{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T05:50:09Z","timestamp":1772862609660,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61932002"],"award-info":[{"award-number":["61932002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Money laundering identification (MLI) is a challenging task for financial AI research and application due to its massive transaction volume, label sparseness, and label bias. Most of the existing MLI methods focus on individual-level abnormal behavior while neglecting the community factor that money laundering is a collaborative group crime. Furthermore, the massive volume of transactions and the issue of label shifting also impede the application of supervised or semi-supervised models. To this end, this paper proposes an efficient community-oriented algorithm, namely SEGE, to identify money laundering based on structural entropy minimization (SEM) with graph embedding in an unsupervised approach. Experiments on both a private real-world money laundering network and a public synthetic dataset show that our SEGE algorithm derives prominent performance and outperforms the parameterized learning-based graph representation methods. Moreover, we find that there are pervasive sub-communities in the real-world money laundering network. Based on our local algorithm, we propose a real combat strategy against the money laundering group, in which when we have several scattered suspicious accounts in the transaction network, we are able to retrieve the whole money laundering group by the union of sub-communities with both high precision and high recall rates.<\/jats:p>","DOI":"10.1007\/s13042-024-02129-z","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T17:01:35Z","timestamp":1712768495000},"page":"3951-3968","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Structural entropy minimization combining graph representation for money laundering identification"],"prefix":"10.1007","volume":"15","author":[{"given":"Shaojiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Pengcheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yicheng","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"2129_CR1","unstructured":"IMF: IMF and the Fight Against Money Laundering and the Financing of Terrorism. https:\/\/www.imf.org\/en\/About\/Factsheets\/Sheets\/2016\/08\/01\/16\/31\/Fight-Against-Money-Laundering-the-Financing-of-Terrorism (2021)"},{"key":"2129_CR2","doi-asserted-by":"publisher","first-page":"82300","DOI":"10.1109\/ACCESS.2021.3086230","volume":"9","author":"DV Kute","year":"2021","unstructured":"Kute DV, Pradhan B, Shukla N, Alamri AM (2021) Deep learning and explainable artificial intelligence techniques applied for detecting money laundering-a critical review. IEEE Access 9:82300\u201382317","journal-title":"IEEE Access"},{"issue":"1","key":"2129_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1177\/000271620258200113","volume":"582","author":"M Levi","year":"2002","unstructured":"Levi M (2002) Money laundering and its regulation. Ann Am Acad Pol Soc Sci 582(1):181\u2013194","journal-title":"Ann Am Acad Pol Soc Sci"},{"issue":"4","key":"2129_CR4","first-page":"21","volume":"16","author":"TE Senator","year":"1995","unstructured":"Senator TE, Goldberg HG, Wooton J, Cottini MA, Khan AFU, Klinger CD, Llamas WM, Marrone MP, Wong RWH (1995) The financial crimes enforcement network AI system (FAIS) identifying potential money laundering from reports of large cash transactions. AI Mag 16(4):21\u201339","journal-title":"AI Mag"},{"issue":"2","key":"2129_CR5","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.eswa.2007.11.059","volume":"36","author":"S Gao","year":"2009","unstructured":"Gao S, Xu D (2009) Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst Appl 36(2):1493\u20131504","journal-title":"Expert Syst