{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T10:20:10Z","timestamp":1769336410596,"version":"3.49.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032135124","type":"print"},{"value":"9783032135131","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13513-1_18","type":"book-chapter","created":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:37:00Z","timestamp":1769330220000},"page":"211-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Motifs for\u00a0Financial Networks: A Study on\u00a0Mercari, JPMC, and\u00a0Venmo Platforms"],"prefix":"10.1007","author":[{"given":"Penghang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bahadir","family":"Altun","sequence":"additional","affiliation":[]},{"given":"Rupam","family":"Acharyya","sequence":"additional","affiliation":[]},{"given":"Robert E.","family":"Tillman","sequence":"additional","affiliation":[]},{"given":"Shunya","family":"Kimura","sequence":"additional","affiliation":[]},{"given":"Naoki","family":"Masuda","sequence":"additional","affiliation":[]},{"given":"Ahmet Erdem","family":"Sar\u0131y\u00fcce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,26]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211\u2013230 (2003)","journal-title":"Soc. Netw."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Assefa, S.A., Dervovic, D., Mahfouz, M., Tillman, R.E., Reddy, P., Veloso, M.: Generating synthetic data in finance: opportunities, challenges and pitfalls. In: ICAIF (2020)","DOI":"10.2139\/ssrn.3634235"},{"issue":"5","key":"18_CR4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0019869","volume":"6","author":"P Bajardi","year":"2011","unstructured":"Bajardi, P., Barrat, A., Natale, F., Savini, L., Colizza, V.: Dynamical patterns of cattle trade movements. PLoS ONE 6(5), e19869 (2011)","journal-title":"PLoS ONE"},{"key":"18_CR5","unstructured":"Berriman, A.: Improve fraud protection using social network analytics (2022). https:\/\/community.fico.com\/s\/blog-post\/a5Q4w000000CvlJEAS\/fico3419. Accessed 6 Jan 2023"},{"key":"18_CR6","unstructured":"CCR: Center for Computational Research, University at Buffalo (2025). http:\/\/hdl.handle.net\/10477\/79221"},{"issue":"11","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1038\/nbt.1499","volume":"26","author":"G Chechik","year":"2008","unstructured":"Chechik, G., Oh, E., Rando, O., Weissman, J., Regev, A., Koller, D.: Activity motifs reveal principles of timing in transcriptional control of the yeast metabolic network. Nat. Biotechnol. 26(11), 1251\u20131259 (2008)","journal-title":"Nat. Biotechnol."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Faisal, F.E., Milenkovi\u0107, T.: Dynamic networks reveal key players in aging. Bioinformatics 30(12) (2014)","DOI":"10.1093\/bioinformatics\/btu089"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Grover, A., Leskovec, J.: Node2vec: Scalable feature learning for networks. In: KDD 2016, pp. 855\u2013864 (2016). https:\/\/doi.org\/10.1145\/2939672.2939754","DOI":"10.1145\/2939672.2939754"},{"issue":"12","key":"18_CR10","doi-asserted-by":"publisher","first-page":"i171","DOI":"10.1093\/bioinformatics\/btv227","volume":"31","author":"Y Hulovatyy","year":"2015","unstructured":"Hulovatyy, Y., Chen, H., Milenkovi\u0107, T.: Exploring the structure and function of temporal networks with dynamic graphlets. Bioinformatics 31(12), i171\u2013i180 (2015)","journal-title":"Bioinformatics"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard, P.: The distribution of the flora in the alpine zone.1. New Phytol. 11(2), 37\u201350 (1912)","journal-title":"New Phytol."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Jin, R., McCallen, S., Almaas, E.: Trend motif: a graph mining approach for analysis of dynamic complex networks. In: ICDM, pp. 541\u2013546 (2007)","DOI":"10.1109\/ICDM.2007.92"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Jurgens, D., Lu, T.C.: Temporal motifs reveal the dynamics of editor interactions in Wikipedia. In: ICWSM, vol. 6, pp. 162\u2013169 (2012)","DOI":"10.1609\/icwsm.v6i1.14239"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Kodate, S., Chiba, R., Kimura, S., Masuda, N.: Detecting problematic transactions in a consumer-to-consumer e-commerce network. Appl. Netw. Sci. 5(90) (2020)","DOI":"10.1007\/s41109-020-00330-x"},{"key":"18_CR15","unstructured":"Kosyfaki, C., Mamoulis, N., Pitoura, E., Tsaparas, P.: Flow motifs in interaction networks. In: EDBT 2019 (2019)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"P11005","DOI":"10.1088\/1742-5468\/2011\/11\/P11005","volume":"11","author":"L Kovanen","year":"2011","unstructured":"Kovanen, L., Karsai, M., Kaski, K., Kert\u00e9sz, J., Saram\u00e4ki, J.: Temporal motifs in time-dependent networks. J. Stat. Mech. 11, P11005 (2011)","journal-title":"J. Stat. Mech."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Kovanen, L., Kaski, K., Kert\u00e9sz, J., Saram\u00e4ki, J.: Temporal motifs reveal homophily, gender-specific patterns, and group talk in call sequences. PNAS 110(45) (2013)","DOI":"10.1073\/pnas.1307941110"},{"issue":"8","key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/16\/8\/083038","volume":"16","author":"MX Li","year":"2014","unstructured":"Li, M.X., et al.: Statistically validated mobile communication networks: the evolution of motifs in European and Chinese data. New J. Phys. 16(8), 083038 (2014). https:\/\/doi.org\/10.1088\/1367-2630\/16\/8\/083038","journal-title":"New J. Phys."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: FlowScope: spotting money laundering based on graphs. In: AAAI, vol.