Fraud detection in financial statements using data mining and GAN models

被引:10
|
作者
Aftabi, Seyyede Zahra [1 ]
Ahmadi, Ali [1 ]
Farzi, Saeed [1 ,2 ]
机构
[1] K N Toosi Univ Technol, Fac Comp Engn, Tehran, Iran
[2] K N Toosi Univ Technol, Fac Comp Engn, Tehran 1631714191, Iran
关键词
Fraud in financial statements; Anomaly detection; Outlier generation; Generative adversarial networks; Ensemble models; Banking sector; GENERATIVE ADVERSARIAL NETWORKS;
D O I
10.1016/j.eswa.2023.120144
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Financial statements are analytical reports published periodically by financial institutions explaining their performance from different perspectives. As these reports are the fundamental source for decision-making by many stakeholders, creditors, investors, and even auditors, some institutions may manipulate them to mislead people and commit fraud. Fraud detection in financial statements aims to discover anomalies caused by these distortions and discriminate fraud-prone reports from non-fraudulent ones. Although binary classification is one of the most popular data mining approaches in this area, it requires a standard labeled dataset, which is often unavailable in the real world due to the rarity of fraudulent samples. This paper proposes a novel approach based on the generative adversarial networks (GAN) and ensemble models that is able to not only resolve the lack of nonfraudulent samples but also handle the high-dimensionality of feature space. A new dataset is also constructed by collecting the annual financial statements of ten Iranian banks and then extracting three types of features suggested in this study. Experimental results on this dataset demonstrate that the proposed method performs well in generating synthetic fraud-prone samples. Moreover, it attains comparative performance with supervised models and better performance than unsupervised ones in accurately distinguishing fraud-prone samples.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Intelligent Fraud Detection in Financial Statements Using Machine Learning and Data Mining: A Systematic Literature Review
    Ashtiani, Matin N.
    Raahemi, Bijan
    [J]. IEEE ACCESS, 2022, 10 : 72504 - 72525
  • [2] Research on the Detection of Financial Fraud Using Data Mining Techniques
    Li Yanling
    Li Nan
    Yang Mingpei
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON ADVANCED DESIGN AND MANUFACTURING ENGINEERING (ICADME 2017), 2017, 136 : 473 - 481
  • [3] Financial fraud: Data mining application and detection
    Aziz, N. H. A.
    Zakaria, N. B.
    Mohamed, I. S.
    [J]. RECENT TRENDS IN SOCIAL AND BEHAVIOUR SCIENCES, 2014, : 341 - 344
  • [4] Detection of fraudulent financial statements using the hybrid data mining approach
    Chen, Suduan
    [J]. SPRINGERPLUS, 2016, 5 : 1 - 16
  • [5] Data mining techniques for the detection of fraudulent financial statements
    Kirkos, Efstathios
    Spathis, Charalambos
    Manolopoulos, Yannis
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2007, 32 (04) : 995 - 1003
  • [6] Detection of financial statement fraud and feature selection using data mining techniques
    Ravisankar, P.
    Ravi, V.
    Rao, G. Raghava
    Bose, I.
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 491 - 500
  • [7] Fuzzy ranking of financial statements for fraud detection
    Chai, Wei
    Hoogs, Bethany K.
    Verschueren, Benjamin T.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2006, : 152 - +
  • [8] Fraud detection for financial statements of business groups
    Chen, Yuh-Jen
    Liou, Wan-Ching
    Chen, Yuh-Min
    Wu, Jyun-Han
    [J]. INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2019, 32 : 1 - 23
  • [9] Forecasting Fraudulent Financial Statements using Data Mining
    Kotsiantis, S.
    Koumanakos, E.
    Tzelepis, D.
    Tampakas, V.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 12, 2006, 12 : 284 - +
  • [10] Financial Statement Fraud Detection using Text Mining
    Gupta, Rajan
    Gill, Nasib Singh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (12) : 189 - 191