{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:16:23Z","timestamp":1755839783671,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173091"],"award-info":[{"award-number":["62173091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01615-9","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T08:40:39Z","timestamp":1731314439000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RMGANets: reinforcement learning-enhanced multi-relational attention graph-aware network for anti-money laundering detection"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1005-1905","authenticated-orcid":false,"given":"Qianyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wei-Tek","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,9]]},"reference":[{"key":"1615_CR1","doi-asserted-by":"publisher","first-page":"600596","DOI":"10.3389\/fcomp.2020.600596","volume":"2","author":"AB Turner","year":"2020","unstructured":"Turner AB, McCombie S, Uhlmann AJ (2020) Analysis techniques for illicit bitcoin transactions. Front Comput Sci 2:600596","journal-title":"Front Comput Sci"},{"issue":"1","key":"1615_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1108\/JMLC-07-2019-0055","volume":"23","author":"M Jullum","year":"2020","unstructured":"Jullum M, L\u00f8land A, Huseby RB, \u00c5nonsen G, Lorentzen J (2020) Detecting money laundering transactions with machine learning. J Money Laund Control 23(1):173\u2013186","journal-title":"J Money Laund Control"},{"issue":"1","key":"1615_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Philip SY (2020) A comprehensive survey on graph neural networks. IEEE Trans Neural Netw Learn Syst 32(1):4\u201324","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1615_CR4","doi-asserted-by":"crossref","unstructured":"Wang Q, He S, Zheng X, Zeng D (2019) Marketing pattern risks detection based on semi-supervised learning. In: 2019 IEEE international conference on intelligence and security informatics (ISI). IEEE, p 229","DOI":"10.1109\/ISI.2019.8823291"},{"key":"1615_CR5","doi-asserted-by":"crossref","unstructured":"Tsai W-T, Wang R, Liu S, Deng E, Yang D (2020) Compass: a data-driven blockchain evaluation framework. In: 2020 IEEE international conference on service oriented systems engineering (SOSE). IEEE, pp 17\u201330","DOI":"10.1109\/SOSE49046.2020.00010"},{"key":"1615_CR6","doi-asserted-by":"crossref","unstructured":"Tsai W-T, Yang D, Wang R, Wang K, Xiang W, Deng E (2021) Strisa: a new regulation architecture to enforce travel rule. In: Silicon Valley cybersecurity conference: first conference, SVCC 2020, San Jose, CA, USA, 17\u201319 Dec 2020, Revised Selected Papers 1. Springer, pp 49\u201367","DOI":"10.1007\/978-3-030-72725-3_4"},{"key":"1615_CR7","doi-asserted-by":"publisher","first-page":"107945","DOI":"10.1016\/j.cnsns.2024.107945","volume":"132","author":"X Song","year":"2024","unstructured":"Song X, Peng Z, Song S, Stojanovic V (2024) Anti-disturbance state estimation for PDT-switched RDNNs utilizing time-sampling and space-splitting measurements. Commun Nonlinear Sci Numer Simul 132:107945","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"1615_CR8","doi-asserted-by":"publisher","first-page":"7451","DOI":"10.1007\/s40747-023-01135-y","volume":"9","author":"Z Peng","year":"2023","unstructured":"Peng Z, Song X, Song S, Stojanovic V (2023) Hysteresis quantified control for switched reaction-diffusion systems and its application. Complex Intell Syst 9(6):7451\u20137460","journal-title":"Complex Intell Syst"},{"key":"1615_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126498","volume":"550","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Zhang Y, Stojanovic V (2023) Bipartite synchronization for cooperative-competitive neural networks with reaction-diffusion terms via dual event-triggered mechanism. Neurocomputing 550:126498","journal-title":"Neurocomputing"},{"key":"1615_CR10","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2021.08.023","volume":"128","author":"L Liu","year":"2022","unstructured":"Liu L, Tsai W-T, Bhuiyan MZA, Peng H, Liu M (2022) Blockchain-enabled fraud discovery through abnormal smart contract detection on ethereum. Futur Gener Comput Syst 128:158\u2013166","journal-title":"Futur Gener Comput