Appl"},{"key":"2129_CR6","doi-asserted-by":"crossref","unstructured":"Domashova JV, Mikhailina N (2020) Usage of machine learning methods for early detection of money laundering schemes. In: Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, BICA 2020, Eleventh Annual Meeting of the BICA Society, November 10\u201315, 2020, vol. 190. Natal, Rio Grande do Norte, Brazil, pp 184\u2013192","DOI":"10.1016\/j.procs.2021.06.033"},{"issue":"3","key":"2129_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/MNET.2017.1700213","volume":"32","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Wang X, Zhang J, Zhang P, Liu L, Jin H, Jin H (2018) Analyzing and detecting money-laundering accounts in online social networks. IEEE Netw 32(3):115\u2013121","journal-title":"IEEE Netw"},{"key":"2129_CR8","doi-asserted-by":"crossref","unstructured":"Li X, Liu S, Li Z, Han X, Shi C, Hooi B, Huang H, Cheng X (2020) Flowscope: Spotting money laundering based on graphs. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, February 7\u201312, 2020, New York, NY, USA, pp 4731\u20134738","DOI":"10.1609\/aaai.v34i04.5906"},{"issue":"6","key":"2129_CR9","doi-asserted-by":"publisher","first-page":"3290","DOI":"10.1109\/TIT.2016.2555904","volume":"62","author":"A Li","year":"2016","unstructured":"Li A, Pan Y (2016) Structural information and dynamical complexity of networks. IEEE Trans Inf Theory 62(6):3290\u20133339","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"2129_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/986213.986239","volume":"47","author":"JS Zdanowicz","year":"2004","unstructured":"Zdanowicz JS (2004) Detecting money laundering and terrorist financing via data mining. Commun ACM 47(5):53\u201355","journal-title":"Commun ACM"},{"issue":"487","key":"2129_CR11","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1198\/jasa.2009.ap07625","volume":"104","author":"X Deng","year":"2009","unstructured":"Deng X, Joseph VR, Sudjianto A, Wu CJ (2009) Active learning through sequential design, with applications to detection of money laundering. J Am Stat Assoc 104(487):969\u2013981","journal-title":"J Am Stat Assoc"},{"key":"2129_CR12","doi-asserted-by":"crossref","unstructured":"Paula EL, Ladeira M, Carvalho RN, Marzag\u00e3o T (2016) Deep learning anomaly detection as support fraud investigation in brazilian exports and anti-money laundering. In: 15th IEEE International Conference on Machine Learning and Applications, ICMLA 2016, December 18\u201320, 2016, pp 954\u2013960. IEEE Computer Society, Anaheim, CA, USA","DOI":"10.1109\/ICMLA.2016.0172"},{"key":"2129_CR13","doi-asserted-by":"crossref","unstructured":"Soltani R, Nguyen UT, Yang Y, Faghani MR, Yagoub A, An A (2016) A new algorithm for money laundering detection based on structural similarity. In: 7th IEEE Annual Ubiquitous Computing. Electronics and Mobile Communication Conference, UEMCON 2016, New York City, NY, USA, October 20\u201322, 2016. IEEE, New York, USA, pp 1\u20137","DOI":"10.1109\/UEMCON.2016.7777919"},{"key":"2129_CR14","doi-asserted-by":"crossref","unstructured":"Zhang ZM, Salerno JJ, Yu PS (2003) Applying data mining in investigating money laundering crimes. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24 - 27, 2003, pp. 747\u2013752. ACM, Washington, DC, USA","DOI":"10.1145\/956750.956851"},{"issue":"2","key":"2129_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","volume":"57","author":"Z Chen","year":"2018","unstructured":"Chen Z, Khoa LDV, Teoh EN, Nazir A, Karuppiah EK, Lam KS (2018) Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowl Inf Syst 57(2):245\u2013285","journal-title":"Knowl Inf Syst"},{"key":"2129_CR16","doi-asserted-by":"crossref","unstructured":"Han J, Barman U, Hayes J, Du J, Burgin E, Wan D (2018) Nextgen AML: distributed deep learning based language technologies to augment anti money laundering