{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:31:46Z","timestamp":1764937906236,"version":"build-2065373602"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T00:00:00Z","timestamp":1749859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T00:00:00Z","timestamp":1749859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10115-025-02494-3","type":"journal-article","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T06:02:00Z","timestamp":1749880920000},"page":"9027-9050","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LG-VGAE: a local and global collaborative variational graph autoencoder for detecting crypto money laundering"],"prefix":"10.1007","volume":"67","author":[{"given":"Yifan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhiyuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hafeez Ullah","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"2494_CR1","doi-asserted-by":"crossref","unstructured":"Akiba T, Sano S, Yanase T, et\u00a0al (2019) Optuna: A next-generation hyperparameter optimization framework. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","DOI":"10.1145\/3292500.3330701"},{"key":"2494_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-022-10904-8","author":"I Alarab","year":"2022","unstructured":"Alarab I, Prakoonwit S (2022) Graph-Based LSTM for Anti-money Laundering: Experimenting Temporal Graph Convolutional Network with Bitcoin Data. Neural Processing Letters. https:\/\/doi.org\/10.1007\/s11063-022-10904-8","journal-title":"Neural Processing Letters"},{"key":"2494_CR3","doi-asserted-by":"publisher","unstructured":"Alarab I, Prakoonwit S, Nacer MI (2020) Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 2020 5th International Conference on Machine Learning Technologies. Association for Computing Machinery, New York, NY, USA, ICMLT \u201920, p 23-27, doi: https:\/\/doi.org\/10.1145\/3409073.3409080,","DOI":"10.1145\/3409073.3409080,"},{"key":"2494_CR4","doi-asserted-by":"publisher","unstructured":"Boashash B (1992) Estimating and interpreting the instantaneous frequency of a signal. i. fundamentals. Proceedings of the IEEE 80(4):520\u2013538. doi: https:\/\/doi.org\/10.1109\/5.135376","DOI":"10.1109\/5.135376"},{"key":"2494_CR5","doi-asserted-by":"publisher","unstructured":"Chen L, Peng J, Liu Y, et\u00a0al (2020) Phishing scams detection in ethereum transaction network. ACM Trans Internet Technol 21(1). doi: https:\/\/doi.org\/10.1145\/3398071,","DOI":"10.1145\/3398071,"},{"key":"2494_CR6","doi-asserted-by":"publisher","unstructured":"Chen Y, Chen Z, Amin HU (2023) Synergistic similarity graph construction (ssgc) for steel plate fault diagnosis with graph attention networks. In: 2023 IEEE 6th International Conference on Knowledge Innovation and Invention (ICKII), pp 655\u2013660, doi: https:\/\/doi.org\/10.1109\/ICKII58656.2023.10332743","DOI":"10.1109\/ICKII58656.2023.10332743"},{"key":"2494_CR7","unstructured":"Chen YT, Mathe J (2011) Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring. World conference on soft computing"},{"key":"2494_CR8","doi-asserted-by":"publisher","unstructured":"Chen Z, Dinh Van\u00a0Khoa L, Nazir A, et\u00a0al (2014) Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti-money laundering. In: 2014 IEEE Conference on Open Systems (ICOS), pp 145\u2013149, doi: https:\/\/doi.org\/10.1109\/ICOS.2014.7042645","DOI":"10.1109\/ICOS.2014.7042645"},{"issue":"2","key":"2494_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","volume":"57","author":"Z Chen","year":"2018","unstructured":"Chen Z, Van Khoa LD, Teoh EN et al (2018) Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review. Knowledge and Information Systems 57(2):245\u2013285. https:\/\/doi.org\/10.1007\/s10115-017-1144-z","journal-title":"Knowledge and Information Systems"},{"key":"2494_CR10","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TMM.2023.3263078","volume":"26","author":"B Ding","year":"2024","unstructured":"Ding B, Zhang R, Xu L et al (2024) U2d2net: Unsupervised unified image dehazing and denoising network for single hazy image enhancement. IEEE Transactions on Multimedia 26:202\u2013217. https:\/\/doi.org\/10.1109\/TMM.2023.3263078","journal-title":"IEEE Transactions on Multimedia"},{"issue":"5","key":"2494_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.30525\/2256-0742\/2018-4-5-75-81","volume":"4","author":"V Dyntu","year":"2018","unstructured":"Dyntu V, Dykyi O (2018) CRYPTOCURRENCY IN THE SYSTEM OF MONEY LAUNDERING. Baltic Journal of Economic Studies 4(5):75\u201381. https:\/\/doi.org\/10.30525\/2256-0742\/2018-4-5-75-81","journal-title":"Baltic