{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:15Z","timestamp":1775745795539,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030968953","type":"print"},{"value":"9783030968960","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96896-0_20","type":"book-chapter","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T12:16:52Z","timestamp":1657196212000},"page":"455-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Federated Learning for Collaborative Financial Crimes Detection"],"prefix":"10.1007","author":[{"given":"Toyotaro","family":"Suzumura","sequence":"first","affiliation":[]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ryo","family":"Kawahara","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Baracaldo","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Ludwig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"20_CR1","unstructured":"2019 global AML and financial crime techsprint (2019). https:\/\/www.fca.org.uk\/events\/techsprints\/2019-global-aml-and-financial-crime-techsprint"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626\u2013688","journal-title":"Data Min Knowl Discov"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Alexandre C (2018) A multi-agent system based approach to fight financial fraud: an application to money laundering. ArXiv","DOI":"10.20944\/preprints201801.0193.v1"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","volume":"57","author":"Z Chen","year":"2018","unstructured":"Chen Z, Van Khoa LD, Teoh EN, Nazir A, Karuppiah E, Lam KS (2018) Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowl Inf Syst 57:245\u2013285","journal-title":"Knowl Inf Syst"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"AF Colladon","year":"2017","unstructured":"Colladon AF, Remondi E (2017) Using social network analysis to prevent money laundering. Expert Syst Appl 67:49\u201358","journal-title":"Expert Syst Appl"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Han J, Barman U, Hayes J, Du J, Burgin E, Wan D (2018) NextGen AML: distributed deep learning based language technologies to augment anti money laundering investigation. In: Proceedings of ACL 2018, system demonstrations. Association for Computational Linguistics, pp 37\u201342","DOI":"10.18653\/v1\/P18-4007"},{"key":"20_CR7","unstructured":"Hanai M, Suzumura T, Tan WJ, Liu ES, Theodoropoulos G, Cai W (2019) Distributed edge partitioning for trillion-edge graphs. CoRR abs\/1908.05855, http:\/\/arxiv.org\/abs\/1908.05855, 1908.05855"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Jamshidi MB, Gorjiankhanzad M, Lalbakhsh A, Roshani S (2019) A novel multiobjective approach for detecting money laundering with a neuro-fuzzy technique. In: 2019 IEEE 16th international conference on networking, sensing and control (ICNSC), pp 454\u2013458. https:\/\/doi.org\/10.1109\/ICNSC.2019.8743234","DOI":"10.1109\/ICNSC.2019.8743234"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.neucom.2019.01.106","volume":"339","author":"W Liu","year":"2019","unstructured":"Liu W, Liu Z, Yu F, Chen P, Suzumura T, Hu G (2019) A scalable attribute-aware network embedding system. Neurocomputing 339:279\u2013291","journal-title":"Neurocomputing"},{"key":"20_CR10","unstructured":"Ludwig H, Baracaldo N, Thomas G, Zhou Y, Anwar A, Rajamoni S, Ong Y, Radhakrishnan J, Verma A, Sinn M, Purcell M, Rawat A, Minh T, Holohan N, Chakraborty S, Whitherspoon S, Steuer D, Wynter L, Hassan H, Laguna S, Yurochkin M, Agarwal M, Chuba E, Abay A (2020) IBM federated learning: an enterprise framework white paper v0.1. 2007.10987"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Molloy I, Chari S, Finkler U, Wiggerman M, Jonker C, Habeck T, Park Y, Jordens F, Schaik R (2016) Graph analytics for real-time scoring of cross-channel transactional fraud","DOI":"10.1007\/978-3-662-54970-4_2"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Nayak K, Wang XS, Ioannidis S, Weinsberg U, Taft N, Shi E (2015) GraphSC: parallel secure computation made easy. In: 2015 IEEE symposium on security and privacy, pp 377\u2013394. https:\/\/doi.org\/10.1109\/SP.2015.30","DOI":"10.1109\/SP.2015.30"},{"key":"20_CR13","unstructured":"Page L, Brin S, Motwani R, Winograd T (1999) The PageRank citation ranking: bringing order to the web. Technical Report 1999-66, Stanford InfoLab. http:\/\/ilpubs.stanford.edu:8090\/422\/, previous number = SIDL-WP-1999-0120"},{"key":"20_CR14","unstructured":"Savage D, Wang Q, Chou PL, Zhang X, Yu X (2016) Detection of money laundering groups using supervised learning in networks. ArXiv abs\/1608.00708"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Truex S, Baracaldo N, Anwar A, Steinke T, Ludwig H, Zhang R (2018) A hybrid approach to privacy-preserving federated learning","DOI":"10.1145\/3338501.3357370"},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s41019-016-0024-y","volume":"2","author":"K Ueno","year":"2017","unstructured":"Ueno K, Suzumura T, Maruyama N, Fujisawa K, Matsuoka S (2017) Efficient breadth-first search on massively parallel and distributed-memory machines. Data Sci Eng 2(1):22\u201335. https:\/\/doi.org\/10.1007\/s41019-016-0024-y","journal-title":"Data Sci Eng"},{"key":"20_CR17","unstructured":"Weber M, Chen J, Suzumura T, Pareja A, Ma T, Kanezashi H, Kaler T, Leiserson CE, Schardl TB (2018) Scalable graph learning for anti-money laundering: a first look. CoRR abs\/1812.00076, http:\/\/arxiv.org\/abs\/1812.00076, 1812.00076"}],"container-title":["Federated Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96896-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T12:30:29Z","timestamp":1657197029000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96896-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030968953","9783030968960"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96896-0_20","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}