investigation. In: Proceedings of ACL 2018, July 15-20, 2018, System Demonstrations, Melbourne, Australia, pp 37\u201342","DOI":"10.18653\/v1\/P18-4007"},{"issue":"3","key":"2129_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIS.2004.1","volume":"19","author":"J Kingdon","year":"2004","unstructured":"Kingdon J (2004) AI fights money laundering. IEEE Intell Syst 19(3):87\u201389","journal-title":"IEEE Intell Syst"},{"key":"2129_CR18","unstructured":"Jensen R, Iosifidis A (2022) Fighting money laundering with statistics and machine learning: An introduction and review. CoRR. arXiv:abs\/2201.04207 (2022)"},{"key":"2129_CR19","doi-asserted-by":"crossref","unstructured":"Alarab I, Prakoonwit S, Nacer MI (2020) Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 2020 5th International Conference on Machine Learning Technologies, pp 23\u201327","DOI":"10.1145\/3409073.3409080"},{"key":"2129_CR20","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2014.10.015","volume":"295","author":"R Drezewski","year":"2015","unstructured":"Drezewski R, Sepielak J, Filipkowski W (2015) The application of social network analysis algorithms in a system supporting money laundering detection. Inf Sci 295:18\u201332","journal-title":"Inf Sci"},{"key":"2129_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00411-3","volume":"8","author":"AK Shaikh","year":"2021","unstructured":"Shaikh AK, Al-Shamli M, Nazir A (2021) Designing a relational model to identify relationships between suspicious customers in anti-money laundering (aml) using social network analysis (sna). J Big Data 8:1\u201322","journal-title":"J Big Data"},{"key":"2129_CR22","unstructured":"Goldberg AV (1984) Finding a Maximum Density Subgraph. University of California at Berkeley"},{"key":"2129_CR23","doi-asserted-by":"crossref","unstructured":"Andersen R, Chellapilla K (2009) Finding dense subgraphs with size bounds. In: Avrachenkov K, Donato D, Litvak N (eds.) Algorithms and Models for the Web-Graph, 6th International Workshop, WAW 2009, February 12\u201313, 2009. Proceedings. Lecture Notes in Computer Science, vol. 5427, pp 25\u201337. Springer, Barcelona, Spain","DOI":"10.1007\/978-3-540-95995-3_3"},{"key":"2129_CR24","doi-asserted-by":"crossref","unstructured":"Wang Z, Chu L, Pei J, Al-Barakati A, Chen E (2016) Tradeoffs between density and size in extracting dense subgraphs: A unified framework. In: Kumar R, Caverlee J, Tong H (eds) 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, August 18-21, 2016, pp. 41\u201348. IEEE Computer Society, San Francisco, CA, USA","DOI":"10.1109\/ASONAM.2016.7752211"},{"key":"2129_CR25","doi-asserted-by":"crossref","unstructured":"Miyauchi A, Kakimura N (2018) Finding a dense subgraph with sparse cut. In: Cuzzocrea A, Allan J, Paton NW, Srivastava D, Agrawal R, Broder AZ, Zaki MJ, Candan KS, Labrinidis A, Schuster A, Wang H (eds) Proceedings of the 27th ACM International Conference on Information and Knowledge Management, CIKM 2018, October 22-26, 2018, pp. 547\u2013556. ACM, Torino, Italy","DOI":"10.1145\/3269206.3271720"},{"key":"2129_CR26","doi-asserted-by":"crossref","unstructured":"Eswaran D, Faloutsos C, Guha S, Mishra N (2018) Spotlight: Detecting anomalies in streaming graphs. In: Guo Y, Farooq F (eds) Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2018, London, UK, August 19\u201323, 2018, pp. 1378\u20131386. ACM, London United Kingdom","DOI":"10.1145\/3219819.3220040"},{"key":"2129_CR27","doi-asserted-by":"crossref","unstructured":"Starnini M, Tsourakakis CE, Zamanipour M, Panisson A, Allasia W, Fornasiero M, Puma LL, Ricci V, Ronchiadin S, Ugrinoska A, Varetto M, Moncalvo D (2021) Smurf-based anti-money laundering in time-evolving transaction networks. In: Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track - European Conference, ECML PKDD 2021, September 13\u201317, 