QUANTIFYING THE VULNERABILITY OF CREDIT CARD FRAUD DETECTION SYSTEMS TO GRADIENT BASED ADVERSARIAL EVASION
Main Article Content
Abstract
In financial cybersecurity, fraud detection is at the forefront of the battle against cybercriminals and deep learning models are the state-of-the-art method for real-time detection; yet their reliance on fixed feature distributions renders them inherently susceptible to adversarial attacks. With the rise of generative artificial intelligence (AI) in obfuscating fraudulent transactions, conventional performance indicators (accuracy and F1-score) do not reflect the cybersecurity resilience of these models. This research explores the Credit Card Fraud Detection dataset, comprising more than 550,000 anonymized records. The study uses a functional deep learning model as a benchmark and introduces the Fast Gradient Method (FGM) to simulate white box attacks on the latent features . The experiment results demonstrate a high detection accuracy of 99.85% under normal operating conditions, which dramatically reduces to 92.75% when card transactions are slightly modified by adversarial disturbances at an epsilon value of 0.1. Numerical evidence reveals a clear 7.10% "Security Gap," depicting a substantial degree of vulnerability, where transactions are mathematically reclassified from fraudulent to legitimate. Notably, our research suggests a non-linear "safety cliff" in the decrease of detection accuracy, where the model's reliability completely fails as the adversarial strength reaches 0.15 or higher. In addition, Principal Component Analysis demonstrates that gradient attacks have successfully distorted the latent features of fraudulent transactions, resulting in the movement of highly suspicious transactions towards the concentrated area of legitimate transactions, hence evading automated security screening while preserving the overall statistical distribution of the data.
JEL Classification Codes: G21, K42, O33, C45.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016
Aljaradat, A., Sarkar, G., & Shukla, S. K. (2024). Modelling cybersecurity impacts on digital payment adoption: A game theoretic approach. Journal of Economic Criminology, 5, 100089. https://doi.org/10.1016/j.jeconc.2024.100089
Alwanin, R., Ismail, M. M. B., & Bchir, O. (2025). Customs fraud detection using a gradient boosting approach for joint classification and risk estimation. Scientific Reports, 16, 3432. https://doi.org/10.1038/s41598-025-33382-z
Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023
Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., Anderson, H., Roff, H., Allen, G. C., Steinhardt, J., Flynn, C., hÉigeartaigh, S. Ó., Beard, S., Belfield, H., Farquhar, S., & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. https://doi.org/10.48550/arXiv.1802.07228
Bailo, P., Sirignano, A., Nittari, G., Visconti, G., Pesel, G., Spasari, T., & Ricci, G. (2026). A Review of Crime at Machine Speed: Criminological Aspects of Artificial Intelligence’s Industrialisation of Deception. Sci, 8(3), 54. https://doi.org/10.3390/sci8030054
Bartholomew, D. C., Iwu, H. C., & Ibemere, I. P. (2025). A deep recurrent neural network approach to inflation forecasting in Nigeria: Evaluating the impact of feature selection methods. Franklin Open, 13, 100443. https://doi.org/10.1016/j.fraope.2025.100443
Baviskar, S. (2025). Adversarial Robustness in Financial Machine Learning: Defenses, Economic Impact, and Governance Evidence (Version 1). arXiv. https://doi.org/10.48550/ARXIV.2512.15780
Ben Mekhlouf, H., Moussaid, A., & Ghanimi, F. (2026). Adaptive Credit Card Fraud Detection: Reinforcement Learning Agents vs. Anomaly Detection Techniques. FinTech, 5(1), 9. https://doi.org/10.3390/fintech5010009
Chang, W., & Zhu, T. (2024). Gradient-based defense methods for data leakage in vertical federated learning. Computers & Security, 139, 103744. https://doi.org/10.1016/j.cose.2024.103744
Chelliah, P. R., Dutta, P. K., Kumar, A., Gonzalez, E. D. R. S., Mittal, M., & Gupta, S. (Eds.). (2025). Generative Artificial Intelligence in Finance: Large Language Models, Interfaces, and Industry Use Cases to Transform Accounting and Finance Processes (1st ed.). Wiley. https://doi.org/10.1002/9781394271078
Dimakunne, R. C., Adegede, J., Toriola, G. O., Ogunnubi, A. A., Naggayi, B. I., & Iledare, A. M. (2021). INTELLIGENT FRAUD DETECTION FRAMEWORKS FOR NEXT-GENERATION FINANCIAL SYSTEMS. INTERNATIONAL JOURNAL OF FINANCIAL DATA SCIENCE, 1(1), 1–32. https://doi.org/10.34218/IJFDS_01_01_001
Dupont, B., Fortin, F., & Leukfeldt, R. (2024). Broadening our understanding of cybercrime and its evolution. Journal of Crime and Justice, 47(4), 435–439. https://doi.org/10.1080/0735648X.2024.2323872
Dal Pozzolo, A., Caelen, O., Johnson, R. A., & Bontempi, G. (2015, December). Calibrating Probability with Undersampling for Unbalanced Classification. In SSCI (pp. 159-166). https://doi.org/10.1109/SSCI.2015.33
Eberle, W., Graves, J., & Holder, L. (2010). Insider threat detection using a graph-based approach. Journal of Applied Security Research, 6(1), 32-81. https://doi.org/10.1109/CATCH.2009.29
Faotu, H., Esite, T. J., & Ebikeme, B. T. (2025). SECURING FINTECH AND DIGITAL PAYMENTS: IDENTIFYING THREATS, MITIGATING VULNERABILITIES, AND STRENGTHENING DEFENSES. Journal of Science and Technology, 30(5), 57–72. https://doi.org/10.20428/jst.v30i5.2880
Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). EXPLAINING AND HARNESSING ADVERSARIAL EXAMPLES. stat, 1050, 20.
