{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:06:21Z","timestamp":1772060781174,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173091"],"award-info":[{"award-number":["62173091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special Funds for Promoting High-quality Development of Marine and Fishery Industries in Fujian Province","award":["FJHYF-ZH-2023-02"],"award-info":[{"award-number":["FJHYF-ZH-2023-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s40747-025-01913-w","type":"journal-article","created":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T06:23:48Z","timestamp":1746512628000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hide and seek in transaction networks: a multi-agent framework for simulating and detecting money laundering activities"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1005-1905","authenticated-orcid":false,"given":"Qianyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wei-Tek","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"issue":"1","key":"1913_CR1","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1086\/501508","volume":"34","author":"M Levi","year":"2006","unstructured":"Levi M, Reuter P (2006) Money laundering. Crime Justice 34(1):289\u2013375","journal-title":"Crime Justice"},{"issue":"5555\/3666122","key":"1913_CR2","first-page":"3667422","volume":"10","author":"E Altman","year":"2024","unstructured":"Altman E, Blanu\u0161a J, Von Niederh\u00e4usern L, Egressy B, Anghel A, Atasu K (2024) Realistic synthetic financial transactions for anti-money laundering models. Adv Neural Inf Process Syst 10(5555\/3666122):3667422","journal-title":"Adv Neural Inf Process Syst"},{"key":"1913_CR3","unstructured":"Weber M, Chen J, Suzumura T, Pareja A, Ma T, Kanezashi H, Kaler T, Leiserson CE, Schardl TB (2018) Scalable graph learning for anti-money laundering: a first look, pp 1\u20137. arXiv:1812.00076"},{"key":"1913_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126498","volume":"550","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Zhang Y, Stojanovic V (2023) Bipartite synchronization for cooperative-competitive neural networks with reaction-diffusion terms via dual event-triggered mechanism. Neurocomputing 550:126498","journal-title":"Neurocomputing"},{"issue":"6","key":"1913_CR5","doi-asserted-by":"publisher","first-page":"7451","DOI":"10.1007\/s40747-023-01135-y","volume":"9","author":"Z Peng","year":"2023","unstructured":"Peng Z, Song X, Song S, Stojanovic V (2023) Hysteresis quantified control for switched reaction-diffusion systems and its application. Complex Intell Syst 9(6):7451\u20137460","journal-title":"Complex Intell Syst"},{"key":"1913_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","volume":"57","author":"Z Chen","year":"2018","unstructured":"Chen Z, Van Khoa LD, Teoh EN, Nazir A, Karuppiah EK, Lam KS (2018) Machine learning techniques for anti-money laundering (aml) solutions in suspicious transaction detection: a review. Knowl Inf Syst 57:245\u2013285","journal-title":"Knowl Inf Syst"},{"key":"1913_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah A, Maarof MA, Zainal A (2016) Fraud detection system: a survey. J Netw Comput Appl 68:90\u2013113","journal-title":"J Netw Comput Appl"},{"key":"1913_CR8","doi-asserted-by":"crossref","unstructured":"Elmougy Y, Liu L (2023) Demystifying fraudulent transactions and illicit nodes in the bitcoin network for financial forensics. In: Proceedings of the 29th ACM SIGKDD conference on knowledge discovery and data mining, pp 3979\u20133990","DOI":"10.1145\/3580305.3599803"},{"key":"1913_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2024.107945","volume":"132","author":"X Song","year":"2024","unstructured":"Song X, Peng Z, Song S, Stojanovic V (2024) Anti-disturbance state estimation for pdt-switched rdnns utilizing time-sampling and space-splitting measurements. Commun Nonlinear Sci Numer Simul 132:107945","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"10","key":"1913_CR10","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1177\/01423312231225782","volume":"46","author":"Y Tao","year":"2024","unstructured":"Tao Y, Tao H, Zhuang Z, Stojanovic V, Paszke W (2024) Quantized iterative learning control of communication-constrained systems with encoding and decoding mechanism. Trans Inst Meas Control 46(10):1943\u20131954","journal-title":"Trans Inst Meas Control"},{"key":"1913_CR11","unstructured":"Baker B, Kanitscheider I, Markov T, Wu Y, Powell G, McGrew B, Mordatch I (2019) Emergent tool use from multi-agent interaction. Machine Learning, Cornell University. https:\/\/openai.com\/index\/emergent-tool-use\/"},{"key":"1913_CR12","doi-asserted-by":"crossref","unstructured":"Wang Q, He S, Zheng X, Zeng D (2019) Marketing pattern risks detection based on semi-supervised learning. In: 2019 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 229\u2013229","DOI":"10.1109\/ISI.2019.8823291"},{"key":"1913_CR13","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2021.08.023","volume":"128","author":"L