2021, Proceedings, Part IV, Bilbao, Spain, pp 171\u2013186","DOI":"10.1007\/978-3-030-86514-6_11"},{"key":"2129_CR28","doi-asserted-by":"crossref","unstructured":"Hooi B, Song HA, Beutel A, Shah N, Shin K, Faloutsos C (2016) FRAUDAR: bounding graph fraud in the face of camouflage. In: Krishnapuram B, Shah M, Smola AJ, Aggarwal CC, Shen D, Rastogi R (eds) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 13\u201317, 2016, pp 895\u2013904. ACM, San Francisco, CA, USA","DOI":"10.1145\/2939672.2939747"},{"key":"2129_CR29","doi-asserted-by":"crossref","unstructured":"Zhang J, Liu S, Yu W, Feng W, Cheng X (2019) Eigenpulse: Detecting surges in large streaming graphs with row augmentation. In: Yang Q, Zhou Z, Gong Z, Zhang M, Huang S (eds) Advances in Knowledge Discovery and Data Mining\u201423rd Pacific-Asia Conference, PAKDD 2019, April 14\u201317, 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11440, pp 501\u2013513. Springer, Macau, China","DOI":"10.1007\/978-3-030-16145-3_39"},{"key":"2129_CR30","doi-asserted-by":"crossref","unstructured":"Sun X, Feng W, Liu S, Xie Y, Bhatia S, Hooi B, Wang W, Cheng X (2022) Monlad: Money laundering agents detection in transaction streams. In: Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track\u2014European Conference, ECML PKDD 2021, September 13\u201317, 2021, Proceedings, Part IV, pp. 976\u2013986. ACM, Bilbao, Spain","DOI":"10.1145\/3488560.3498418"},{"key":"2129_CR31","doi-asserted-by":"crossref","unstructured":"Feng W, Liu S, Koutra D, Shen H, Cheng X (2020) Specgreedy: Unified dense subgraph detection. In: Machine Learning and Knowledge Discovery in Databases\u2014European Conference, ECML PKDD 2020, September 14\u201318, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12457, pp 181\u2013197. Springer, Ghent, Belgium","DOI":"10.1007\/978-3-030-67658-2_11"},{"key":"2129_CR32","doi-asserted-by":"crossref","unstructured":"Zhu Y, Cong F, Zhang D, Gong W, Lin Q, Feng W, Dong Y, Tang J (2023) Wingnn: Dynamic graph neural networks with random gradient aggregation window. In: Singh AK, Sun Y, Akoglu L, Gunopulos D, Yan X, Kumar R, Ozcan F, Ye J (eds.) Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, Long Beach, CA, USA, August 6\u201310, pp 3650\u20133662. ACM, California","DOI":"10.1145\/3580305.3599551"},{"key":"2129_CR33","doi-asserted-by":"crossref","unstructured":"Cen Y, Hou Z, Wang Y, Chen Q, Luo Y, Yu Z, Zhang H, Yao X, Zeng A, Guo S, Dong Y, Yang Y, Zhang P, Dai G, Wang Y, Zhou C, Yang H, Tang J (2023) Cogdl: A comprehensive library for graph deep learning. In: Ding Y, Tang J, Sequeda JF, Aroyo L, Castillo C, Houben G (eds) Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 747\u2013758. ACM, Austin","DOI":"10.1145\/3543507.3583472"},{"key":"2129_CR34","doi-asserted-by":"crossref","unstructured":"Flake GW, Lawrence S, Giles CL (2000) Efficient identification of web communities. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 20\u201323, 2000, pp 150\u2013160. ACM, Boston, MA, USA","DOI":"10.1145\/347090.347121"},{"issue":"12","key":"2129_CR35","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman ME (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821\u20137826","journal-title":"Proc Natl Acad Sci"},{"issue":"1","key":"2129_CR36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1073\/pnas.0605965104","volume":"104","author":"S Fortunato","year":"2007","unstructured":"Fortunato S, Barth\u00e9lemy M (2007) Resolution limit in community detection. Proc Natl Acad Sci 104(1):36\u201341","journal-title":"Proc Natl Acad Sci"},{"key":"2129_CR37","doi-asserted-by":"crossref","unstructured":"Liu F, Xue S, Wu J, Zhou C, Hu W, Paris C, Nepal S, Yang J, Yu PS (2020) Deep learning for community detection: Progress, challenges and opportunities. In: 29th International Joint Conference on Artificial