<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Erzincan University Journal of Science and Technology</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2149-4584</issn>
                                                                                            <publisher>
                    <publisher-name>Erzincan Binali Yildirim University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.18185/erzifbed.954466</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Analysis of the Effectiveness of Various Machine Learning, Artificial Neural Network and Deep Learning Methods in Detecting Fraudulent Credit Card Transactions</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>Çeşitli Makine Öğrenmesi, Yapay Sinir Ağı ve Derin Öğrenme Yöntemlerinin Sahte Kredi Kartı İşlemlerini Tespit Etkinliklerinin Analizi</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5333-6622</contrib-id>
                                                                <name>
                                    <surname>Çelik</surname>
                                    <given-names>Esra</given-names>
                                </name>
                                                                    <aff>ATATÜRK ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ, BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0120-4315</contrib-id>
                                                                <name>
                                    <surname>Dal</surname>
                                    <given-names>Deniz</given-names>
                                </name>
                                                                    <aff>ATATÜRK ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ, BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0088-5825</contrib-id>
                                                                <name>
                                    <surname>Bozkurt</surname>
                                    <given-names>Ferhat</given-names>
                                </name>
                                                                    <aff>ATATÜRK ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ, BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220327">
                    <day>03</day>
                    <month>27</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>15</volume>
                                        <issue>1</issue>
                                        <fpage>144</fpage>
                                        <lpage>167</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20210618">
                        <day>06</day>
                        <month>18</month>
                        <year>2021</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20210811">
                        <day>08</day>
                        <month>11</month>
                        <year>2021</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2008, Erzincan University Journal of Science and Technology</copyright-statement>
                    <copyright-year>2008</copyright-year>
                    <copyright-holder>Erzincan University Journal of Science and Technology</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>A credit card is an important financial tool that has emerged in parallel with the developments in technology from the past to the present and has become an indispensable part of human life. The credit card has many advantages that can be listed as facilitating online shopping, providing installments in purchases, and preventing cash dependence. This is why the rate of use of credit cards worldwide is increasing day by day. On the other hand, there are some risks of the credit cards highlighted by security concerns. The fraudsters who access the identity and credit card information of the consumers through different means use it to shop online without the consumer’s knowledge and gain an unfair advantage. Therefore, it is crucial to eliminate this security vulnerability that the fraudsters exploit and to develop an effective solution to the customer victimization experienced by e-commerce companies due to the fraudulent credit card transactions. With this motivation, the performance of the methods from different research fields was examined to explore the solution space in detail in terms of the problem at hand within the scope of this study. For this purpose, three machine learning algorithms (K-Nearest Neighbor, Naive Bayes, Support Vector Machine), two artificial neural network algorithms (Binary Classifier, Autoencoder), and two deep learning algorithms (Deep Autoencoder and Deep Neural Network Classifier) were implemented. The effectiveness of the algorithms in question was tested with a famous dataset widely used in the literature. Experimental results showed that the Deep Neural Network Classifier outperformed the other algorithms used in this study and the best study ever reported in the literature in detecting fraudulent credit card transactions when accuracy and AUROC performance criteria were taken into account.