Journal of Economic Studies"},{"key":"2494_CR12","unstructured":"Elliptic (2019) Elliptic Data Set for Anti-Money Laundering in Bitcoin. https:\/\/www.elliptic.co\/media-center\/elliptic-releases-bitcoin-transactions-data"},{"issue":"5","key":"2494_CR13","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TKDE.2020.3008732","volume":"34","author":"W Fan","year":"2022","unstructured":"Fan W, Ma Y, Li Q et al (2022) A graph neural network framework for social recommendations. IEEE Transactions on Knowledge and Data Engineering 34(5):2033\u20132047. https:\/\/doi.org\/10.1109\/TKDE.2020.3008732","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2494_CR14","unstructured":"Grauer K, Updegrave H, Kueshner W (2021) The 2022 crypto crime report"},{"issue":"4","key":"2494_CR15","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/TASLP.2015.2409733","volume":"23","author":"H Huang","year":"2015","unstructured":"Huang H, Xu H, Wang X et al (2015) Maximum f1-score discriminative training criterion for automatic mispronunciation detection. IEEE\/ACM Transactions on Audio, Speech, and Language Processing 23(4):787\u2013797. https:\/\/doi.org\/10.1109\/TASLP.2015.2409733","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"key":"2494_CR16","doi-asserted-by":"publisher","unstructured":"Jiang W, Luo J (2022) Graph neural network for traffic forecasting: A survey. Expert Syst Appl 207(C). https:\/\/doi.org\/10.1016\/j.eswa.2022.117921","DOI":"10.1016\/j.eswa.2022.117921"},{"key":"2494_CR17","unstructured":"Kipf TN, Welling M (2016) Variational Graph Auto-Encoders. In: Proceedings of the NeurIPS 2016 Workshop on Bayesian Deep Learning, https:\/\/arxiv.org\/abs\/1611.07308,"},{"key":"2494_CR18","doi-asserted-by":"publisher","unstructured":"Li J, Lu G, Wu Z (2022) Multi-view graph autoencoder for unsupervised graph representation learning. In: 2022 26th International Conference on Pattern Recognition (ICPR), pp 2213\u20132218, doi: https:\/\/doi.org\/10.1109\/ICPR56361.2022.9956484","DOI":"10.1109\/ICPR56361.2022.9956484"},{"key":"2494_CR19","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.ins.2023.02.092","volume":"632","author":"J Li","year":"2023","unstructured":"Li J, Lu G, Wu Z et al (2023) Multi-view representation model based on graph autoencoder. Information Sciences 632:439\u2013453. https:\/\/doi.org\/10.1016\/j.ins.2023.02.092","journal-title":"Information Sciences"},{"key":"2494_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04504-9","author":"WW Lo","year":"2023","unstructured":"Lo WW, Kulatilleke GK, Sarhan M et al (2023) Inspection-L: Self-supervised GNN node embeddings for money laundering detection in bitcoin. Applied Intelligence. https:\/\/doi.org\/10.1007\/s10489-023-04504-9","journal-title":"Applied Intelligence"},{"key":"2494_CR21","doi-asserted-by":"publisher","unstructured":"Lorenz J, Silva MI, Apar\u00edcio D, et\u00a0al (2020) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the First ACM International Conference on AI in Finance. Association for Computing Machinery, New York, NY, USA, ICAIF \u201920, pp 1\u20138, doi: https:\/\/doi.org\/10.1145\/3383455.3422549","DOI":"10.1145\/3383455.3422549"},{"issue":"2","key":"2494_CR22","doi-asserted-by":"publisher","first-page":"157","DOI":"10.14257\/ijsia.2014.8.2.16","volume":"8","author":"X Luo","year":"2014","unstructured":"Luo X (2014) Suspicious transaction detection for anti-money laundering. International Journal of Security and Its Applications 8(2):157\u2013166. https:\/\/doi.org\/10.14257\/ijsia.2014.8.2.16","journal-title":"International Journal of Security and Its Applications"},{"key":"2494_CR23","doi-asserted-by":"publisher","unstructured":"Ma X, Wu J, Xue S, et\u00a0al (2021) A Comprehensive Survey on Graph Anomaly Detection with Deep Learning. IEEE Transactions on Knowledge and Data Engineering pp 1\u20131. doi: https:\/\/doi.org\/10.1109\/TKDE.2021.3118815","DOI":"10.1109\/TKDE.2021.3118815"},{"issue":"6","key":"2494_CR24","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSP.2013.2267931","volume":"30","author":"DP Mandic","year":"2013","unstructured":"Mandic DP, Rehman Nu, Wu Z et al (2013) Empirical mode decomposition-based time-frequency analysis of multivariate signals: The power of adaptive data analysis. IEEE Signal Processing Magazine 30(6):74\u201386. https:\/\/doi.org\/10.1109\/MSP.2013.2267931","journal-title":"IEEE Signal Processing Magazine"},{"key":"2494_CR25","first-page":"230","volume":"108","author":"PE Meltzer","year":"1991","unstructured":"Meltzer PE (1991) Keeping drug money from reaching the wash cycle: A guide to the