{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:08:40Z","timestamp":1768561720758,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-025-00702-1","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T12:35:43Z","timestamp":1745843743000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Weirdnodes: centrality based anomaly detection on temporal networks for the anti-financial crime domain"],"prefix":"10.1007","volume":"10","author":[{"given":"Salvatore","family":"Vilella","sequence":"first","affiliation":[]},{"given":"Arthur","family":"Capozzi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Fornasiero","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Moncalvo","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Ricci","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Ronchiadin","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Ruffo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"702_CR1","doi-asserted-by":"crossref","unstructured":"Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: Proceedings of PAKDD 2010, Hyderabad, India, June 21-24, 2010. Part II 14, pp 410\u2013421. Springer","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"702_CR2","unstructured":"Altman E, Egressy B, Blanu\u0161a J, Atasu K (2023) Realistic synthetic financial transactions for anti-money laundering models. arXiv preprint arXiv:2306.16424"},{"issue":"3","key":"702_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv"},{"key":"702_CR4","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","volume":"57","author":"Z Chen","year":"2018","unstructured":"Chen Z, Le DV-K, Teoh E, Nazir A, Karuppiah E, Lam K (2018) Machine learning techniques for anti-money laundering (aml) solutions in suspicious transaction detection: a review. Knowl Inf Syst 57:245\u2013285","journal-title":"Knowl Inf Syst"},{"key":"702_CR5","unstructured":"Commission TE (2024) High risk third countries and the international context content of anti-money laundering and countering. https:\/\/t.ly\/Lvwcd"},{"issue":"4","key":"702_CR6","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0378-8733(03)00012-1","volume":"25","author":"E Costenbader","year":"2003","unstructured":"Costenbader E, Valente TW (2003) The stability of centrality measures when networks are sampled. Soc Netw 25(4):283\u2013307","journal-title":"Soc Netw"},{"issue":"7","key":"702_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0100338","volume":"9","author":"T Deguchi","year":"2014","unstructured":"Deguchi T, Takahashi K, Takayasu H, Takayasu M (2014) Hubs and authorities in the world trade network using a weighted hits algorithm. PLoS ONE 9(7):1\u201316","journal-title":"PLoS ONE"},{"key":"702_CR8","doi-asserted-by":"crossref","unstructured":"Dou Y, Liu Z, Sun L, Deng Y, Peng H, Yu PS (2020) Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp 315\u2013324","DOI":"10.1145\/3340531.3411903"},{"key":"702_CR9","doi-asserted-by":"publisher","first-page":"47699","DOI":"10.1109\/ACCESS.2022.3170467","volume":"10","author":"B Dumitrescu","year":"2022","unstructured":"Dumitrescu B, B\u0103ltoiu A, Budulan \u015e (2022) Anomaly detection in graphs of bank transactions for anti money laundering applications. IEEE Access 10:47699\u201347714","journal-title":"IEEE Access"},{"key":"702_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"A Fronzetti Colladon","year":"2017","unstructured":"Fronzetti Colladon A, Remondi E (2017) Using social network analysis to prevent money laundering. Expert Syst Appl 67:49\u201358. https:\/\/doi.org\/10.1016\/j.eswa.2016.09.029","journal-title":"Expert Syst Appl"},{"key":"702_CR11","doi-asserted-by":"crossref","unstructured":"Galdeman A, Zignani M, Gaito S (2023) Unfolding temporal networks through statistically significant graph evolution rules. In: 2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA), pp 1\u201310. IEEE","DOI":"10.1109\/DSAA60987.2023.10302496"},{"issue":"4","key":"702_CR12","first-page":"159","volume":"239","author":"IG