Intelligence, IJCAI, Yokohama, Japan, pp 4981\u20134987","DOI":"10.24963\/ijcai.2020\/693"},{"key":"2129_CR38","doi-asserted-by":"crossref","unstructured":"Du L, Lu Z, Wang Y, Song G, Wang Y, Chen W (2018) Galaxy network embedding: A hierarchical community structure preserving approach. In: 27th International Joint Conference on Artificial Intelligence, IJCAI, Stockholm, pp. 2079\u20132085","DOI":"10.24963\/ijcai.2018\/287"},{"key":"2129_CR39","unstructured":"Jia Y, Zhang Q, Zhang W, Wang X (2019) Communitygan: Community detection with generative adversarial nets. In: Liu L, White RW, Mantrach A, Silvestri F, McAuley JJ, Baeza-Yates R, Zia L (eds) Proceedings of the 30th International Conference on World Wide Web, WWW 2019, May 13\u201317, 2019, pp 784\u2013794. ACM, San Francisco, CA, USA"},{"key":"2129_CR40","unstructured":"Bandyopadhyay S, Peter V (2021) Unsupervised constrained community detection via self-expressive graph neural network. In: Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, UAI 2021, 27\u201330 July 2021. Proceedings of Machine Learning Research, vol. 161, pp. 1078\u20131088. AUAI Press, Virtual Event"},{"key":"2129_CR41","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201914. ACM, New York, NY, United States, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"2129_CR42","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Krishnapuram B, Shah M, Smola AJ, Aggarwal CC, Shen D, Rastogi R (eds) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 13\u201317, 2016, pp. 855\u2013864. ACM, San Francisco, CA, USA","DOI":"10.1145\/2939672.2939754"},{"key":"2129_CR43","doi-asserted-by":"crossref","unstructured":"Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) LINE: large-scale information network embedding. In: Gangemi A, Leonardi S, Panconesi A (eds) Proceedings of the 24th International Conference on World Wide Web, WWW 2015, May 18\u201322, 2015, pp. 1067\u20131077. ACM, Florence, Italy","DOI":"10.1145\/2736277.2741093"},{"key":"2129_CR44","doi-asserted-by":"crossref","unstructured":"Qiu J, Dong Y, Ma H, Li J, Wang K, Tang J (2018) Network embedding as matrix factorization: Unifying deepwalk, line, pte, and node2vec. In: Chang Y, Zhai C, Liu Y, Maarek Y (eds) Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, February 5\u20139, 2018, pp 459\u2013467. ACM, Marina Del Rey, CA, USA","DOI":"10.1145\/3159652.3159706"},{"key":"2129_CR45","doi-asserted-by":"crossref","unstructured":"Qiu J, Dong Y, Ma H, Li J, Wang C, Wang K, Tang J (2019) Netsmf: Large-scale network embedding as sparse matrix factorization. In: Liu L, White RW, Mantrach A, Silvestri F, McAuley JJ, Baeza-Yates R, Zia L (eds) Proceedings of the 30th International Conference on World Wide Web, WWW 2019, May 13\u201317, 2019, pp. 1509\u20131520. ACM, San Francisco, CA, USA","DOI":"10.1145\/3308558.3313446"},{"key":"#cr-split#-2129_CR46.1","doi-asserted-by":"crossref","unstructured":"Zhang J, Dong Y, Wang Y, Tang J, Ding M (2019) Prone: Fast and scalable network representation learning. In: Kraus S","DOI":"10.24963\/ijcai.2019\/594"},{"key":"#cr-split#-2129_CR46.2","unstructured":"(ed) Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, August 10-16, 2019, pp. 4278-4284. ijcai.org, Macao, China"},{"key":"2129_CR47","unstructured":"Velickovic P, Fedus W, Hamilton WL, Li\u00f2 P, Bengio Y, Hjelm RD (2019) Deep graph infomax. In: 7th International Conference on Learning Representations, ICLR 2019, May 6\u20139, 2019. OpenReview.net, New Orleans, LA, USA"},{"key":"2129_CR48","doi-asserted-by":"crossref","unstructured":"Chai Z, Yang Y, Dan J, Tian S, Meng C, Wang W, Sun Y (2023) Towards learning to discover money laundering sub-network in massive transaction network. In: Williams B, Chen Y, Neville J (eds) Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023, Washington, DC, USA, February 7\u201314, 