Research on internal financial fraud identification model of enterprise based on ensemble learning
DOI: 10.23977/jaip.2025.080114 | Downloads: 19 | Views: 443
Author(s)
Yingjie Bu 1, Yi Wu 2, Guodong He 3, Qian Zhuge 4
Affiliation(s)
1 Institute of Collaborative Innovation, University of Macau, Macau SAR, China
2 Sussex Artificial Intelligence Institute, Zhejiang Gongshang University, Hangzhou City, Zhejiang Province, China
3 College of Information Engineering, Wenzhou Business College, Wenzhou City, Zhejiang Province, China
4 College of Finance and Trade, Wenzhou Business College, Wenzhou City, Zhejiang Province, China
Corresponding Author
Yingjie BuABSTRACT
In recent years, financial fraud cases have been on the rise, prompting numerous scholars to explore relevant fields and contribute significantly to the practical oversight of the economy. Integrated learning models have also gained widespread application in the realm of financial fraud detection, proving their efficacy in identification. This paper provides a summary of existing research and methodologies employed by scholars. After reviewing pertinent literature, the Logistic Regression model, a Single Decision Tree, Gradient Boosting Decision Trees, Random Forest model, XGBoost model, and LightGBM model were selected as candidate models for studying financial fraud detection. A comparative analysis of their respective identification accuracies was conducted. The research findings indicate that across the overall detection models, the identification rates of all models exceed 70%. Among these, the XGBoost model exhibits the best performance, achieving an identification accuracy of 87.77%. From the comparative results, it is evident that the accuracy of ensemble learning models generally surpasses that of traditional classification models and basic machine learning models, effectively enhancing the efficiency of financial fraud detection. Furthermore, in terms of identification speed, ensemble learning models demonstrate advantages such as shorter processing times and the ability to accommodate larger datasets.
KEYWORDS
Financial Fraud Detection, XGBoost, Machine Learning ModelCITE THIS PAPER
Yingjie Bu, Yi Wu, Guodong He, Qian Zhuge, Research on internal financial fraud identification model of enterprise based on ensemble learning. Journal of Artificial Intelligence Practice (2025) Vol. 8: 98-108. DOI: http://dx.doi.org/10.23977/jaip.2025.080114.
REFERENCES
[1] Oh J S, Shong I, "A case study on business model innovations using Blockchain: focusing on financial institutions," Asia Pacific Journal of Innovation & Entrepreneurship, vol. 11, no. 3, pp. 335-344, 2017
[2] W. Luo, "Innovation and application of blockchain technology in the financial field," Technoeconomics & Management Research, no. 8, pp. 90-95, 2018.
[3] Firdaus A, Razak M F A, and Feizollah A, et al, "The rise of “blockchain”: bibliometric analysis of blockchain study," Scientometrics, vol. 120, no. 3, pp. 1289-1331, 2019.
[4] H. Cheng, and Y. Yang, "The development trend of block chain and commercial banks should study the policy,” Financial Regulation Research, no. 6, pp. 73-91, 2016.
[5] Schutz A, Fertig T, and Weber K, et al, "Vertrauen ist gut, Blockchain ist besser – Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing," HMD Praxis der Wirtschaftsinformatik, vol. 55, no. 6, pp. 1155-1166, 2018.
[6] J. Zhang, "Construction and application of enterprise financial sharing service under cloud computing environment," Friends of Accounting, vol. 597, no. 21, pp. 136-140, 2018.
[7] N. Li, and J. C. Mitchell, "RT: a Role-based Trust-management framework," Proceedings DARPA Information Survivability Conference and Exposition, vol. 1, pp. 201-212, 2013.
[8] Ouaddah A, Abou Elkalam A, and Ait Ouahman A, "FairAccess: a new Blockchain-based access control framework for the Internet of Things," Security and Communication Networks, vol. 9, no. 18, pp. 5943-5964, 2016.
[9] Aitzhan N Z, and Svetinovic D, "Security and Privacy in Decentralized Energy Tradingthrough Multi-signatures, Blockchain and Anonymous Messaging Streams," IEEE Transactions on Dependable & Secure Computing, pp. 1-3, 2016.
[10] Wadud M, and Ali Ahmed H J, “Factors affecting delinquency of household credit in the U.D. Does consumer sentiment paly a role,” The North American Journal of Economis and Finance, no. 52, pp.101132-101134, 2021.
[11] Patil S, Nemade V, and Soni P K, "Predictive modelling for Credit card fraud detection using data analytics," Procedia Computer Science, no. 132, pp. 385-395, 2021.
[12] Lukas. M, "The goal gradient effect and repayments in consumer credit," Economics Letters, no. 171, pp.208-210, 2020.
[13] Aitzhan N Z, and Svetinovic D, "Security and Privacy in Decentralized Energy Tradingthrough Multi-signatures, Blockchain and Anonymous Messaging Streams,” IEEE Transactions on Dependable & Secure Computing, pp. 1-3, 2016.
[14] Y. Zheng, and R. Du, "Application of block chain technique in the management of digital knowledge assets," Science Citation Database, vol. 26, no. 3, pp. 97-104, 2018.
[15] Y. Zhou, and H. Li, "Data management solution based on blockchain," Information Security Research, vol. 6, no. 1, pp. 37-45, 2020.
[16] Y. Huang, Z. Liang, and Y. Sun, "Supply chain trusted data management based on blockchain," Journal of Computer Science and Technology, vol. 27, no. 12, pp. 9-17, 2018.
[17] Heilman E, Baldimtsi F, and Goldberg S, "Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions," International Conference on Financial Cryptography and Data Security, pp. 43-50, 2016.
Downloads: | 15127 |
---|---|
Visits: | 485214 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks