<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Rev cuba cienc informat]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992021000500244</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Algoritmos de detección de anomalías con redes profundas. Revisión para detección de fraudes bancarios]]></article-title>
<article-title xml:lang="en"><![CDATA[Anomaly detection algorithms with deep networks. Review for Bank Fraud Detection]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ameijeiras Sánchez]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valdés Suárez]]></surname>
<given-names><![CDATA[Odeynis]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Diez]]></surname>
<given-names><![CDATA[Héctor]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de las Ciencias Informáticas (UCI).  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<volume>15</volume>
<numero>4</numero>
<fpage>244</fpage>
<lpage>264</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992021000500244&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992021000500244&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992021000500244&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Los diversos avances en las ciencias y los grandes volúmenes de datos que se han generado sólo en los últimos años han sobrepasado la capacidad humana para recolectar, almacenar y comprender los mismos sin el uso de las herramientas adecuadas limitando las capacidades de detección de fraudes en las instituciones. Una forma de fraude bancario es el que ocurre con las tarjetas de crédito/débito; estas se han convertido en un método de pago muy popular en las compras online de bienes y servicios. Es por estos motivos que se realizó un análisis de los principales algoritmos de detección de anomalías basados en aprendizaje profundo enfocado en el fraude bancario. Se determinó que las arquitecturas basadas en AEs destacan en tareas no supervisadas y las (Long short-term memory) LSTM para tareas de clasificación.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The various advances in science and the large volumes of data that have been generated only in recent years have surpassed the human capacity to collect, store and understand them without the use of the appropriate tools, limiting the fraud detection capabilities of companies. institutions. One form of bank fraud is that which occurs with credit / debit cards; these have become a very popular payment method for online purchases and services. It is for these reasons that an analysis of the main anomaly detection algorithms based on deep learning focused on bank fraud was carried out. Architectures based on AEs were found to excel at unsupervised tasks and (Long short-term memory) LSTMs for classification tasks.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[anomalía de datos]]></kwd>
<kwd lng="es"><![CDATA[aprendizaje profundo]]></kwd>
<kwd lng="es"><![CDATA[fraude bancario]]></kwd>
<kwd lng="es"><![CDATA[tarjetas de crédito]]></kwd>
<kwd lng="en"><![CDATA[anomaly detection]]></kwd>
<kwd lng="en"><![CDATA[bank fraud]]></kwd>
<kwd lng="en"><![CDATA[deep learning]]></kwd>
<kwd lng="en"><![CDATA[credit cards]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abroyan]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neural networks for financial market risk classification]]></article-title>
<source><![CDATA[Frontiers in Signal Processing]]></source>
<year>2017</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alcalde]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Aprendizaje no Supervisado y Detección de Anomalías: ¿Qué es una Anomalía?]]></source>
<year>2018</year>
<publisher-name><![CDATA[El Baúl del Programador]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alghofaili]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Albattah]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Rassam]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Financial Fraud Detection Model Based on LSTM Deep Learning Technique.]]></article-title>
<source><![CDATA[Journal of Applied Security Research]]></source>
<year>2020</year>
<volume>15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>498-516</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[A. C]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[G. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Remoción de lluvia en imágenes por medio de una arquitectura de autoencoder]]></article-title>
<source><![CDATA[Investigación e Innovación en Ingenierías]]></source>
<year>2020</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>140-67</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Branco]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Abreu]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Gomes]]></surname>
<given-names><![CDATA[A. S]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[M. S]]></given-names>
</name>
<name>
<surname><![CDATA[Ascensão]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Bizarro]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Interleaved Sequence RNNs for Fraud Detection.]]></source>
<year>2020</year>
<page-range>3101-9</page-range><publisher-name><![CDATA[Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chandola]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Outlier detection: A survey.]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>2007</year>
<volume>14</volume>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chandola]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anomaly detection: A survey]]></article-title>
<source><![CDATA[ACM computing surveys (CSUR)]]></source>
<year>2009</year>
<volume>41</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-58</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cho]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Van Merriënboer]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Gulcehre]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Bahdanau]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Bougares]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Schwenk]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Bengio]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Learning phrase representations using RNN encoder-decoder for statistical machine translation.]]></source>
<year>2014</year>
<publisher-name><![CDATA[arXiv preprint arXiv:1406.1078]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cruz Quispe]]></surname>
<given-names><![CDATA[L. M]]></given-names>
</name>
<name>
<surname><![CDATA[Rantes García]]></surname>
<given-names><![CDATA[M. T]]></given-names>
</name>
</person-group>
<source><![CDATA[Detección de fraudes usando técnicas de clustering]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durán Suárez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Redes neuronales convolucionales en R: Reconocimiento de caracteres escritos a mano.]]></source>
<year>2017</year>
<publisher-name><![CDATA[Universidad de Sevilla]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Erich]]></surname>
<given-names><![CDATA[H.-P. K. P. K]]></given-names>
</name>
<name>
<surname><![CDATA[Zimek]]></surname>
<given-names><![CDATA[S. A]]></given-names>
</name>
</person-group>
<source><![CDATA[Interpreting and unifying outlier scores.]]></source>
<year>2011</year>
<publisher-name><![CDATA[11th SIAM International Conference on Data Mining (SDM)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fiore]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[De Santis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Perla]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Zanetti]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Palmieri]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using generative adversarial networks for improving classification effectiveness in credit card fraud detection.]]></article-title>
<source><![CDATA[Information Sciences,]]></source>
<year>2019</year>
<volume>479</volume>
<page-range>448-55</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fomin]]></surname>
<given-names><![CDATA[I. S]]></given-names>
</name>
<name>
<surname><![CDATA[Bakhshiev]]></surname>
<given-names><![CDATA[A. V]]></given-names>
</name>
</person-group>
<source><![CDATA[Network for Object Classification in Outdoor Video Surveillance System, en Cham]]></source>
<year>2019</year>
<page-range>221-9</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Credit card fraud detection using convolutional neural networks]]></article-title>
<source><![CDATA[International Conference on Neural Information Processing]]></source>
<year>2016</year>
<page-range>483-90</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García Costa]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Herramienta para la detección de anomalías en el suministro eléctrico en el ámbito asistencial]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goodfellow]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Bengio]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Courville]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bengio]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep learning]]></article-title>
<source><![CDATA[MIT press Cambridge]]></source>
<year>2016</year>
<volume>1</volume>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goodfellow]]></surname>
<given-names><![CDATA[I. J]]></given-names>
</name>
<name>
<surname><![CDATA[Pouget-Abadie]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Mirza]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Warde-Farley]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Ozair]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Courville]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bengio]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Generative adversarial networks.]]></source>
<year>2014</year>
<publisher-name><![CDATA[arXiv preprint arXiv]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hawkins]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Baxter]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Outlier detection using replicator neural networks]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Discovering cluster-based local outliers]]></source>
<year>2003</year>
<volume>24</volume>
<page-range>1641-50</page-range><publisher-name><![CDATA[Pattern Recognition Letters]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hochreiter]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[JA1 4 rgen Schmidhuber]]></source>
<year>1997</year>
<volume>9</volume>
<numero>8</numero>
<issue>8</issue>
<publisher-name><![CDATA[Neural Computation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jurgovsky]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Granitzer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ziegler]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Calabretto]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Portier]]></surname>
<given-names><![CDATA[P.-E]]></given-names>
</name>
<name>
<surname><![CDATA[He-Guelton]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Caelen]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[Sequence classification for credit-card fraud detection]]></source>
<year>2018</year>
<volume>100</volume>
<page-range>234-45</page-range><publisher-name><![CDATA[Expert Systems with Applications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Knorr]]></surname>
<given-names><![CDATA[E. M]]></given-names>
</name>
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[R. T]]></given-names>
</name>
<name>
<surname><![CDATA[Tucakov]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distance-based outliers: Algorithms and applications.]]></article-title>
<source><![CDATA[The VLDB Journal,]]></source>
<year>2000</year>
<volume>8</volume>
<page-range>3-4</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazarevic]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Feature bagging for outlier detection.]]></source>
<year>2005</year>
<page-range>157-66</page-range><publisher-name><![CDATA[Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Goh]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Anomaly detection with generative adversarial networks for multivariate time series]]></source>
<year>2018</year>
<publisher-name><![CDATA[arXiv preprint arXiv:1809.04758]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Luwang]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Xia]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Transaction fraud detection using gru-centered sandwich-structured model.]]></source>
<year>2018</year>
<page-range>467-72</page-range><publisher-name><![CDATA[2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Makhzani]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Shlens]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Jaitly]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Goodfellow]]></surname>
</name>
<name>
<surname><![CDATA[Frey]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Adversarial autoencoders.]]></source>
<year>2015</year>
<publisher-name><![CDATA[arXiv preprint arXiv:1511.05644]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ozbayoglu]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
<name>
<surname><![CDATA[Gudelek]]></surname>
<given-names><![CDATA[M. U]]></given-names>
</name>
<name>
<surname><![CDATA[Sezer]]></surname>
<given-names><![CDATA[O. B]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning for financial applications: A survey.]]></source>
<year>2020</year>
<publisher-name><![CDATA[Applied Soft Computing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[S. K]]></given-names>
</name>
<name>
<surname><![CDATA[Shiu]]></surname>
<given-names><![CDATA[S. C. K]]></given-names>
</name>
</person-group>
<source><![CDATA[Foundations of Case-Based Reasoning.]]></source>
<year>2004</year>
<publisher-name><![CDATA[JohnWiley &amp; Sons, Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paula]]></surname>
<given-names><![CDATA[E. L]]></given-names>
</name>
<name>
<surname><![CDATA[Ladeira]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Carvalho]]></surname>
<given-names><![CDATA[R. N]]></given-names>
</name>
<name>
<surname><![CDATA[Marzagao]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning anomaly detection as support fraud investigation in brazilian exports and anti-money laundering.]]></source>
<year>2016</year>
<page-range>954-60</page-range><publisher-name><![CDATA[International Conference on Machine Learning and Applications (ICMLA),]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[PÉREZ]]></surname>
<given-names><![CDATA[E. R]]></given-names>
</name>
<name>
<surname><![CDATA[MATEOS]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis y Detección de Fraude Fiscal Mediante Técnicas de Aprendizaje Automático]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petrosino]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Maddalena]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Neural Networks in Video Surveillance: A Perspective View]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Phua]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Gayler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[A comprehensive survey of data mining-based fraud detection research]]></source>
<year>2010</year>
<publisher-name><![CDATA[arXiv preprint arXiv:1009.6119]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pumsirirat]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine.]]></article-title>
<source><![CDATA[International Journal of advanced computer science and applications]]></source>
<year>2018</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>18-25</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Suganthan]]></surname>
<given-names><![CDATA[P. N]]></given-names>
</name>
<name>
<surname><![CDATA[Amaratunga]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Ensemble deep learning for regression and time series forecasting.]]></source>
<year>2014</year>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE symposium on computational intelligence in ensemble learning (CIEL)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodrigo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Detección de anomalías: Autoencoders y PCA]]></source>
<year>2020</year>
<publisher-name><![CDATA[Cienciadedatos.net.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schölkopf]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Platt]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
<name>
<surname><![CDATA[Shawe-Taylor]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Smola]]></surname>
<given-names><![CDATA[A. J]]></given-names>
</name>
<name>
<surname><![CDATA[Williamson]]></surname>
<given-names><![CDATA[R. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estimating the support of a high-dimensional distribution.]]></article-title>
<source><![CDATA[Neural computation]]></source>
<year>2001</year>
<volume>13</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1443-71</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singhal]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Data modeling and data warehousing techniques to improve intrusion detection.]]></source>
<year>2007</year>
<page-range>69-82</page-range><publisher-name><![CDATA[Data warehousing and data mining techniques for cyber security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[A model based on convolutional neural network for online transaction fraud detection]]></source>
<year>2018</year>
<publisher-name><![CDATA[Security and Communication Networks]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[One-class adversarial nets for fraud detection.]]></source>
<year>2019</year>
<volume>33</volume>
<numero>01</numero>
<issue>01</issue>
<page-range>1286-93</page-range><publisher-name><![CDATA[Proceedings of the AAAI Conference on Artificial Intelligence,]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Y.-J]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[X.-H]]></given-names>
</name>
<name>
<surname><![CDATA[Sheng]]></surname>
<given-names><![CDATA[W.-G]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.-Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Generative adversarial network based telecom fraud detection at the receiving bank]]></article-title>
<source><![CDATA[Neural Networks]]></source>
<year>2018</year>
<volume>102</volume>
<page-range>78-86</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Credit card fraud detection using autoencoder neural network.]]></source>
<year>2019</year>
<publisher-name><![CDATA[arXiv preprint arXiv:1908.11553]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