Garc\u00eda","year":"2021","unstructured":"Garc\u00eda IG, Mateos A (2021) Use of social network analysis for tax control in Spain. Hacienda P\u00fablica Espa\u00f1ola \/ Rev Public Econ 239(4):159\u2013197","journal-title":"Hacienda P\u00fablica Espa\u00f1ola \/ Rev Public Econ"},{"key":"702_CR13","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-04-2020-0033","author":"O Garcia-Bedoya","year":"2020","unstructured":"Garcia-Bedoya O, Granados O, Burgos J (2020) Ai against money laundering networks: the colombian case. J Money Laundering Control ahead-of-print. https:\/\/doi.org\/10.1108\/JMLC-04-2020-0033","journal-title":"J Money Laundering Control ahead-of-print"},{"key":"702_CR14","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/978-3-642-35063-4_45","volume-title":"Web information systems engineering - WISE 2012","author":"R Hassanzadeh","year":"2012","unstructured":"Hassanzadeh R, Nayak R, Stebila D (2012) Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. In: Wang XS, Cruz I, Delis A, Huang G (eds) Web information systems engineering - WISE 2012. Springer, Berlin, Heidelberg, pp 624\u2013630"},{"key":"702_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85\u2013126. https:\/\/doi.org\/10.1023\/B:AIRE.0000045502.10941.a9","journal-title":"Artif Intell Rev"},{"key":"702_CR16","doi-asserted-by":"crossref","unstructured":"Jiang J, Hu Y, Li X, Ouyang W, Wang Z, Fu F, Cui B (2022) Analyzing online transaction networks with network motifs. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 3098\u20133106","DOI":"10.1145\/3534678.3539096"},{"key":"702_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00693-0","volume":"10","author":"O Kardos","year":"2020","unstructured":"Kardos O, London A, Vink\u00f3 T (2020) Stability of network centrality measures: a numerical study. Soc Netw Anal Min 10:1\u201317","journal-title":"Soc Netw Anal Min"},{"issue":"2","key":"702_CR18","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.eij.2015.11.004","volume":"17","author":"R Kaur","year":"2016","unstructured":"Kaur R, Singh S (2016) A survey of data mining and social network analysis based anomaly detection techniques. Egyptian Inf J 17(2):199\u2013216. https:\/\/doi.org\/10.1016\/j.eij.2015.11.004","journal-title":"Egyptian Inf J"},{"key":"702_CR19","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.procs.2016.02.102","volume":"78","author":"R Kaur","year":"2016","unstructured":"Kaur R, Kaur M, Singh S (2016) A novel graph centrality based approach to analyze anomalous nodes with negative behavior. Procedia Comput Sci 78:556\u2013562. https:\/\/doi.org\/10.1016\/j.procs.2016.02.102","journal-title":"Procedia Comput Sci"},{"key":"702_CR20","doi-asserted-by":"publisher","first-page":"82300","DOI":"10.1109\/ACCESS.2021.3086230","volume":"9","author":"DV Kute","year":"2021","unstructured":"Kute DV, Pradhan B, Shukla N, Alamri A (2021) Deep learning and explainable artificial intelligence techniques applied for detecting money laundering-a critical review. IEEE Access 9:82300\u201382317. https:\/\/doi.org\/10.1109\/ACCESS.2021.3086230","journal-title":"IEEE Access"},{"issue":"04","key":"702_CR21","doi-asserted-by":"publisher","first-page":"4973","DOI":"10.1609\/aaai.v34i04.5936","volume":"34","author":"Z Liu","year":"2020","unstructured":"Liu Z, Zhou D, Zhu Y, Gu J, He J (2020) Towards fine-grained temporal network representation via time-reinforced random walk. Proc AAAI Conf Artif Intell 34(04):4973\u20134980. https:\/\/doi.org\/10.1609\/aaai.v34i04.5936","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"702_CR22","doi-asserted-by":"crossref","unstructured":"Liu Y, Ao X, Qin Z, Chi J, Feng J, Yang H, He Q (2021) Pick and choose: a gnn-based imbalanced learning approach for fraud detection. In: Proceedings of the Web Conference 2021, pp 3168\u20133177","DOI":"10.1145\/3442381.3449989"},{"key":"702_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to