Khuwaja, P., Khowaja, S. A., & Dev, K. (2023). Adversarial Learning Networks for FinTech Applications Using Heterogeneous Data Sources. IEEE Internet of Things Journal, 10(3), 2194–2201. https://doi.org/10.1109/JIOT.2021.3100742
Malik, E. F., Khaw, K. W., Belaton, B., Wong, W. P., & Chew, X. (2022). Credit Card Fraud Detection Using a New Hybrid Machine Learning Architecture. Mathematics, 10(9), 1480. https://doi.org/10.3390/math10091480
Nelgiriyewithana, N. (n.d.). Credit card fraud detection dataset 2023. Kaggle. Retrieved April 27, 2026, from https://www.kaggle.com/datasets/nelgiriyewithana/credit-card-fraud-detection-dataset-2023
Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., & Swami, A. (2017, April). Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia conference on computer and communications security (pp. 506-519). https://doi.org/10.1145/3052973.3053009
Paramasivan, A. (2024). Robust and resilient: AI-based defense mechanisms in card transactions. IJLRP-International Journal of Leading Research Publication, 5(11), 1-10.
Sridhar, R., Dhenia, R. N. K., & Kanani, I. J. (2021). Dynamic Frameworks for Enhancing Security in Digital Payment Systems. International Journal of Emerging Research in Engineering and Technology, 2(2), 31-35. https://doi.org/10.63282/3050-922X.IJERET-V2I2P104
Salhi, A., Alshamrani, R., Althbiti, A., Ismail, A., Abd-ElRahman, M., & Hassan, B. M. (2025). Optimizing high dimensional data classification with a hybrid AI driven feature selection framework and machine learning schema. Scientific Reports, 15, 35038. https://doi.org/10.1038/s41598-025-08699-4
Shi, Y., Kotevska, O., Reshniak, V., Singh, A., & Raskar, R. (2024). Dealing doubt: Unveiling threat models in gradient inversion attacks under federated learning, a survey and taxonomy. arXiv preprint arXiv:2405.10376. https://doi.org/10.48550/arXiv.2405.10376
Sampathkumar, V., & Veeras, K. (2025). Adversarial Attacks on FinTech AI Models: Threats and Mitigation Techniques. 2025 IEEE International Carnahan Conference on Security Technology (ICCST), 1–7. https://doi.org/10.1109/ICCST63435.2025.11293895
Shannaq, B., Alabri, A., Sriram, V. P., & Ali, O. B. (2025). Investigating the impact of AI on the workforce and the future of work in the region: A machine learning perspective. Bangladesh Journal of Multidisciplinary Scientific Research, 10(4), 1-10. https://doi.org/10.46281/a7zcns96
Wang, G., Zhou, C., Wang, Y., Chen, B., Guo, H., & Yan, Q. (2023). Beyond boundaries: A comprehensive survey of transferable attacks on ai systems. arXiv preprint arXiv:2311.11796. https://arxiv.org/html/2311.11796v2
Zhang, C., Yu, S., Tian, Z., & Yu, J. J. Q. (2024). Generative Adversarial Networks: A Survey on Attack and Defense Perspective. ACM Computing Surveys, 56(4), 1–35. https://doi.org/10.1145/3615336