\u00a034 (2020)","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"18_CR20","unstructured":"Liu, P., et al.: Temporal motifs for financial networks: a study on Mercari, JPMC, and Venmo platforms (2023). https:\/\/arxiv.org\/abs\/2301.07791"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Liu, P., Guarrasi, V., Sariyuce, A.E.: Temporal network motifs: models, limitations, evaluation. IEEE Trans. Knowl. Data Eng. 35(1) (2023)","DOI":"10.1109\/TKDE.2021.3077495"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Liu, P., Masuda, N., Kito, T., Sar\u0131y\u00fcce, A.E.: Temporal motifs in patent opposition and collaboration networks. Sci. Rep. 12(1917) (2022)","DOI":"10.1038\/s41598-022-05217-8"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Yang, X., Zhou, J., Li, X., Song, L.: Heterogeneous graph neural networks for malicious account detection. In: CIKM, pp. 2077\u20132085 (2018)","DOI":"10.1145\/3269206.3272010"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D., Alon, U.: Network motifs: simple building blocks of complex networks. Science 298(5594) (2002)","DOI":"10.1126\/science.298.5594.824"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Paranjape, A., Benson, A.R., Leskovec, J.: Motifs in temporal networks. In: WSDM, pp. 601\u2013610. ACM (2017)","DOI":"10.1145\/3018661.3018731"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Pr\u017eulj, N.: Biological network comparison using graphlet degree distribution. Bioinformatics 23(2) (2007)","DOI":"10.1093\/bioinformatics\/btl301"},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.procs.2019.01.007","volume":"148","author":"I Sadgali","year":"2019","unstructured":"Sadgali, I., Sael, N., Benabbou, F.: Performance of machine learning techniques in the detection of financial frauds. Procedia Comput. Sci. 148, 45\u201354 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"18_CR28","unstructured":"Salmon, D.: Venmo Transaction Dataset. https:\/\/github.com\/sa7mon\/venmo-data (2021). Accessed Jan 2021"},{"key":"18_CR29","unstructured":"Savage, D., Wang, Q., Zhang, X., Chou, P., Yu, X.: Detection of money laundering groups: supervised learning on small networks. In: Workshops at the Thirty-First AAAI Conference on Artificial Intelligence (2017)"},{"issue":"4","key":"18_CR30","first-page":"413","volume":"8","author":"C Song","year":"2014","unstructured":"Song, C., Ge, T., Chen, C., Wang, J.: Event pattern matching over graph streams. PVLDB 8(4), 413\u2013424 (2014)","journal-title":"PVLDB"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: WWW 2015, pp. 1067\u20131077 (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Van\u00a0Vlasselaer, V., Eliassi-Rad, T., Akoglu, L., Snoeck, M., Baesens, B.: GOTCHA! Network-based fraud detection for social security fraud. Manag. Sci. 63(9) (2017)","DOI":"10.1287\/mnsc.2016.2489"},{"key":"18_CR33","unstructured":"Venmo: 2023 tax FAQ (2023). https:\/\/help.venmo.com\/hc\/en-us\/articles\/4407389460499-2023-Tax-FAQ. Accessed 6 Jan 2023"},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West, J., Bhattacharya, M.: Intelligent financial fraud detection: a comprehensive review. Comput. Secur. 57, 47\u201366 (2016)","journal-title":"Comput. Secur."},{"issue":"5","key":"18_CR35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.91.052813","volume":"91","author":"Q Xuan","year":"2015","unstructured":"Xuan, Q., Fang, H., Fu, C., Filkov, V.: Temporal motifs reveal collaboration patterns in online task-oriented networks. Phys. Rev. E 91(5), 052813 (2015)","journal-title":"Phys. Rev. E"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: NetWalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: SIGKDD, pp. 2672\u20132681 (2018)","DOI":"10.1145\/3219819.3220024"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, X., Tang, S., Zhao, Y., Wang, G., Zheng, H., Zhao, B.: Cold hard e-cash: friends and vendors in the Venmo digital payments system. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a011, pp. 387\u2013396 (2017)","DOI":"10.1609\/icwsm.v11i1.14873"},{"issue":"2","key":"18_CR38","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TSMC.2014.2360505","volume":"45","author":"YQ Zhang","year":"2015","unstructured":"Zhang, Y.Q., Li, X., Xu, J., Vasilakos, A.V.: Human interactive patterns in temporal networks. IEEE Trans. Syst. Man Cybern. Syst. 45(2), 214\u2013222 (2015)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Tian, Y., He, Q., Oliver, N., Jin, R., Lee, W.C.: Communication motifs: a tool to characterize social communications. In: CIKM, pp. 1645\u20131648 (2010)","DOI":"10.1145\/1871437.1871694"}],"container-title":["Lecture Notes in Computer Science","Social Networks Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13513-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:37:04Z","timestamp":1769330224000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13513-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032135124","9783032135131"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13513-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"26 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASONAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Social Networks Analysis and Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":", ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asonam-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asonam.cpsc.ucalgary.ca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}