Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Olivier Caelen is active.

Publication


Featured researches published by Olivier Caelen.


Expert Systems With Applications | 2014

Learned lessons in credit card fraud detection from a practitioner perspective

Andrea Dal Pozzolo; Olivier Caelen; Yann-Aël Le Borgne; Serge Waterschoot; Gianluca Bontempi

Abstract Billions of dollars of loss are caused every year due to fraudulent credit card transactions. The design of efficient fraud detection algorithms is key for reducing these losses, and more algorithms rely on advanced machine learning techniques to assist fraud investigators. The design of fraud detection algorithms is however particularly challenging due to non-stationary distribution of the data, highly imbalanced classes distributions and continuous streams of transactions. At the same time public data are scarcely available for confidentiality issues, leaving unanswered many questions about which is the best strategy to deal with them. In this paper we provide some answers from the practitioner’s perspective by focusing on three crucial issues: unbalancedness, non-stationarity and assessment. The analysis is made possible by a real credit card dataset provided by our industrial partner.


intelligent data engineering and automated learning | 2013

Racing for Unbalanced Methods Selection

Andrea Dal Pozzolo; Olivier Caelen; Serge Waterschoot; Gianluca Bontempi

State-of-the-art classification algorithms suffer when the data is skewed towards one class. This led to the development of a number of techniques to cope with unbalanced data. However, as confirmed by our experimental comparison, no technique appears to work consistently better in all conditions. We propose to use a racing method to select adaptively the most appropriate strategy for a given unbalanced task. The results show that racing is able to adapt the choice of the strategy to the specific nature of the unbalanced problem and to select rapidly the most appropriate strategy without compromising the accuracy.


european conference on machine learning | 2015

When is undersampling effective in unbalanced classification tasks

Andrea Dal Pozzolo; Olivier Caelen; Gianluca Bontempi

A well-known rule of thumb in unbalanced classification recommends the rebalancing (typically by resampling) of the classes before proceeding with the learning of the classifier. Though this seems to work for the majority of cases, no detailed analysis exists about the impact of undersampling on the accuracy of the final classifier. This paper aims to fill this gap by proposing an integrated analysis of the two elements which have the largest impact on the effectiveness of an undersampling strategy: the increase of the variance due to the reduction of the number of samples and the warping of the posterior distribution due to the change of priori probabilities. In particular we will propose a theoretical analysis specifying under which conditions undersampling is recommended and expected to be effective. It emerges that the impact of undersampling depends on the number of samples, the variance of the classifier, the degree of imbalance and more specifically on the value of the posterior probability. This makes difficult to predict the average effectiveness of an undersampling strategy since its benefits depend on the distribution of the testing points. Results from several synthetic and real-world unbalanced datasets support and validate our findings.


learning and intelligent optimization | 2008

Improving the Exploration Strategy in Bandit Algorithms

Olivier Caelen; Gianluca Bontempi

The K-armed bandit problem is a formalization of the explorationversus exploitation dilemma, a well-known issue in stochasticoptimization tasks. In a K-armed bandit problem, a player isconfronted with a gambling machine with K arms where each arm isassociated to an unknown gain distribution and the goal is tomaximize the sum of the rewards (or minimize the sum of losses).Several approaches have been proposed in literature to deal withthe K-armed bandit problem. Most of them combine a greedyexploitation strategy with a random exploratory phase. This paperfocuses on the improvement of the exploration step by havingrecourse to the notion of probability of correct selection (PCS), awell-known notion in the simulation literature yet overlooked inthe optimization domain. The rationale of our approach is toperform at each exploration step the arm sampling which maximizesthe probability of selecting the optimal arm (i.e. the PCS) at thefollowing step. This strategy is implemented by a bandit algorithm,called e-PCSgreedy, which integrates the PCS explorationapproach with the classical e-greedy schema. A set ofnumerical experiments on artificial and real datasets shows that amore effective exploration may improve the performance of theentire bandit strategy.


Information Fusion | 2018

SCARFF: a Scalable Framework for Streaming Credit Card Fraud Detection with Spark

Fabrizio Carcillo; Andrea Dal Pozzolo; Yann-Aël Le Borgne; Olivier Caelen; Yannis Mazzer; Gianluca Bontempi

The expansion of the electronic commerce, together with an increasing confidence of customers in electronic payments, makes of fraud detection a critical factor. Detecting frauds in (nearly) real time setting demands the design and the implementation of scalable learning techniques able to ingest and analyse massive amounts of streaming data. Recent advances in analytics and the availability of open source solutions for Big Data storage and processing open new perspectives to the fraud detection field. In this paper we present a SCAlable Real-time Fraud Finder (SCARFF) which integrates Big Data tools (Kafka, Spark and Cassandra) with a machine learning approach which deals with imbalance, nonstationarity and feedback latency. Experimental results on a massive dataset of real credit card transactions show that this framework is scalable, efficient and accurate over a big stream of transactions.


