Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu
{"title":"云计算环境下基于深度学习超参数调优的银行财务欺诈检测","authors":"Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu","doi":"10.1142/s0218843023500247","DOIUrl":null,"url":null,"abstract":"When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.5000,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment\",\"authors\":\"Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu\",\"doi\":\"10.1142/s0218843023500247\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.\",\"PeriodicalId\":54966,\"journal\":{\"name\":\"International Journal of Cooperative Information Systems\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cooperative Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/s0218843023500247\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cooperative Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/s0218843023500247","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment
When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.
期刊介绍:
The paradigm for the next generation of information systems (ISs) will involve large numbers of ISs distributed over large, complex computer/communication networks. Such ISs will manage or have access to large amounts of information and computing services and will interoperate as required. These support individual or collaborative human work. Communication among component systems will be done using protocols that range from conventional ones to those based on distributed AI. We call such next generation ISs Cooperative Information Systems (CIS).
The International Journal of Cooperative Information Systems (IJCIS) addresses the intricacies of cooperative work in the framework of distributed interoperable information systems. It provides a forum for the presentation and dissemination of research covering all aspects of CIS design, requirements, functionality, implementation, deployment, and evolution.