2023. AAAI Press, Washington, pp 14153\u201314160","DOI":"10.1609\/aaai.v37i12.26656"},{"key":"2129_CR49","doi-asserted-by":"crossref","unstructured":"Wu J, Li S, Li J, Pan Y, Xu K (2022) A simple yet effective method for graph classification. In: IJCAI, pp 3580\u20133586. ijcai.org, Vienna, Austria","DOI":"10.24963\/ijcai.2022\/497"},{"key":"2129_CR50","unstructured":"Wu J, Chen X, Xu K, Li S (2022) Structural entropy guided graph hierarchical pooling. In: ICML. Proceedings of Machine Learning Research, vol. 162, pp 24017\u201324030. PMLR, Baltimore, Maryland"},{"key":"2129_CR51","doi-asserted-by":"crossref","unstructured":"Zou D, Peng H, Huang X, Yang R, Li J, Wu J, Liu C, Yu PS (2023) SE-GSL: A general and effective graph structure learning framework through structural entropy optimization. In: WWW, pp 499\u2013510. ACM, Austin, TX, USA","DOI":"10.1145\/3543507.3583453"},{"key":"2129_CR52","doi-asserted-by":"crossref","unstructured":"Yang Z, Zhang G, Wu J, Yang J, Sheng QZ, Peng H, Li A, Xue S, Su J (2023) Minimum entropy principle guided graph neural networks. In: Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining. WSDM \u201923, pp 114\u2013122, New York, NY, USA","DOI":"10.1145\/3539597.3570467"},{"key":"2129_CR53","doi-asserted-by":"crossref","unstructured":"Li A, Yin X, Pan Y (2016) Three-dimensional gene map of cancer cell types: Structural entropy minimisation principle for defining tumour subtypes. Sci Rep 6","DOI":"10.1038\/srep20412"},{"key":"2129_CR54","doi-asserted-by":"crossref","unstructured":"Li A, Hu Q, Liu J, Pan Y (2016) Resistance and security index of networks: Structural information perspective of network security. Sci Rep 6","DOI":"10.1038\/srep26810"},{"key":"2129_CR55","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.ins.2021.12.089","volume":"588","author":"J Wu","year":"2022","unstructured":"Wu J, Xu K, Chen X, Li S, Zhao J (2022) Price graphs: Utilizing the structural information of financial time series for stock prediction. Inf Sci 588:405\u2013424","journal-title":"Inf Sci"},{"key":"2129_CR56","unstructured":"Zhang C, Zhu H, Peng X, Wu J, Xu K (2022) Hierarchical information matters: Text classification via tree based graph neural network. In: COLING, pp 950\u2013959. International Committee on Computational Linguistics, Gyeongju, Republic of Korea"},{"issue":"2","key":"2129_CR57","first-page":"109","volume":"5","author":"PW Holland","year":"1983","unstructured":"Holland PW, Laskey KB, Leinhardt S (1983) Stochastic blockmodels: First steps. Soc. Networks 5(2):109\u2013137","journal-title":"Networks"},{"key":"2129_CR58","doi-asserted-by":"crossref","unstructured":"Ou M, Cui P, Pei J, Zhang Z, Zhu W (2016) Asymmetric transitivity preserving graph embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 13\u201317, 2016, pp 1105\u20131114. ACM, San Francisco, CA, USA","DOI":"10.1145\/2939672.2939751"},{"key":"2129_CR59","unstructured":"Hassani K, Ahmadi AHK (2020) Contrastive multi-view representation learning on graphs. In: Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13\u201318 July 2020, Virtual Event. Proceedings of Machine Learning Research, vol. 119, pp. 4116\u20134126. PMLR, Honolulu, Hawaii, USA"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02129-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02129-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02129-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T01:22:43Z","timestamp":1731720163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02129-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":60,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["2129"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02129-z","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]},"assertion":[{"value":"10 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}