Syst"},{"key":"1615_CR11","doi-asserted-by":"crossref","unstructured":"Youssef B, Bouchra F, Brahim O (2023) State of the art literature on anti-money laundering using machine learning and deep learning techniques. In: The international conference on artificial intelligence and computer vision. Springer, pp 77\u201390","DOI":"10.1007\/978-3-031-27762-7_8"},{"key":"1615_CR12","doi-asserted-by":"crossref","unstructured":"Cardoso M, Saleiro P, Bizarro P (2022) Laundrograph: self-supervised graph representation learning for anti-money laundering. In: Proceedings of the third ACM international conference on AI in finance, pp 130\u2013138","DOI":"10.1145\/3533271.3561727"},{"issue":"3","key":"1615_CR13","first-page":"313","volume":"57","author":"A Mohan","year":"2022","unstructured":"Mohan A, Karthika P, Sankar P, Manohar KM, Peter A (2022) Improving anti-money laundering in bitcoin using evolving graph convolutions and deep neural decision forest. Data Technol Appl 57(3):313\u2013329","journal-title":"Data Technol Appl"},{"key":"1615_CR14","unstructured":"Keulen IV (2021) Hiding money laundering with an intelligent multi-agent system simulation. PhD thesis. https:\/\/fse.studenttheses.ub.rug.nl\/id\/eprint\/25680"},{"key":"1615_CR15","doi-asserted-by":"publisher","first-page":"41720","DOI":"10.1109\/ACCESS.2022.3167699","volume":"10","author":"D Labanca","year":"2022","unstructured":"Labanca D, Primerano L, Markland-Montgomery M, Polino M, Carminati M, Zanero S (2022) Amaretto: an active learning framework for money laundering detection. IEEE Access 10:41720\u201341739","journal-title":"IEEE Access"},{"key":"1615_CR16","doi-asserted-by":"publisher","first-page":"18481","DOI":"10.1109\/ACCESS.2021.3052313","volume":"9","author":"M Alkhalili","year":"2021","unstructured":"Alkhalili M, Qutqut MH, Almasalha F (2021) Investigation of applying machine learning for watch-list filtering in anti-money laundering. iEEE Access 9:18481\u201318496","journal-title":"iEEE Access"},{"key":"1615_CR17","doi-asserted-by":"crossref","unstructured":"Zand A, Orwell J, Pfluegel E (2020) A secure framework for anti-money-laundering using machine learning and secret sharing. In: 2020 International conference on cyber security and protection of digital services (cyber security). IEEE, pp 1\u20137","DOI":"10.1109\/CyberSecurity49315.2020.9138889"},{"issue":"3","key":"1615_CR18","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1007\/s10614-018-9864-z","volume":"54","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Trubey P (2019) Machine learning and sampling scheme: an empirical study of money laundering detection. Comput Econ 54(3):1043\u20131063","journal-title":"Comput Econ"},{"key":"1615_CR19","doi-asserted-by":"crossref","unstructured":"Tertychnyi P, Slobozhan I, Ollikainen M, Dumas M (2020) Scalable and imbalance-resistant machine learning models for anti-money laundering: A two-layered approach. In: Enterprise applications, markets and services in the finance industry: 10th international workshop, FinanceCom 2020, Helsinki, Finland, August 18, 2020, Revised selected papers 10. Springer, pp 43\u201358","DOI":"10.1007\/978-3-030-64466-6_3"},{"key":"1615_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3342640","author":"Z Xiao","year":"2024","unstructured":"Xiao Z, Xing H, Qu R, Feng L, Luo S, Dai P, Zhao B, Dai Y (2024) Densely knowledge-aware network for multivariate time series classification. IEEE Trans Syst Man Cybern Syst. https:\/\/doi.org\/10.1109\/TSMC.2023.3342640","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"1615_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3344294","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Tong H, Qu R, Xing H, Luo S, Zhu Z, Song F, Feng L (2023) Capmatch: semi-supervised contrastive transformer capsule with feature-based knowledge distillation for human activity recognition. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2023.3344294","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1615_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2024.3370219","author":"Z Xiao","year":"2024","unstructured":"Xiao Z, Xu X, Xing H, Zhao B, Wang X, Song F, Qu R, Feng L (2024) DTCM: deep transformer capsule mutual distillation for multivariate time series classification. IEEE Trans Cogn Dev Syst. https:\/\/doi.org\/10.1109\/TCDS.2024.3370219","journal-title":"IEEE Trans Cogn Dev Syst"},{"issue":"1","key":"1615_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.57020\/ject.1428146","volume":"3","author":"JFM Pazos","year":"2024","unstructured":"Pazos JFM, Gonz\u00e1lez JG, Lorenzo DB, Morales JAR, \u00c1lvarez MMR (2024) Fraud transaction detection for anti-money laundering systems based on deep learning. J Emerg Comput Technol 3(1):29\u201334","journal-title":"J Emerg Comput Technol"},{"key":"1615_CR24","doi-asserted-by":"publisher","unstructured":"Alotibi J, Almutanni B, Alsubait T, Alhakami H, Baz A (2022) Money laundering detection using machine learning and deep learning. Int J Adv Comput Sci Appl 13(10) https:\/\/doi.org\/10.14569\/IJACSA.2022.0131087","DOI":"10.14569\/IJACSA.2022.0131087"},{"key":"1615_CR25","unstructured":"Kute DV (2022) Explainable deep learning approach for detecting money laundering transactions in banking system. PhD thesis, University of Technology, Sydney (Australia)"},{"key":"1615_CR26","doi-asserted-by":"crossref","unstructured":"Kolesnikova K, Mezentseva O, Mukatayev T (2021) Analysis of bitcoin transactions to detect illegal transactions using convolutional neural networks. In: 2021 IEEE international conference on smart information systems and technologies (SIST). IEEE, pp 1\u20136","DOI":"10.1109\/SIST50301.2021.9465983"},{"key":"1615_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119037","volume":"214","author":"RIT Jensen","year":"2023","unstructured":"Jensen RIT, Iosifidis A (2023) Qualifying and raising anti-money laundering alarms with deep learning. Expert Syst Appl 214:119037","journal-title":"Expert Syst Appl"},{"key":"1615_CR28","doi-asserted-by":"crossref","unstructured":"Tatulli MP, Paladini T, D\u2019Onghia M, Carminati M, Zanero S (2023) Hamlet: a transformer based approach for money laundering detection. In: International symposium on cyber security, cryptology, and machine learning. Springer, pp 234\u2013250","DOI":"10.1007\/978-3-031-34671-2_17"},{"issue":"4","key":"1615_CR29","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.3390\/make5040084","volume":"5","author":"LL Cunha","year":"2023","unstructured":"Cunha LL, Brito MA, Oliveira DF, Martins AP (2023) Active learning in the detection of anomalies in cryptocurrency transactions. Mach Learn Knowl Extract 5(4):1717\u20131745","journal-title":"Mach Learn Knowl Extract"},{"key":"1615_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3272396","author":"D Cheng","year":"2023","unstructured":"Cheng D, Ye Y, Xiang S, Ma Z, Zhang Y, Jiang C (2023) Anti-money laundering by group-aware deep graph learning. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2023.3272396","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1615_CR31","doi-asserted-by":"crossref","unstructured":"Hyun W, Lee J, Suh B (2023) Anti-money laundering in cryptocurrency via multi-relational graph neural network. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 118\u2013130","DOI":"10.1007\/978-3-031-33377-4_10"},{"key":"1615_CR32","doi-asserted-by":"crossref","unstructured":"Wei T, Zeng B, Guo W, Guo Z, Tu S, Xu L (2023) A dynamic graph convolutional network for anti-money laundering. In: International conference on intelligent computing. Springer, pp 493\u2013502","DOI":"10.1007\/978-981-99-4761-4_42"},{"key":"1615_CR33","doi-asserted-by":"crossref","unstructured":"Huong H, Nguyen X, Dang TK, Tran-Truong PT (2024) Money laundering detection using a transaction-based graph learning approach. In: 2024 18th international conference on ubiquitous information management and communication (IMCOM). IEEE, pp 1\u20138","DOI":"10.1109\/IMCOM60618.2024.10418307"},{"key":"1615_CR34","doi-asserted-by":"crossref","unstructured":"Huang H, Wang P, Zhang Z, Zhao Q (2023) A spatio-temporal attention-based GCN for anti-money laundering transaction detection. In: International conference on advanced data mining and application. Springer, pp 634\u2013648","DOI":"10.1007\/978-3-031-46677-9_44"},{"issue":"3","key":"1615_CR35","doi-asserted-by":"publisher","first-page":"378","DOI":"10.3390\/sym16030378","volume":"16","author":"F Wan","year":"2024","unstructured":"Wan