Information Retrieval. Cambridge University Press, Cambridge, UK"},{"key":"702_CR24","doi-asserted-by":"publisher","unstructured":"Mihiri\u00a0Shashikala HB, George R, Shujaee KA (2015) Outlier detection in network data using the betweenness centrality. In: SoutheastCon 2015, pp 1\u20135. https:\/\/doi.org\/10.1109\/SECON.2015.7133008","DOI":"10.1109\/SECON.2015.7133008"},{"key":"702_CR25","doi-asserted-by":"publisher","unstructured":"Mitchell C, Agrawal R, Parker J (2019) The effectiveness of edge centrality measures for anomaly detection. In: 2019 IEEE International Conference on Big Data (Big Data), pp 5022\u20135027. https:\/\/doi.org\/10.1109\/BigData47090.2019.9006468","DOI":"10.1109\/BigData47090.2019.9006468"},{"key":"702_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122156","volume":"240","author":"S Motie","year":"2023","unstructured":"Motie S, Raahemi B (2023) Financial fraud detection using graph neural networks: a systematic review. Expert Syst Appl 240:122156","journal-title":"Expert Syst Appl"},{"key":"702_CR27","doi-asserted-by":"publisher","unstructured":"Pan J (2022) Deep set classifier for financial forensics: an application to detect money laundering. https:\/\/doi.org\/10.48550\/ARXIV.2207.07863","DOI":"10.48550\/ARXIV.2207.07863"},{"key":"702_CR28","doi-asserted-by":"crossref","unstructured":"Peng Z, Luo M, Li J, Liu H, Zheng Q et al. (2018) Anomalous: a joint modeling approach for anomaly detection on attributed networks. In: IJCAI, vol 18, pp 3513\u20133519","DOI":"10.24963\/ijcai.2018\/488"},{"key":"702_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89803-2_7","volume-title":"Learning from data streams in evolving environments. Studies in big data","author":"F Pereira","year":"2019","unstructured":"Pereira F, Tabassum S, Gama J, de Amo S, Oliveira G (2019) Processing evolving social networks for change detection based on centrality measures. In: Sayed-Mouchaweh M (ed) Learning from data streams in evolving environments. Studies in big data, vol 41. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-89803-2_7"},{"issue":"3","key":"702_CR30","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/wics.1347","volume":"7","author":"S Ranshous","year":"2015","unstructured":"Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF (2015) Anomaly detection in dynamic networks: a survey. WIREs Comput Stat 7(3):223\u2013247. https:\/\/doi.org\/10.1002\/wics.1347","journal-title":"WIREs Comput Stat"},{"key":"702_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.socnet.2014.05.002","volume":"39","author":"D Savage","year":"2014","unstructured":"Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62\u201370. https:\/\/doi.org\/10.1016\/j.socnet.2014.05.002","journal-title":"Soc Netw"},{"issue":"3","key":"702_CR32","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TSP.2015.2486740","volume":"64","author":"S Segarra","year":"2015","unstructured":"Segarra S, Ribeiro A (2015) Stability and continuity of centrality measures in weighted graphs. IEEE Trans Signal Process 64(3):543\u2013555","journal-title":"IEEE Trans Signal Process"},{"key":"702_CR33","doi-asserted-by":"crossref","unstructured":"Shi F, Cao Y, Shang Y, Zhou Y, Zhou C, Wu J (2022) H2-fdetector: a gnn-based fraud detector with homophilic and heterophilic connections. In: Proceedings of the ACM Web Conference 2022, pp 1486\u20131494","DOI":"10.1145\/3485447.3512195"},{"key":"702_CR34","unstructured":"Society TL (2024) High-risk third countries for AML purposes https:\/\/t.ly\/qn2iK"},{"key":"702_CR35","doi-asserted-by":"crossref","unstructured":"Starnini M, Tsourakakis CE, Zamanipour M, Panisson A, Allasia W, Fornasiero M, Puma LL, Ricci V, Ronchiadin S, et al.: Smurf-based anti-money laundering in time-evolving transaction networks. In: Proceedings of ECML PKDD 2021, Part IV 21. Bilbao, Spain, Sept. 13\u201317, 2021, pp 171\u2013186 (2021). Springer","DOI":"10.1007\/978-3-030-86514-6_11"},{"issue":"1","key":"702_CR36","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/j.eswa.2010.07.143","volume":"38","author":"L \u0160ubelj","year":"2011","unstructured":"\u0160ubelj L, Furlan \u0160, Bajec M (2011) An expert system for detecting automobile insurance fraud using social network analysis. Expert Syst Appl 38(1):1039\u20131052","journal-title":"Expert Syst Appl"},{"key":"702_CR37","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","volume":"75","author":"V Van Vlasselaer","year":"2015","unstructured":"Van Vlasselaer V, Bravo C, Caelen O, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B (2015) Apate: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decis Support Syst 75:38\u201348","journal-title":"Decis Support Syst"},{"issue":"9","key":"702_CR38","doi-asserted-by":"publisher","first-page":"3090","DOI":"10.1287\/mnsc.2016.2489","volume":"63","author":"V Van Vlasselaer","year":"2017","unstructured":"Van Vlasselaer V, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B (2017) Gotcha! network-based fraud detection for social security fraud. Manage Sci 63(9):3090\u20133110","journal-title":"Manage Sci"},{"key":"702_CR39","doi-asserted-by":"crossref","unstructured":"Van\u00a0Vlasselaer V, Akoglu L, Eliassi-Rad T, Snoeck M, Baesens B (2015) Guilt-by-constellation: Fraud detection by suspicious clique memberships. In: 2015 48th Hawaii International Conference on System Sciences, pp 918\u2013927. IEEE","DOI":"10.1109\/HICSS.2015.114"},{"key":"702_CR40","doi-asserted-by":"crossref","unstructured":"Van\u00a0Vlasselaer V, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B (2015) Afraid: fraud detection via active inference in time-evolving social networks. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp 659\u2013666","DOI":"10.1145\/2808797.2810058"},{"issue":"4","key":"702_CR41","first-page":"1","volume":"35","author":"S Wang","year":"2017","unstructured":"Wang S, Zhang X, Cao J, He L, Stenneth L, Yu PS, Li Z, Huang Z (2017) Computing urban traffic congestions by incorporating sparse GPS probe data and social media data. ACM Trans Inf Syst (TOIS) 35(4):1\u201330","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"702_CR42","unstructured":"Weber M, Chen J, Suzumura T, Pareja A, Ma T, Kanezashi H, Kaler T, Leiserson CE, Schardl TB (2018) Scalable graph learning for anti-money laundering: a first look. CoRR arXiv:abs\/1812.00076"},{"issue":"7","key":"702_CR43","doi-asserted-by":"publisher","first-page":"3122","DOI":"10.1080\/03610918.2021.1928192","volume":"52","author":"AA Zaki","year":"2023","unstructured":"Zaki AA, Saleh NA, Mahmoud MA (2023) Performance comparison of some centrality measures used in detecting anomalies in directed social networks. Commun Stat-Simul Comput 52(7):3122\u20133136. https:\/\/doi.org\/10.1080\/03610918.2021.1928192","journal-title":"Commun Stat-Simul Comput"},{"issue":"3","key":"702_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474379","volume":"40","author":"G Zhang","year":"2022","unstructured":"Zhang G, Li Z, Huang J, Wu J, Zhou C, Yang J, Gao J (2022) efraudcom: An e-commerce fraud detection system via competitive graph neural networks. ACM Transactions on Information Systems (TOIS) 40(3):1\u201329","journal-title":"ACM Transactions on Information Systems (TOIS)"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00702-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00702-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00702-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T12:36:00Z","timestamp":1745843760000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00702-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["702"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00702-1","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"16 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare(s) that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"14"}}