QUANTIFYING THE VULNERABILITY OF  CREDIT CARD FRAUD DETECTION SYSTEMS TO GRADIENT BASED ADVERSARIAL EVASION

Main Article Content

Nabil El Kadhi
Marwan Alshar’e
Rifat O. Shannak
Nour Eldin Elshaiekh Osman
Basel Bani-Ismail

Abstract

In financial cybersecurity, fraud detection is at the forefront of the battle against cybercriminals and deep learning models are the state-of-the-art method for real-time detection; yet their reliance on fixed feature distributions renders them inherently susceptible to adversarial attacks. With the rise of generative artificial intelligence (AI) in obfuscating fraudulent transactions, conventional performance indicators (accuracy and F1-score) do not reflect the cybersecurity resilience of these models. This research explores the  Credit Card Fraud Detection dataset, comprising more than 550,000 anonymized records. The study uses a functional deep learning model as a benchmark and introduces the Fast Gradient Method (FGM) to simulate white box attacks on the latent features . The experiment results demonstrate a high detection accuracy of 99.85% under normal operating conditions, which dramatically reduces to 92.75% when card transactions are slightly modified by adversarial disturbances at an epsilon  value of 0.1. Numerical evidence reveals a clear 7.10% "Security Gap," depicting a substantial degree of vulnerability, where transactions are mathematically reclassified from fraudulent to legitimate. Notably, our research suggests a non-linear "safety cliff" in the decrease of detection accuracy, where the model's reliability completely fails as the adversarial strength reaches 0.15 or higher. In addition, Principal Component Analysis demonstrates that gradient attacks have successfully distorted the latent features of fraudulent transactions, resulting in the movement of highly suspicious transactions towards the concentrated area of legitimate transactions, hence evading automated security screening while preserving the overall statistical distribution of the data.


JEL Classification Codes: G21, K42, O33, C45.

Downloads

Download data is not yet available.

Article Details

Section

Research Paper/Theoretical Paper/Review Paper/Short Communication Paper

Author Biographies

Nabil El Kadhi , Associate Professor, VPAA and Computer Science Department, Applied Science University, Manama, Bahrain

Nabil El Kadhi is an accomplished academic and leader in higher education, currently serving as Associate Professor and Vice President for Academic Affairs (VPAA) at Applied Science University in Manama, Bahrain. With a strong background in Computer Science, he also contributes actively to the university as a member of the Computer Science Department. Dr. El Kadhi is recognized for his commitment to academic excellence, curriculum development, and the advancement of innovative teaching and research practices.

Throughout his career, he has played a key role in shaping academic policies, enhancing program quality, and fostering an environment that supports student success and faculty development. His research interests span areas within computer science, reflecting both theoretical depth and practical relevance. In his leadership capacity, he works closely with faculty and administration to drive institutional growth, accreditation efforts, and international collaboration.

Dr. El Kadhi is widely respected for his strategic vision, dedication to education, and contributions to the academic community in Bahrain and beyond.

Marwan Alshar’e , Associate Professor, Faculty of Computing and IT, Sohar University, Sohar, Sultanate of Oman

Marwan Alshar’e is an Associate Professor in the Faculty of Computing and Information Technology at Sohar University, Sultanate of Oman. He is a dedicated academic with a strong background in computing and IT, contributing significantly to teaching, research, and academic development within his institution.

Dr. Alshar’e’s expertise spans key areas of computer science and information technology, where he is actively involved in delivering high-quality education and mentoring students at both undergraduate and postgraduate levels. He is committed to fostering innovation, critical thinking, and practical skills that prepare students for the evolving demands of the technology sector.

In addition to his teaching responsibilities, he engages in research activities addressing contemporary challenges in computing and digital transformation. He also contributes to curriculum development, quality assurance processes, and academic initiatives aimed at enhancing program effectiveness and institutional excellence.

Recognized for his professionalism and academic commitment, Dr. Alshar’e continues to play an important role in advancing computing education and research at Sohar University and in the wider academic community.

Rifat O. Shannak , Professor, Business School, Jordan University, Amman, Jordan

Rifat O. Shannak is a Professor at the Business School of the University of Jordan in Amman, Jordan. He is a distinguished academic with extensive experience in business and management education, known for his contributions to teaching, research, and academic leadership.

Professor Shannak’s expertise lies in key areas of business studies, where he has been actively involved in developing curricula, supervising graduate research, and advancing scholarly work. His research interests address contemporary issues in management and organizational practices, contributing to both academic knowledge and practical applications in the business field.

Throughout his career, he has played an important role in mentoring students and supporting faculty development, fostering an environment of academic rigor and innovation. In addition to his teaching and research responsibilities, he has been engaged in various institutional and professional activities, helping to strengthen academic programs and promote collaboration within the university and beyond.