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Kredi kartı, geçmişten günümüze teknolojide yaşanan gelişmelere paralel olarak ortaya çıkan ve insan hayatının vazgeçilmez bir parçası haline gelen önemli bir üründür. Kredi kartının çevrimiçi alışverişi kolaylaştırmak, alışverişlerde taksitlendirme imkânı sağlamak ve nakit para bağımlılığının önüne geçmek şeklinde sıralanabilecek birçok avantajı mevcuttur. Bu nedenledir ki kredi kartlarının kullanım oranı dünya çapında gün geçtikçe artmaktadır. Öte yandan kredi kartlarının güvenlik kaygılarıyla öne çıkan bazı riskleri de söz konusudur. Farklı yöntemlerle tüketicilerin kimlik ve kredi kartı bilgilerine ulaşan dolandırıcılar bu bilgileri kullanarak tüketicinin haberi olmadan çevrimiçi alışveriş yapmakta ve haksız bir çıkar elde etmektedir. Dolayısıyla dolandırıcıların istismar ettikleri bu güvenlik zafiyetini boşa çıkarmak ve sahte kredi kartı işlemlerinden dolayı e-ticaret şirketlerinin yaşadığı müşteri mağduriyetine etkili bir çözüm geliştirebilmek önem taşımaktadır. Bu motivasyonla bu çalışma kapsamında ilgili problem açısından çözüm uzayını detaylıca keşfedebilmek için farklı araştırma alanlarına ait yöntemlerin performansı mercek altına alınmıştır. Bu amaçla üç makine öğrenmesi algoritması (K-En Yakın Komşu, Naive Bayes, Destek Vektör Makinesi), iki yapay sinir ağı algoritması (İkili Sınıflandırıcı, Otomatik Kodlayıcı) ve iki derin öğrenme algoritması (Derin Otomatik Kodlayıcı ve Derin Sinir Ağı Sınıflandırıcısı) gerçeklenmiştir. Söz konusu algoritmaların etkinliği literatürde yaygın olarak kullanılan ünlü bir veri seti ile test edilmiştir. Deneysel sonuçlar Derin Sinir Ağı Sınıflandırıcısının sahte kredi kartı işlemlerinin tespiti noktasında bu çalışmada kullanılan diğer algoritmaları ve literatürde şu ana kadar rapor edilmiş en iyi çalışmayı doğruluk ve AUROC başarım ölçütleri dikkate alındığında geride bıraktığını göstermiştir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Credit card fraud</kwd>
                                                    <kwd>  machine learning</kwd>
                                                    <kwd>  artificial neural network</kwd>
                                                    <kwd>  deep learning</kwd>
                                                    <kwd>  classification</kwd>
                                                    <kwd>  deep neural network classifier</kwd>
                                                    <kwd>  AUROC</kwd>
                                                    <kwd>  AUPRC</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Kredi kartı sahteciliği</kwd>
                                                    <kwd>  makine öğrenmesi</kwd>
                                                    <kwd>  yapay sinir ağı</kwd>
                                                    <kwd>  derin öğrenme</kwd>
                                                    <kwd>  sınıflandırma</kwd>
                                                    <kwd>  derin sinir ağı sınıflandırıcısı</kwd>
                                                    <kwd>  AUROC</kwd>
                                                    <kwd>  AUPRC</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">An, J, Cho, S. (2015). “Variational autoencoder based anomaly detection using reconstruction probability”, Special Lecture on IE; 2(1): 1-18.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Arı, A, Berberler, M, E. 2017. “Yapay sinir ağları ile tahmin ve sınıflandırma problemlerinin çözümü için arayüz tasarımı”, Acta Infologica; 1(2): 55-73.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Awoyemi, J, O, Adetunmbi, A, O, Oluwadare, S, A. “Credit card fraud detection using machine learning techniques: A comparative analysis”, In 2017 International Conference on Computing Networking and Informatics (ICCNI), Lagos, Nigeria, 2017,  pp. 1-9.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Aydoğdu, Ü, R, Karamustafaoğlu, O, Bülbül, M, Ş. 2017. “Akademik Araştırmalarda Araştırma Yöntemleri ile Örneklem İlişkisi: Doğrulayıcı Doküman Analizi Örneği”, Dicle University Journal of Ziya Gokalp Education Faculty; (30): 556-565.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Carcillo, F, Le Borgne, Y, A, Caelen, O, Bontempi, G. 2018a. “Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization”, International Journal of Data Science and Analytics; 5(4): 285-300.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Carcillo, F, Dal Pozzolo, A, Le Borgne, Y, A, Caelen, O, Mazzer, Y., Bontempi, G. 2018b. “Scarff: a scalable framework for streaming credit card fraud detection with spark”, Information fusion; 41: 182-194.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Carcillo, F, Le Borgne, Y, A, Caelen, O, Kessaci, Y, Oblé, F, Bontempi, G. 2019. “Combining unsupervised and supervised learning in credit card fraud detection”, Information sciences.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Dal Pozzolo, A, Boracchi, G, Caelen, O, Alippi, C, Bontempi, G. 2017. “Credit card fraud detection: a realistic modeling and a novel learning strategy”, IEEE transactions on neural networks and learning systems; 29(8): 3784-3797.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Dal Pozzolo, A, Caelen, O, Johnson, R, A, Bontempi, G. “Calibrating probability with undersampling for unbalanced classification”, In 2015 IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa, 2015, pp 159-166.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Dal Pozzolo, A, Caelen, O, Le Borgne, Y, A., Waterschoot, S, Bontempi, G. 2014. “Learned lessons in credit card fraud detection from a practitioner perspective”, Expert systems with applications; 41(10): 4915-4928.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Gitonga, J, T. 2018. “Fraud detection using machine leaning: a comparative analysis of neural networks &amp; support vector machines”, Doctoral dissertation, Strathmore University.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Gulati, P. 2020. “Hybrid Resampling Technique to Tackle the Imbalanced Classification Problem”.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Gupta, S, Agrawal, A, Gopalakrishnan, K, Narayanan, P. “Deep learning with limited numerical precision”, In International Conference on Machine Learning, Lille, France, 2015, pp 1737-1746.