17. Jonnalagadda, V., Gupta, P. and Sen, E., 2019. Credit card fraud detection using Random Forest
Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2),
pp.1-5.
18. Kalid, S.N., Khor, K.C., Ng, K.H. and Tong, G.K., 2024. Detecting frauds and payment defaults on
credit card data inherited with imbalanced class distribution and overlapping class problems: A
systematic review. IEEE Access.
19. Khaled, S., Rohayanti, H., Zeba, T., Manal O., Md, O., Choi, K. (2024). When to Use Standardization
and Normalization: Empirical Evidence from Machine Learning Models and XAI. IEEE Access, vol.
12, pp. 135300-135314. doi: 10.1109/ACCESS.2024.3462434.
20. Kondo, M., Bezemer, C.P., Kamei, Y., Hassan, A.E. and Mizuno, O., 2019. The impact of feature
reduction techniques on defect prediction models. Empirical Software Engineering, 24, pp.1925-1963.
21. Koralage, R., 2019. Data Mining Techniques for Credit Card Fraud Detection. Sustain. Vital Technol.
Eng. Informatics, (2015), pp.1-9.
22. Kumain, K. (2020). Analysis of Fraud Detection on Credit Cards using Data Mining Techniques.
Turkish Journal of Computer and Mathematics Education, 11(1), 235-245.
23. Larose, C.D. and Larose, D.T., 2019. Data science using Python and R. John Wiley & Sons.
24. Leevy, J.L., Khoshgoftaar, T.M. and Hancock, J., 2022, October. Evaluating performance metrics for
credit card fraud classification. In 2022 IEEE 34th International Conference on Tools with Artificial
Intelligence (ICTAI) (pp. 1336-1341). IEEE.
25. Lundberg, S.M., and Lee, S.-I., 2017. A Unified Approach to Interpreting Model Predictions. Advances
in Neural Information Processing Systems, 30 (NIPS 2017), pp. 4765–4774.
26. Ozgur, C., Colliau, T., Rogers, G. and Hughes, Z., 2017. MatLab vs. Python vs. R. Journal of data
Science, 15(3), pp.355-371.
27. Patel, K., 2023. Credit card analytics: a review of fraud detection and risk assessment techniques.
International Journal of Computer Trends and Technology, 71(10), pp.69-79.
28. Peng, J., Hahn, J., Huang, K. (2023). Handling Missing Values in Information Systems Research: A
Review of Methods and Assumptions. Information Systems Research, 34(1), pp. 5-26. doi:
10.1287/isre.2022.1104
29. Mittal, S. and Tyagi, S., 2019, January. Performance evaluation of machine learning algorithms for
credit card fraud detection. In 2019 9th International Conference on Cloud Computing, Data Science &
Engineering (Confluence) (pp. 320-324). IEEE.
30. Muraina, I., 2022. Ideal dataset splitting ratios in machine learning algorithms: general concerns for
data scientists and data analysts in 7th International Mardin Artuklu Scientific Research Conference,
2022. Mardin, Turkey.
31. Nishi, N.J., Sunny, F.A. and Bakchy, S.C., 2022, December. Fraud Detection of Credit Card using Data
Mining Techniques. In 2022 4th International Conference on Sustainable Technologies for Industry 4.0
(STI) (pp. 1-6). IEEE.
32. Novac, O.C., Chirodea, M.C., Novac, C.M., Bizon, N., Oproescu, M., Stan, O.P. and Gordan, C.E.,
2022. Analysis of the application efficiency of TensorFlow and PyTorch in convolutional neural
network. Sensors, 22(22), p.8872.
33. Raj, S.B.E. and Portia, A.A., 2011. Analysis on credit card fraud detection methods. In 2011
International Conference on Computer, Communication and Electrical Technology (ICCCET) (pp.
152-156). IEEE.
34. Shi, X., Wong, Y.D., Li, M.Z.F., Palanisamy, C. and Chai, C., 2019. A feature learning approach based
on XGBoost for driving assessment and risk prediction. Accident Analysis & Prevention, 129, pp.170-
179.
35. Suresh, G., Raj, R. J., 2018. A Study on Credit Card Fraud Detection using Data Mining Techniques.
International Journal of Data Mining Techniques and Applications, 7(1), 21-24.
36. Taha, A.A. and Malebary, S.J., 2020. An intelligent approach to credit card fraud detection using an
optimized light gradient boosting machine. IEEE Access, 8, pp.25579-25587.
37. Truong, H.L. and Dustdar, S., 2011. Cloud computing for small research groups in computational
science and engineering: current status and outlook. Computing, 91, pp.75-91.