到这一点,这有助于我们预测和充分利用以前的交易。根据我们对真实世界数据的分析,我们可以自信地说,我们的模型在精度和安全性方面,与各种环境下最先进的方法相比,具有优越的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Cooperative Information Systems
International Journal of Cooperative Information Systems 工程技术-计算机:信息系统
CiteScore
2.30
自引率
0.00%
发文量
8
审稿时长
>12 weeks
期刊介绍: The paradigm for the next generation of information systems (ISs) will involve large numbers of ISs distributed over large, complex computer/communication networks. Such ISs will manage or have access to large amounts of information and computing services and will interoperate as required. These support individual or collaborative human work. Communication among component systems will be done using protocols that range from conventional ones to those based on distributed AI. We call such next generation ISs Cooperative Information Systems (CIS). The International Journal of Cooperative Information Systems (IJCIS) addresses the intricacies of cooperative work in the framework of distributed interoperable information systems. It provides a forum for the presentation and dissemination of research covering all aspects of CIS design, requirements, functionality, implementation, deployment, and evolution.
文献相关原料
公司名称 产品信息 采购帮参考价格
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信