F, Li P (2024) A novel money laundering prediction model based on a dynamic graph convolutional neural network and long short-term memory. Symmetry 16(3):378","journal-title":"Symmetry"},{"issue":"16","key":"1615_CR36","doi-asserted-by":"publisher","first-page":"19406","DOI":"10.1007\/s10489-023-04504-9","volume":"53","author":"WW Lo","year":"2023","unstructured":"Lo WW, Kulatilleke GK, Sarhan M, Layeghy S, Portmann M (2023) Inspection-l: self-supervised GNN node embeddings for money laundering detection in bitcoin. Appl Intell 53(16):19406\u201319417","journal-title":"Appl Intell"},{"issue":"1","key":"1615_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-023-00194-5","volume":"7","author":"B Fu","year":"2024","unstructured":"Fu B, Wang Y, Feng T (2024) CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification. Cybersecurity 7(1):1\u201316","journal-title":"Cybersecurity"},{"key":"1615_CR38","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446717","author":"J Zhang","year":"2024","unstructured":"Zhang J, Cai K, Wen J (2024) A survey of deep learning applications in cryptocurrency. Iscience. https:\/\/doi.org\/10.1145\/3445814.3446717","journal-title":"Iscience"},{"key":"1615_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2023.108509","author":"X Luo","year":"2024","unstructured":"Luo X, Han X, Zuo W, Wu X, Liu W (2024) MLaD 2: a semi-supervised money laundering detection framework based on decoupling training. IEEE Trans Inf Forensics Secur. https:\/\/doi.org\/10.1016\/j.isci.2023.108509","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1615_CR40","doi-asserted-by":"publisher","unstructured":"Singh S, Sharma A, Chauhan VK (2024) Gtagcn: generalized topology adaptive graph convolutional networks. https:\/\/doi.org\/10.48550\/arXiv.2403.15077. arXiv preprint arXiv:2403.15077","DOI":"10.48550\/arXiv.2403.15077"},{"key":"1615_CR41","doi-asserted-by":"crossref","unstructured":"Wang R, Tsai W-T, He J, Liu C, Li Q, Deng E (2019) A video surveillance system based on permissioned blockchains and edge computing. In: 2019 IEEE international conference on big data and smart computing (BigComp). IEEE, pp 1\u20136","DOI":"10.1109\/BIGCOMP.2019.8679354"},{"issue":"2","key":"1615_CR42","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1007\/s13369-021-06116-2","volume":"47","author":"P Xia","year":"2022","unstructured":"Xia P, Ni Z, Xiao H, Zhu X, Peng P (2022) A novel spatiotemporal prediction approach based on graph convolution neural networks and long short-term memory for money laundering fraud. Arab J Sci Eng 47(2):1921\u20131937","journal-title":"Arab J Sci Eng"},{"key":"1615_CR43","doi-asserted-by":"publisher","unstructured":"Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. https:\/\/doi.org\/10.48550\/arXiv.1908.02591. arXiv preprint arXiv:1908.02591","DOI":"10.48550\/arXiv.1908.02591"},{"key":"1615_CR44","doi-asserted-by":"crossref","unstructured":"Zheng X, Wu B, Liang X, Li W (2024) Friend or foe? Mining suspicious behavior via graph capsule infomax detector against fraudsters. In: Proceedings of the ACM on web conference 2024, pp 2684\u20132693","DOI":"10.1145\/3589334.3645706"},{"key":"1615_CR45","doi-asserted-by":"crossref","unstructured":"Duan M, Zheng T, Gao Y, Wang G, Feng Z, Wang X (2024) DGA-GNN: dynamic grouping aggregation GNN for fraud detection. In: Proceedings of the AAAI conference on artificial intelligence, vol 38, pp 11820\u201311828","DOI":"10.1609\/aaai.v38i10.29067"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01615-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01615-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01615-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:21:34Z","timestamp":1738268494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01615-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,9]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1615"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01615-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2024,11,9]]},"assertion":[{"value":"22 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest in this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors agree to publish.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"5"}}