Synthetic Wallet-Transaction Generator for Risk-Model Training

Authors

  • Manish Tomar Citi, USA Author
  • Vijay Kumar Soni Discover Financial Services, USA Author
  • Priya Ranjan Parida Universal Music Group, USA Author

Keywords:

synthetic data, diffusion models, financial transactions, fraud detection, data augmentation, seasonality modeling

Abstract

The objective of this paper is to propose a diffusion-based generative models to generate synthetic financial transaction sequences based on temporal seasonality, merchant category codes (MCCs), and client behavioural archetypes. The proposed technique provides privacy-compliant, statistically consistent wallet traces that can be used to supplement transactional information. 

Downloads

Download data is not yet available.

References

I. Goodfellow et al., "Generative adversarial nets," Advances in Neural Information Processing Systems, vol. 27, pp. 2672–2680, 2014.

X. Zhu, J. Goldberg, "Introduction to Semi-Supervised Learning," Synthesis Lectures on Artificial Intelligence and Machine Learning, vol. 3, no. 1, pp. 1–130, 2009.

Y. LeCun, Y. Bengio, G. Hinton, "Deep learning," Nature, vol. 521, pp. 436–444, 2015.

J. Friedman, T. Hastie, R. Tibshirani, The Elements of Statistical Learning, 2nd ed., Springer, 2009.

T. Chen and C. Guestrin, "XGBoost: A scalable tree boosting system," Proc. 22nd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, pp. 785–794, 2016.

A. Radford, L. Metz, S. Chintala, "Unsupervised representation learning with deep convolutional generative adversarial networks," arXiv preprint arXiv:1511.06434, 2015.

R. Salakhutdinov and G. Hinton, "Deep Boltzmann machines," Proc. International Conference on Artificial Intelligence and Statistics, pp. 448–455, 2009.

C. Dwork, "Differential privacy," Automata, Languages and Programming, vol. 4052, pp. 1–12, 2006.

M. Abadi et al., "Deep learning with differential privacy," Proc. ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318, 2016.

Y. Kim et al., "Modeling consumer spending behavior with hidden Markov models," Journal of Consumer Research, vol. 35, no. 3, pp. 540–557, 2008.

P. Y. Chen et al., "Rule-based simulation of credit card transactions for fraud detection," Journal of Financial Crime, vol. 23, no. 3, pp. 575–591, 2016.

M. J. D. Powell, "Approximation theory and numerical analysis," in Handbook of Numerical Analysis, vol. 1, P. G. Ciarlet and J. L. Lions, Eds., North-Holland, 1990.

J. Song and S. Ermon, "Generative modeling by estimating gradients of the data distribution," arXiv preprint arXiv:1705.01964, 2017.

H. He, E. A. Garcia, "Learning from imbalanced data," IEEE Transactions on Knowledge and Data Engineering, vol. 21, no. 9, pp. 1263–1284, 2009.

M. Abadi et al., "TensorFlow: Large-scale machine learning on heterogeneous systems," arXiv preprint arXiv:1603.04467, 2016.

J. Shokri et al., "Membership inference attacks against machine learning models," Proc. IEEE Symposium on Security and Privacy, pp. 3–18, 2017.

European Parliament and Council, "General Data Protection Regulation (GDPR)," Official Journal of the European Union, 2016.

S. J. Stolfo et al., "Credit card fraud detection using meta-learning: Issues and initial results," Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997.

P. Domingos, "A few useful things to know about machine learning," Communications of the ACM, vol. 55, no. 10, pp. 78–87, 2012.

T. Mikolov et al., "Distributed representations of words and phrases and their compositionality," Advances in Neural Information Processing Systems, vol. 26, pp. 3111–3119, 2013.

Downloads

Published

02-11-2018

How to Cite

[1]
Manish Tomar, Vijay Kumar Soni, and Priya Ranjan Parida, “Synthetic Wallet-Transaction Generator for Risk-Model Training”, Art. Intel. Mach. Learn. Auto. Sys., vol. 2, pp. 1–32, Nov. 2018, Accessed: May 23, 2026. [Online]. Available: https://amlas.net/index.php/publication/article/view/26

Similar Articles

1-10 of 48

You may also start an advanced similarity search for this article.