Bank Secrecy Act. Banking LJ 108:230","journal-title":"Banking LJ"},{"key":"2494_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122156","volume":"240","author":"S Motie","year":"2024","unstructured":"Motie S, Raahemi B (2024) Financial fraud detection using graph neural networks: A systematic review. Expert Systems with Applications 240:122156. https:\/\/doi.org\/10.1016\/j.eswa.2023.122156","journal-title":"Expert Systems with Applications"},{"key":"2494_CR27","first-page":"2324","volume":"22","author":"D Mulligan","year":"1998","unstructured":"Mulligan D (1998) Know your customer regulations and the international banking system: Towards a general self-regulatory regime. Fordham Int\u2019l LJ 22:2324","journal-title":"Fordham Int\u2019l LJ"},{"key":"2494_CR28","doi-asserted-by":"publisher","unstructured":"Park J, Lee M, Chang HJ, et\u00a0al (2019) Symmetric graph convolutional autoencoder for unsupervised graph representation learning. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp 6518\u20136527, doi: https:\/\/doi.org\/10.1109\/ICCV.2019.00662","DOI":"10.1109\/ICCV.2019.00662"},{"key":"2494_CR29","volume-title":"Model Provisions on Money Laundering, Terrorist Financing, Preventive Measures and Proceeds of Crime (for Common Law Legal Systems)","author":"C Secretariat","year":"2009","unstructured":"Secretariat C (2009) Model Provisions on Money Laundering, Terrorist Financing, Preventive Measures and Proceeds of Crime (for Common Law Legal Systems). Commonwealth Secretariat, London, UK"},{"key":"2494_CR30","doi-asserted-by":"publisher","unstructured":"Shehu Y, Harper R (2023) Efficient periodicity analysis for real-time anomaly detection. In: NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium, pp 1\u20136, doi: https:\/\/doi.org\/10.1109\/NOMS56928.2023.10154406","DOI":"10.1109\/NOMS56928.2023.10154406"},{"issue":"10","key":"2494_CR31","doi-asserted-by":"publisher","first-page":"2771","DOI":"10.1007\/s10115-022-01724-2","volume":"64","author":"Y Shen","year":"2022","unstructured":"Shen Y, Jiang X, Li Z et al (2022) Neawalk: Inferring missing social interactions via topological-temporal embeddings of social groups. Knowledge and Information Systems 64(10):2771\u20132795","journal-title":"Knowledge and Information Systems"},{"issue":"1","key":"2494_CR32","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSEC.2019.2893730","volume":"17","author":"AT Sherman","year":"2019","unstructured":"Sherman AT, Javani F, Zhang H et al (2019) On the origins and variations of blockchain technologies. IEEE Security & Privacy 17(1):72\u201377. https:\/\/doi.org\/10.1109\/MSEC.2019.2893730","journal-title":"IEEE Security & Privacy"},{"issue":"2199","key":"2494_CR33","doi-asserted-by":"publisher","first-page":"20160871","DOI":"10.1098\/rspa.2016.0871","volume":"473","author":"P Singh","year":"2017","unstructured":"Singh P, Joshi SD, Patney RK et al (2017) The fourier decomposition method for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 473(2199):20160871","journal-title":"Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences"},{"issue":"4","key":"2494_CR34","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.cels.2020.08.016","volume":"11","author":"A Strokach","year":"2020","unstructured":"Strokach A, Becerra D, Corbi-Verge C et al (2020) Fast and flexible protein design using deep graph neural networks. Cell Systems 11(4):402-411.e4. https:\/\/doi.org\/10.1016\/j.cels.2020.08.016","journal-title":"Cell Systems"},{"key":"2494_CR35","doi-asserted-by":"publisher","unstructured":"Tang J, Yin J (2005) Developing an intelligent data discriminating system of anti-money laundering based on SVM. In: 2005 International Conference on Machine Learning and Cybernetics, pp 3453\u20133457 Vol. 6, doi: https:\/\/doi.org\/10.1109\/ICMLC.2005.1527539","DOI":"10.1109\/ICMLC.2005.1527539"},{"key":"2494_CR36","doi-asserted-by":"publisher","unstructured":"Tang J, Li J, Gao Z, et\u00a0al (2022) Rethinking Graph Neural Networks for Anomaly Detection. In: Thirty-Ninth International Conference on Machine Learning (ICML), doi: https:\/\/doi.org\/10.48550\/arXiv.2205.15508","DOI":"10.48550\/arXiv.2205.15508"},{"issue":"2","key":"2494_CR37","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/JMLC-05-2016-0018","volume":"20","author":"FMJ Teichmann","year":"2017","unstructured":"Teichmann FMJ (2017) Twelve methods of money laundering. Journal of Money Laundering Control 20(2):130\u2013137. https:\/\/doi.org\/10.1108\/JMLC-05-2016-0018","journal-title":"Journal of Money Laundering Control"},{"key":"2494_CR38","doi-asserted-by":"publisher","unstructured":"Vassallo