Respected for his dedication and professionalism, Professor Shannak continues to make valuable contributions to the academic community in Jordan and the wider region.

Nour Eldin Elshaiekh Osman , Assistant Professor, Sultan Qaboos University, College of Arts and Social Sciences, Department of Information Studies, Sultanate of Oman

Nour Eldin Elshaiekh Osman is an Assistant Professor in the Department of Information Studies at the College of Arts and Social Sciences, Sultan Qaboos University, Sultanate of Oman. His academic work focuses on information science, with particular interests in areas such as information management, knowledge organization, digital libraries, and emerging information technologies.

Dr. Osman is engaged in teaching and research that explore the evolving role of information systems in supporting education, research, and societal development. He has contributed to scholarly publications and academic initiatives that address contemporary challenges in information access, organization, and dissemination.

At Sultan Qaboos University, he is actively involved in curriculum development, student mentorship, and interdisciplinary collaboration, aiming to advance the field of information studies in both regional and global contexts.

Basel Bani-Ismail , Assistant Professor, Department of Software Engineering, Faculty of Information Technology, Applied Science Private University, Amman, Jordan

Basel Bani-Ismail is an Assistant Professor in the Department of Software Engineering at the Faculty of Information Technology, Applied Science Private University in Amman, Jordan. His academic and research interests lie in software engineering, with a focus on areas such as software design and development, system architecture, and emerging computing technologies.

Dr. Bani-Ismail is committed to excellence in teaching and actively contributes to the development of innovative curricula that align with current industry needs and technological advancements. His research explores contemporary challenges in software engineering, aiming to enhance the efficiency, reliability, and scalability of software systems.

In addition to his teaching and research roles, he participates in academic and professional activities that support student development, interdisciplinary collaboration, and the advancement of information technology education in the region and beyond.

How to Cite

Kadhi , N. E. ., Alshar’e , M. ., Shannak , R. O. ., Osman , N. E. E. ., & Bani-Ismail , B. . (2026). QUANTIFYING THE VULNERABILITY OF  CREDIT CARD FRAUD DETECTION SYSTEMS TO GRADIENT BASED ADVERSARIAL EVASION. Bangladesh Journal of Multidisciplinary Scientific Research, 11(2), 137-144. https://doi.org/10.46281/bjmsr.v11i2.2861

References

Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016

Aljaradat, A., Sarkar, G., & Shukla, S. K. (2024). Modelling cybersecurity impacts on digital payment adoption: A game theoretic approach. Journal of Economic Criminology, 5, 100089. https://doi.org/10.1016/j.jeconc.2024.100089

Alwanin, R., Ismail, M. M. B., & Bchir, O. (2025). Customs fraud detection using a gradient boosting approach for joint classification and risk estimation. Scientific Reports, 16, 3432. https://doi.org/10.1038/s41598-025-33382-z

Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., Anderson, H., Roff, H., Allen, G. C., Steinhardt, J., Flynn, C., hÉigeartaigh, S. Ó., Beard, S., Belfield, H., Farquhar, S., & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. https://doi.org/10.48550/arXiv.1802.07228

Bailo, P., Sirignano, A., Nittari, G., Visconti, G., Pesel, G., Spasari, T., & Ricci, G. (2026). A Review of Crime at Machine Speed: Criminological Aspects of Artificial Intelligence’s Industrialisation of Deception. Sci, 8(3), 54. https://doi.org/10.3390/sci8030054

Bartholomew, D. C., Iwu, H. C., & Ibemere, I. P. (2025). A deep recurrent neural network approach to inflation forecasting in Nigeria: Evaluating the impact of feature selection methods. Franklin Open, 13, 100443. https://doi.org/10.1016/j.fraope.2025.100443

Baviskar, S. (2025). Adversarial Robustness in Financial Machine Learning: Defenses, Economic Impact, and Governance Evidence (Version 1). arXiv. https://doi.org/10.48550/ARXIV.2512.15780

Ben Mekhlouf, H., Moussaid, A., & Ghanimi, F. (2026). Adaptive Credit Card Fraud Detection: Reinforcement Learning Agents vs. Anomaly Detection Techniques. FinTech, 5(1), 9. https://doi.org/10.3390/fintech5010009

Chang, W., & Zhu, T. (2024). Gradient-based defense methods for data leakage in vertical federated learning. Computers & Security, 139, 103744. https://doi.org/10.1016/j.cose.2024.103744

Chelliah, P. R., Dutta, P. K., Kumar, A., Gonzalez, E. D. R. S., Mittal, M., & Gupta, S. (Eds.). (2025). Generative Artificial Intelligence in Finance: Large Language Models, Interfaces, and Industry Use Cases to Transform Accounting and Finance Processes (1st ed.). Wiley. https://doi.org/10.1002/9781394271078