international symposium on neural networks | 2014

Using HDDT to avoid instances propagation in unbalanced and evolving data streams

Andrea Dal Pozzolo; Reid A. Johnson; Olivier Caelen; Serge Waterschoot; Nitesh V. Chawla; Gianluca Bontempi

Hellinger Distance Decision Trees [10] (HDDT) has been previously used for static datasets with skewed distributions. In unbalanced data streams, state-of-the-art techniques use instance propagation and standard decision trees (e.g. C4.5 [27]) to cope with the unbalanced problem. However it is not always possible to revisit/store old instances of a stream. In this paper we show how HDDT can be successfully applied in unbalanced and evolving stream data. Using HDDT allows us to remove instance propagations between batches with several benefits: i) improved predictive accuracy ii) speed iii) single-pass through the data. We use a Hellinger weighted ensemble of HDDTs to combat concept drift and increase accuracy of single classifiers. We test our framework on several streaming datasets with unbalanced classes and concept drift.


IEEE Transactions on Neural Networks | 2018

Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy

Andrea Dal Pozzolo; Giacomo Boracchi; Olivier Caelen; Cesare Alippi; Gianluca Bontempi

Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers’ habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.


Expert Systems With Applications | 2018

Sequence Classification for Credit-Card Fraud Detection

Johannes Jurgovsky; Michael Granitzer; Konstantin Ziegler; Sylvie Calabretto; Pierre-Edouard Portier; Liyun He-Guelton; Olivier Caelen

Abstract Due to the growing volume of electronic payments, the monetary strain of credit-card fraud is turning into a substantial challenge for financial institutions and service providers, thus forcing them to continuously improve their fraud detection systems. However, modern data-driven and learning-based methods, despite their popularity in other domains, only slowly find their way into business applications. In this paper, we phrase the fraud detection problem as a sequence classification task and employ Long Short-Term Memory (LSTM) networks to incorporate transaction sequences. We also integrate state-of-the-art feature aggregation strategies and report our results by means of traditional retrieval metrics. A comparison to a baseline random forest (RF) classifier showed that the LSTM improves detection accuracy on offline transactions where the card-holder is physically present at a merchant. Both the sequential and non-sequential learning approaches benefit strongly from manual feature aggregation strategies. A subsequent analysis of true positives revealed that both approaches tend to detect different frauds, which suggests a combination of the two. We conclude our study with a discussion on both practical and scientific challenges that remain unsolved.


Annals of Mathematics and Artificial Intelligence | 2010

A dynamic programming strategy to balance exploration and exploitation in the bandit problem

Olivier Caelen; Gianluca Bontempi

The K-armed bandit problem is a well-known formalization of the exploration versus exploitation dilemma. In this learning problem, a player is confronted to a gambling machine with K arms where each arm is associated to an unknown gain distribution. The goal of the player is to maximize the sum of the rewards. Several approaches have been proposed in literature to deal with the K-armed bandit problem. This paper introduces first the concept of “expected reward of greedy actions” which is based on the notion of probability of correct selection (PCS), well-known in simulation literature. This concept is then used in an original semi-uniform algorithm which relies on the dynamic programming framework and on estimation techniques to optimally balance exploration and exploitation. Experiments with a set of simulated and realistic bandit problems show that the new DP-greedy algorithm is competitive with state-of-the-art semi-uniform techniques.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2017

Injecting Semantic Background Knowledge into Neural Networks using Graph Embeddings

Konstantin Ziegler; Olivier Caelen; Mathieu Garchery; Michael Granitzer; Liyun He-Guelton; Johannes Jurgovsky; Pierre-Edouard Portier; Stefan Zwicklbauer

The inferences of a machine learning algorithm are naturally limited by the available data. In many real-world applications, the provided internal data is domain-specific and we use external background knowledge to derive or add new features. Semantic networks, like linked open data, provide a largely unused treasure trove of background knowledge. This drives a recent surge of interest in unsupervised methods to automatically extract such semantic background knowledge and inject it into machine learning algorithms. In this work, we describe the general process of extracting knowledge from semantic networks through vector space embeddings. The locations in the vector space then reflect relations in the original semantic network. We perform this extraction for geographic background knowledge and inject it into a neural network for the complicated real-world task of credit-card fraud detection. This improves the performance by 11.2%.

Collaboration


Dive into the Olivier Caelen's collaboration.

Top Co-Authors

Avatar

Gianluca Bontempi

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Andrea Dal Pozzolo

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Luc Barvais

Free University of Brussels

View shared research outputs
Top Co-Authors

Avatar

Yann-Aël Le Borgne

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Christine Leignel

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Eléonore Wolff

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Emilie Hanson

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Fabrizio Carcillo

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Nadine Warzée

Université libre de Bruxelles

View shared research outputs
Researchain Logo
Decentralizing Knowledge