Feature selection strategies: a comparative analysis of SHAP-value and importance-based methods

H Wang, Q Liang, JT Hancock, TM Khoshgoftaar - Journal of Big Data, 2024 - Springer
In the context of high-dimensional credit card fraud data, researchers and practitioners
commonly utilize feature selection techniques to enhance the performance of fraud detection …

The effect of feature extraction and data sampling on credit card fraud detection

Z Salekshahrezaee, JL Leevy, TM Khoshgoftaar - Journal of Big Data, 2023 - Springer
Training a machine learning algorithm on a class-imbalanced dataset can be a difficult task,
a process that could prove even more challenging under conditions of high dimensionality …

Adaptive submodularity: Theory and applications in active learning and stochastic optimization

D Golovin, A Krause - Journal of Artificial Intelligence Research, 2011 - jair.org
Many problems in artificial intelligence require adaptively making a sequence of decisions
with uncertain outcomes under partial observability. Solving such stochastic optimization …

Threshold optimization and random undersampling for imbalanced credit card data

JL Leevy, JM Johnson, J Hancock, TM Khoshgoftaar - Journal of Big Data, 2023 - Springer
Output thresholding is well-suited for addressing class imbalance, since the technique does
not increase dataset size, run the risk of discarding important instances, or modify an …

Comparative analysis of binary and one-class classification techniques for credit card fraud data

JL Leevy, J Hancock, TM Khoshgoftaar - Journal of Big Data, 2023 - Springer
The yearly increase in incidents of credit card fraud can be attributed to the rapid growth of e-
commerce. To address this issue, effective fraud detection methods are essential. Our …

Investigating the effectiveness of one-class and binary classification for fraud detection

JL Leevy, J Hancock, TM Khoshgoftaar… - Journal of Big Data, 2023 - Springer
Research into machine learning methods for fraud detection is of paramount importance,
largely due to the substantial financial implications associated with fraudulent activities. Our …

Data-driven planning via imitation learning

S Choudhury, M Bhardwaj, S Arora… - … Journal of Robotics …, 2018 - journals.sagepub.com
Robot planning is the process of selecting a sequence of actions that optimize for a task=
specific objective. For instance, the objective for a navigation task would be to find collision …

Detecting cybersecurity attacks across different network features and learners

JL Leevy, J Hancock, R Zuech, TM Khoshgoftaar - Journal of Big Data, 2021 - Springer
Abstract Machine learning algorithms efficiently trained on intrusion detection datasets can
detect network traffic capable of jeopardizing an information system. In this study, we use the …

Detecting cybersecurity attacks using different network features with lightgbm and xgboost learners

JL Leevy, J Hancock, R Zuech… - 2020 IEEE second …, 2020 - ieeexplore.ieee.org
CSE-CIC-IDS2018 is an intrusion detection dataset containing roughly 16,000,000 normal
and anomalous instances, with about 17% of these instances representing attack traffic. Our …

Enhancing credit card fraud detection through a novel ensemble feature selection technique

H Wang, Q Liang, JT Hancock… - 2023 IEEE 24th …, 2023 - ieeexplore.ieee.org
Identifying fraudulent activities in credit card transactions is an inherent component of
financial computing. The focus of our research is on the Credit Card Fraud Detection …