Dimakunne, R. C., Adegede, J., Toriola, G. O., Ogunnubi, A. A., Naggayi, B. I., & Iledare, A. M. (2021). INTELLIGENT FRAUD DETECTION FRAMEWORKS FOR NEXT-GENERATION FINANCIAL SYSTEMS. INTERNATIONAL JOURNAL OF FINANCIAL DATA SCIENCE, 1(1), 1–32. https://doi.org/10.34218/IJFDS_01_01_001

Dupont, B., Fortin, F., & Leukfeldt, R. (2024). Broadening our understanding of cybercrime and its evolution. Journal of Crime and Justice, 47(4), 435–439. https://doi.org/10.1080/0735648X.2024.2323872

Dal Pozzolo, A., Caelen, O., Johnson, R. A., & Bontempi, G. (2015, December). Calibrating Probability with Undersampling for Unbalanced Classification. In SSCI (pp. 159-166). https://doi.org/10.1109/SSCI.2015.33

Eberle, W., Graves, J., & Holder, L. (2010). Insider threat detection using a graph-based approach. Journal of Applied Security Research, 6(1), 32-81. https://doi.org/10.1109/CATCH.2009.29

Faotu, H., Esite, T. J., & Ebikeme, B. T. (2025). SECURING FINTECH AND DIGITAL PAYMENTS: IDENTIFYING THREATS, MITIGATING VULNERABILITIES, AND STRENGTHENING DEFENSES. Journal of Science and Technology, 30(5), 57–72. https://doi.org/10.20428/jst.v30i5.2880

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). EXPLAINING AND HARNESSING ADVERSARIAL EXAMPLES. stat, 1050, 20.

Khuwaja, P., Khowaja, S. A., & Dev, K. (2023). Adversarial Learning Networks for FinTech Applications Using Heterogeneous Data Sources. IEEE Internet of Things Journal, 10(3), 2194–2201. https://doi.org/10.1109/JIOT.2021.3100742

Malik, E. F., Khaw, K. W., Belaton, B., Wong, W. P., & Chew, X. (2022). Credit Card Fraud Detection Using a New Hybrid Machine Learning Architecture. Mathematics, 10(9), 1480. https://doi.org/10.3390/math10091480

Nelgiriyewithana, N. (n.d.). Credit card fraud detection dataset 2023. Kaggle. Retrieved April 27, 2026, from https://www.kaggle.com/datasets/nelgiriyewithana/credit-card-fraud-detection-dataset-2023

Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., & Swami, A. (2017, April). Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia conference on computer and communications security (pp. 506-519). https://doi.org/10.1145/3052973.3053009

Paramasivan, A. (2024). Robust and resilient: AI-based defense mechanisms in card transactions. IJLRP-International Journal of Leading Research Publication, 5(11), 1-10.

Sridhar, R., Dhenia, R. N. K., & Kanani, I. J. (2021). Dynamic Frameworks for Enhancing Security in Digital Payment Systems. International Journal of Emerging Research in Engineering and Technology, 2(2), 31-35. https://doi.org/10.63282/3050-922X.IJERET-V2I2P104

Salhi, A., Alshamrani, R., Althbiti, A., Ismail, A., Abd-ElRahman, M., & Hassan, B. M. (2025). Optimizing high dimensional data classification with a hybrid AI driven feature selection framework and machine learning schema. Scientific Reports, 15, 35038. https://doi.org/10.1038/s41598-025-08699-4

Shi, Y., Kotevska, O., Reshniak, V., Singh, A., & Raskar, R. (2024). Dealing doubt: Unveiling threat models in gradient inversion attacks under federated learning, a survey and taxonomy. arXiv preprint arXiv:2405.10376. https://doi.org/10.48550/arXiv.2405.10376

Sampathkumar, V., & Veeras, K. (2025). Adversarial Attacks on FinTech AI Models: Threats and Mitigation Techniques. 2025 IEEE International Carnahan Conference on Security Technology (ICCST), 1–7. https://doi.org/10.1109/ICCST63435.2025.11293895

Shannaq, B., Alabri, A., Sriram, V. P., & Ali, O. B. (2025). Investigating the impact of AI on the workforce and the future of work in the region: A machine learning perspective. Bangladesh Journal of Multidisciplinary Scientific Research, 10(4), 1-10. https://doi.org/10.46281/a7zcns96

Wang, G., Zhou, C., Wang, Y., Chen, B., Guo, H., & Yan, Q. (2023). Beyond boundaries: A comprehensive survey of transferable attacks on ai systems. arXiv preprint arXiv:2311.11796. https://arxiv.org/html/2311.11796v2

Zhang, C., Yu, S., Tian, Z., & Yu, J. J. Q. (2024). Generative Adversarial Networks: A Survey on Attack and Defense Perspective. ACM Computing Surveys, 56(4), 1–35. https://doi.org/10.1145/3615336

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)