Liu","year":"2022","unstructured":"Liu L, Tsai W-T, Bhuiyan M, Peng H, Liu M (2022) Blockchain-enabled fraud discovery through abnormal smart contract detection on ethereum. Futur Gener Comput Syst 128:158\u2013166","journal-title":"Futur Gener Comput Syst"},{"key":"1913_CR14","doi-asserted-by":"crossref","unstructured":"Gao J, Tsai W-T, Paul R, Bai X, Uehara T (2014) Mobile testing-as-a-service (mtaas)\u2014infrastructures, issues, solutions and needs. In: 2014 IEEE 15th international symposium on high-assurance systems engineering. IEEE, pp 158\u2013167","DOI":"10.1109\/HASE.2014.30"},{"key":"1913_CR15","doi-asserted-by":"crossref","unstructured":"Wang R, Tsai W-T, He J, Liu C, Li Q, Deng E (2019) A video surveillance system based on permissioned blockchains and edge computing. In: 2019 IEEE international conference on big data and smart computing (BigComp). IEEE, pp 1\u20136","DOI":"10.1109\/BIGCOMP.2019.8679354"},{"key":"1913_CR16","doi-asserted-by":"crossref","unstructured":"Tsai W-T, Yang D, Wang R, Wang K, Xiang W, Deng E (2021) Strisa: a new regulation architecture to enforce travel rule. In: Silicon valley cybersecurity conference: first conference, SVCC 2020, San Jose, December 17\u201319, 2020, revised selected papers 1. Springer, pp 49\u201367","DOI":"10.1007\/978-3-030-72725-3_4"},{"key":"1913_CR17","doi-asserted-by":"crossref","unstructured":"Tsai W-T, Wang R, Liu S, Deng E, Yang D (2020) Compass: a data-driven blockchain evaluation framework. In: 2020 IEEE international conference on service oriented systems engineering (SOSE). IEEE, pp 17\u201330","DOI":"10.1109\/SOSE49046.2020.00010"},{"key":"1913_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11761-007-0018-8","volume":"1","author":"W-T Tsai","year":"2007","unstructured":"Tsai W-T, Wei X, Chen Y, Paul R, Chung J-Y, Zhang D (2007) Data provenance in soa: security, reliability, and integrity. SOCA 1:223\u2013247","journal-title":"SOCA"},{"issue":"4","key":"1913_CR19","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1111\/1468-2230.12628","volume":"84","author":"I Zavoli","year":"2021","unstructured":"Zavoli I, King C (2021) The challenges of implementing anti-money laundering regulation: an empirical analysis. Mod Law Rev 84(4):740\u2013771","journal-title":"Mod Law Rev"},{"key":"1913_CR20","doi-asserted-by":"crossref","unstructured":"Teichmann FM, Sergi BS (2018) Money laundering: challenges and solutions. In: Compliance in multinational corporations: business risks in bribery, money laundering, terrorism financing and sanctions, pp 31\u201368","DOI":"10.1108\/978-1-78756-867-920181003"},{"key":"1913_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100544","volume":"19","author":"J-PA Yaacoub","year":"2022","unstructured":"Yaacoub J-PA, Noura HN, Salman O, Chehab A (2022) Advanced digital forensics and anti-digital forensics for iot systems: techniques, limitations and recommendations. Internet Things 19:100544","journal-title":"Internet Things"},{"issue":"3","key":"1913_CR22","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/JMLC-07-2017-0031","volume":"21","author":"AS Irwin","year":"2018","unstructured":"Irwin AS, Turner AB (2018) Illicit bitcoin transactions: challenges in getting to the who, what, when and where. J Money Laund Control 21(3):297\u2013313","journal-title":"J Money Laund Control"},{"key":"1913_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101027","volume":"25","author":"A Amiri","year":"2024","unstructured":"Amiri A, Tavana M, Arman H (2024) An integrated fuzzy analytic network process and fuzzy regression method for bitcoin price prediction. Internet Things 25:101027","journal-title":"Internet Things"},{"key":"1913_CR24","doi-asserted-by":"crossref","unstructured":"Li X, Cao X, Qiu X, Zhao J, Zheng J (2017) Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In: 2017 5th international conference on advanced cloud and big data (CBD). IEEE, pp 176\u2013181","DOI":"10.1109\/CBD.2017.38"},{"key":"1913_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3457577","author":"Q Wang","year":"2024","unstructured":"Wang Q, Tsai W-T, Shi T (2024) Graphalm: active learning for detecting money laundering transactions on blockchain networks. IEEE Netw. https:\/\/doi.org\/10.1109\/MNET.2024.3457577","journal-title":"IEEE Netw"},{"issue":"1","key":"1913_CR26","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/s41746-024-01076-x","volume":"7","author":"J-N Eckardt","year":"2024","unstructured":"Eckardt J-N, Hahn W, R\u00f6llig C, Stasik S, Platzbecker U, M\u00fcller-Tidow C, Serve H, Baldus CD, Schliemann C, Sch\u00e4fer-Eckart K (2024) Mimicking clinical trials with synthetic acute myeloid leukemia patients using generative artificial intelligence. NPJ Digit Med 7(1):76","journal-title":"NPJ Digit Med"},{"key":"1913_CR27","doi-asserted-by":"crossref","unstructured":"Oztas B, Cetinkaya D, Adedoyin F, Budka M, Dogan H, Aksu G (2023) Enhancing anti-money laundering: development of a synthetic transaction monitoring dataset. In: 2023 IEEE international conference on e-business engineering (ICEBE). IEEE, pp 47\u201354","DOI":"10.1109\/ICEBE59045.2023.00028"},{"key":"1913_CR28","doi-asserted-by":"crossref","unstructured":"Pareja A, Domeniconi G, Chen J, Ma T, Suzumura T, Kanezashi H, Kaler T, Schardl T, Leiserson C (2020) Evolvegcn: evolving graph convolutional networks for dynamic graphs. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, pp 5363\u20135370","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"1913_CR29","doi-asserted-by":"crossref","unstructured":"Starnini M, Tsourakakis CE, Zamanipour M, Panisson A, Allasia W, Fornasiero M, Puma LL, Ricci V, Ronchiadin S, Ugrinoska A (2021) Smurf-based anti-money laundering in time-evolving transaction networks. In: Machine learning and knowledge discovery in databases. Applied data science track: European conference, ECML PKDD 2021, Bilbao, September 13\u201317, 2021, Proceedings, Part IV 21. Springer, pp 171\u2013186","DOI":"10.1007\/978-3-030-86514-6_11"},{"key":"1913_CR30","doi-asserted-by":"crossref","unstructured":"Harris DA, Pyndiura KL, Sturrock SL, Christensen RA (2022) Using real-world transaction data to identify money laundering: leveraging traditional regression and machine learning techniques. STEM Fellowsh J 7(1):21\u201332","DOI":"10.17975\/sfj-2021-006"},{"issue":"4","key":"1913_CR31","doi-asserted-by":"publisher","first-page":"4169","DOI":"10.1007\/s40747-022-00947-8","volume":"9","author":"I Ghosh","year":"2023","unstructured":"Ghosh I, Dragan P (2023) Can financial stress be anticipated and explained? Uncovering the hidden pattern using eemd-lstm, eemd-prophet, and xai methodologies. Complex Intell Syst 9(4):4169\u20134193","journal-title":"Complex Intell Syst"},{"key":"1913_CR32","doi-asserted-by":"crossref","unstructured":"Li X, Liu S, Li Z, Han X, Shi C, Hooi B, Huang H, Cheng X (2020) Flowscope: spotting money laundering based on graphs. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, pp 4731\u20134738","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"1913_CR33","doi-asserted-by":"crossref","unstructured":"Zhang K, Yang Z, Ba\u015far T (2021) Multi-agent reinforcement learning: a selective overview of theories and algorithms. In: Handbook of reinforcement learning and control, pp 321\u2013384","DOI":"10.1007\/978-3-030-60990-0_12"},{"key":"1913_CR34","doi-asserted-by":"crossref","unstructured":"Qiu Y, Shi M, Zhao X, Jing Y (2021) System dynamics mechanism of cross-regional collaborative dispatch of emergency supplies based on multi-agent game. Complex Intell Syst 1\u201312","DOI":"10.1007\/s40747-021-00303-2"},{"issue":"5555\/3295222","key":"1913_CR35","first-page":"3295385","volume":"10","author":"R Lowe","year":"2017","unstructured":"Lowe R, Wu YI, Tamar A, Harb J, Pieter Abbeel O, Mordatch I (2017) Multi-agent actor-critic for mixed cooperative-competitive environments. Adv Neural Inf Process Syst 10(5555\/3295222):3295385","journal-title":"Adv Neural Inf Process Syst"},{"key":"1913_CR36","unstructured":"Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv:1908.02591"},{"issue":"59","key":"1913_CR37","first-page":"1","volume":"17","author":"Y Ganin","year":"2016","unstructured":"Ganin Y, Ustinova E, Ajakan H, Germain P, Larochelle H, Laviolette F, March M, Lempitsky V (2016) Domain-adversarial training of neural networks. J Mach Learn Res 17(59):1\u201335","journal-title":"J Mach Learn Res"},{"issue":"3","key":"1913_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3631712","volume":"18","author":"R Cai","year":"2024","unstructured":"Cai R, Wu F, Li Z, Wei P, Yi L, Zhang K (2024) Graph domain adaptation: a generative view. ACM Trans Knowl Discov Data 18(3):1\u201324","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1913_CR39","unstructured":"You Y, Chen T, Wang Z, Shen Y (2023) Graph domain adaptation via theory-grounded spectral regularization. In: International conference on learning representations. https:\/\/api.semanticscholar.org\/CorpusID:259298628"},{"key":"1913_CR40","unstructured":"Xu Z, He H, Lee G-H, Wang Y, Wang H (2022) Graph-relational domain adaptation. arXiv:2202.03628"},{"key":"1913_CR41","doi-asserted-by":"crossref","unstructured":"Shi J, Wang X, Zhang M, Liu M, Zhu J, Wu Q (2024) A distributed adaptive policy gradient method based on momentum for multi-agent reinforcement learning. Complex Intell Syst 1\u201314","DOI":"10.1007\/s40747-024-01529-6"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01913-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01913-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01913-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T11:23:14Z","timestamp":1747480994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01913-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1913"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01913-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest in this study. All authors agree to publish.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"271"}}