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Han, H, Lim, S, Suh, K, Park, S, Cho, S, J, Park, M. “Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach”, In 2020 IEEE International Conference on Big Data and Smart Computing (BigComp), Busan, Korea (South), 2020, pp 75-81.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Itoo, F, Singh, S. 2020. “Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection”, International Journal of Information Technology, 1-9.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Kaggle Machine Learning Group. “Credit Card Fraud Detection Dataset”, https://www.kaggle.com/mlg-ulb/creditcardfraud (accessed at 16.06.2020).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Kaynar, O, Aydın, Z, Görmez, Y. 2017. “Sentiment analizinde öznitelik düşürme yöntemlerinin oto kodlayıcılı derin öğrenme makinaları ile karşılaştırılması”, Bilişim Teknolojileri Dergisi; 10(3): 319-326.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Kaynar, O, Yıldız, M, Görmez, Y, Albayrak, A. “Makine öğrenmesi yöntemleri ile Duygu Analizi”, In International Artificial Intelligence and Data Processing Symposium (IDAP&#039;16), Malatya, Turkey, 2016, pp 17-18.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Kolter, J, Z, Maloof, M, A. 2006. “Learning to detect and classify malicious executables in the wild”, Journal of Machine Learning Research; 7: 2721-2744.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Lakshmi, S, V, S, S, Kavilla, S, D. 2018. “Machine learning for credit card fraud detection system”, Int. J. Appl. Eng. Res.; 13(24): 16819-16824.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Lebichot, B, Le Borgne, Y, A, He-Guelton, L, Oblé, F, Bontempi, G. “Deep-learning domain adaptation techniques for credit cards fraud detection”, In INNS Big Data and Deep Learning conference, Genova, Italy, 2019, pp 78-88.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Li, J, Sun, L, Yan, Q, Li, Z, Srisa-an, W, Ye, H. 2018. “Significant permission identification for machine-learning-based android malware detection”, IEEE Transactions on Industrial Informatics; 14(7): 3216-3225.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Liang, J, Liu, R. “Stacked denoising autoencoder and dropout together to prevent overfitting in deep neural network”, In 2015 8th International Congress on Image and Signal Processing (CISP), Shenyang, China, 2015, pp 697-701.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Liu, H, Zhang, S. 2012. “Noisy data elimination using mutual k-nearest neighbor for classification mining”, Journal of Systems and Software; 85(5): 1067-1074.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Lopez, C, C, U, Cadavid, A, N. “Machine learning classifiers for android malware analysis”, In 2016 IEEE Colombian Conference on Communications and Computing (COLCOM), Cartagena, Colombia, 2016, pp 1-6.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Meker, T. 2018. “Credit card fraud detection analysis and machine learning application”, MEF Üniversitesi Fen Bilimleri Enstitüsü, İstanbul, Türkiye.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Mukhandi, H. 2018. “Developing machine learning methods for network anomaly detection”, Master of Science Thesis, 2-3.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Nielsen, M, A. “Neural networks and deep learning”, Determination Press, San Francisco, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Osowski, S, Siwek, K, Markiewicz, T. “Mlp and svm networks-a comparative study”, In Proceedings of the 6th Nordic Signal Processing Symposium, Piscataway, NJ, USA, 2004, pp 37-40.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Ravì, D, Wong, C, Deligianni, F, Berthelot, M, Andreu-Perez, J, Lo, B, Yang, G, Z. 2016. “Deep learning for health informatics”, IEEE journal of biomedical and health informatics; 21(1): 4-21.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Schultz, M, G, Eskin, E, Zadok, F, Stolfo, S J. “Data mining methods for detection of new malicious executables”, In Proceedings 2001 IEEE Symposium on Security and Privac, Washington, DC, USA, 2001, pp 38-49.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Shin, H, C, Orton, M, Collins, D, J, Doran, S, Leach, M, O. “Organ detection using deep learning”, In: Kevin Zhou S (ed) Medical image recognition, segmentation and parsing, 1rd edn, FL, United States. 2016, pp 123-153, Academic Press.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Soylu, K. 2018. “Kredi kartı sahte işlem tespiti”, Ankara Üniversitesi Fen Bilimleri Enstitüsü, Ankara, Türkiye, Yüksek Lisans Tezi, 1-57.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Şeker, A, Diri, B, Balık, H, H. 2017. “Derin öğrenme yöntemleri ve uygulamaları hakkında bir inceleme”, Gazi Mühendislik Bilimleri Dergisi; 3(3): 47-64.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Yousefi-Azar, M, Varadharajan, V, Hamey, L, Tupakula, U. “Autoencoder-based feature learning for cyber security applications”, In 2017 International joint conference on neural networks (IJCNN), Anchorage, AK, USA, 2017, pp. 3854-3861.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Wang, X, Yang, Y, Zeng, Y, Tang, C, Shi, J, Xu, K. “A novel hybrid mobile malware detection system integrating anomaly detection with misuse detection”, In Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, Paris, France, 2015, pp 15-22.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Wu, J, Cai, Z, Zhu, X. “Self-adaptive probability estimation for naive bayes classification”, In The 2013 International Joint Conference on Neural Networks (IJCNN), Dallas, TX, USA, 2013, pp 1-8.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Varol, A, B, İşeri, İ. 2019. “Lenf Kanserine İlişkin Patoloji Görüntülerinin Makine Öğrenimi Yöntemleri ile Sınıflandırılması”, Avrupa Bilim ve Teknoloji Dergisi; 404-410.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