D, Vella V, Ellul J (2021) Application of Gradient Boosting Algorithms for Anti-money Laundering in Cryptocurrencies. SN Computer Science 2. https:\/\/doi.org\/10.1007\/s42979-021-00558-z","DOI":"10.1007\/s42979-021-00558-z"},{"key":"2494_CR39","unstructured":"Veli\u010dkovi\u0107 P, Fedus W, Hamilton WL, et\u00a0al (2019) Deep Graph Infomax. In: International Conference on Learning Representations, https:\/\/openreview.net\/forum?id=rklz9iAcKQ"},{"key":"2494_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbi.2023.102538","volume":"79","author":"P Veli\u010dkovi\u0107","year":"2023","unstructured":"Veli\u010dkovi\u0107 P (2023) Everything is connected: Graph neural networks. Current Opinion in Structural Biology 79:102538. https:\/\/doi.org\/10.1016\/j.sbi.2023.102538","journal-title":"Current Opinion in Structural Biology"},{"key":"2494_CR41","doi-asserted-by":"publisher","unstructured":"Wang D, Lin J, Cui P, et\u00a0al (2019) A Semi-Supervised Graph Attentive Network for Financial Fraud Detection. In: 2019 IEEE International Conference on Data Mining (ICDM), pp 598\u2013607, doi: https:\/\/doi.org\/10.1109\/ICDM.2019.00070","DOI":"10.1109\/ICDM.2019.00070"},{"key":"2494_CR42","unstructured":"Weber M, Chen J, Suzumura T, et\u00a0al (2018) Scalable Graph Learning for Anti-Money Laundering: A First Look. arXiv:1812.00076arXiv:1812.00076 [cs]"},{"key":"2494_CR43","unstructured":"Weber M, Domeniconi G, Chen J, et\u00a0al (2019) Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. in the proceedings of KDD \u201919 Workshop on Anomaly Detection in Finance"},{"key":"2494_CR44","doi-asserted-by":"publisher","unstructured":"Wu R, Ma B, Jin H, et\u00a0al (2022) Grande: a neural model over directed multigraphs with application to anti-money laundering. In: 2022 IEEE International Conference on Data Mining (ICDM), pp 558\u2013567, doi: https:\/\/doi.org\/10.1109\/ICDM54844.2022.00066","DOI":"10.1109\/ICDM54844.2022.00066"},{"key":"2494_CR45","doi-asserted-by":"publisher","unstructured":"Yan BC, Wang HW, Jiang SWF, et\u00a0al (2022) Maximum f1-score training for end-to-end mispronunciation detection and diagnosis of l2 english speech. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp 1\u20135, doi: https:\/\/doi.org\/10.1109\/ICME52920.2022.9858931","DOI":"10.1109\/ICME52920.2022.9858931"},{"key":"2494_CR46","doi-asserted-by":"publisher","unstructured":"Yu L, Zhang N, Wen W (2021) Abnormal Transaction Detection based on Graph Networks. In: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pp 312\u2013317, doi: https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00051","DOI":"10.1109\/COMPSAC51774.2021.00051"},{"key":"2494_CR47","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.neucom.2021.10.110","volume":"470","author":"R Zhang","year":"2022","unstructured":"Zhang R, Yang S, Zhang Q et al (2022) Graph-based few-shot learning with transformed feature propagation and optimal class allocation. Neurocomputing 470:247\u2013256. https:\/\/doi.org\/10.1016\/j.neucom.2021.10.110","journal-title":"Neurocomputing"},{"issue":"9","key":"2494_CR48","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1007\/s10115-022-01712-6","volume":"64","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Xiong H, Xu T et al (2022) Complex attributed network embedding for medical complication prediction. Knowledge and Information Systems 64(9):2435\u20132456","journal-title":"Knowledge and Information Systems"},{"key":"2494_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2023.3284920","volume":"72","author":"H Zhu","year":"2023","unstructured":"Zhu H, Rho S, Liu S et al (2023) Learning spatial graph structure for multivariate kpi anomaly detection in large-scale cyber-physical systems. IEEE Transactions on Instrumentation and Measurement 72:1\u201316. https:\/\/doi.org\/10.1109\/TIM.2023.3284920","journal-title":"IEEE Transactions on Instrumentation and Measurement"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02494-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02494-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02494-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:56:45Z","timestamp":1760525805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02494-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,14]]},"references-count":49,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2494"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02494-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2025,6,14]]},"assertion":[{"value":"12 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}