{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T15:15:22Z","timestamp":1772982922801,"version":"3.50.1"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2336204"],"award-info":[{"award-number":["U2336204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.130136","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T07:57:07Z","timestamp":1761638227000},"page":"130136","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PC","title":["RACLA: Role-aware continual learning for robust AML detection"],"prefix":"10.1016","volume":"299","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9969-2204","authenticated-orcid":false,"given":"Qian","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1179-4769","authenticated-orcid":false,"given":"Leyuan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6381-7657","authenticated-orcid":false,"given":"Tian","family":"Lan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6504-1241","authenticated-orcid":false,"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruidong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0001","doi-asserted-by":"crossref","first-page":"89","DOI":"10.54648\/EULR2017007","article-title":"Combating money laundering and terrorist financing: Monitoring the implementation of FATF recommendations","volume":"28","author":"Aamo","year":"2017","journal-title":"European Business Law Review"},{"issue":"2","key":"10.1016\/j.eswa.2025.130136_bib0002","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10940-024-09594-3","article-title":"A holistic network analysis of the money laundering threat landscape: Assessing criminal typologies, resilience and implications for disruption","volume":"41","author":"Akartuna","year":"2025","journal-title":"Journal of Quantitative Criminology"},{"key":"10.1016\/j.eswa.2025.130136_bib0003","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"3366","article-title":"Expert gate: Lifelong learning with a network of experts","author":"Aljundi","year":"2017"},{"key":"10.1016\/j.eswa.2025.130136_bib0004","doi-asserted-by":"crossref","unstructured":"Altman, E., Blanu\u0161a, J., von Niederh\u00e4usern, L., Egressy, B., Anghel, A., & Atasu, K. (2024). Realistic synthetic financial transactions for anti-money laundering models. https:\/\/arxiv.org\/abs\/2306.16424.","DOI":"10.52202\/075280-1300"},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0005","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-95672-w","article-title":"Graph convolution network for fraud detection in bitcoin transactions","volume":"15","author":"Asiri","year":"2025","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2025.130136_bib0006","series-title":"Proceedings of the 2007\u202fSIAM international conference on data mining","first-page":"443","article-title":"Learning from time-changing data with adaptive windowing","author":"Bifet","year":"2007"},{"key":"10.1016\/j.eswa.2025.130136_bib0007","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF01262717","article-title":"Smirnov\u2019s two-sample problem","volume":"12","author":"Borovskikh","year":"1979","journal-title":"Journal of Soviet Mathematics"},{"issue":"4","key":"10.1016\/j.eswa.2025.130136_bib0008","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1108\/JMLC-09-2017-0045","article-title":"Toward a new model of money laundering: Is the \u201cplacement, layering, integration\u201d model obsolete?","volume":"21","author":"Cassella","year":"2018","journal-title":"Journal of Money Laundering Control"},{"key":"10.1016\/j.eswa.2025.130136_bib0009","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10115-017-1144-z","article-title":"Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review","volume":"57","author":"Chen","year":"2018","journal-title":"Knowledge and Information Systems"},{"key":"10.1016\/j.eswa.2025.130136_bib0010","series-title":"The 2012 international joint conference on neural networks (IJCNN)","first-page":"1","article-title":"Feature selection via regularized trees","author":"Deng","year":"2012"},{"key":"10.1016\/j.eswa.2025.130136_bib0011","unstructured":"Dong, X., Zhang, X., Chen, L., Yuan, M., & Wang, S. (2025). SpaceGNN: Multi-space graph neural network for node anomaly detection with extremely limited labels. https:\/\/arxiv.org\/abs\/2502.03201."},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0012","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1177\/0145482X20901378","article-title":"Bonferroni correction and type I error","volume":"114","author":"Emerson","year":"2020","journal-title":"Journal of Visual Impairment & Blindness"},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2478\/ijssis-2024-0024","article-title":"Navigating the complexity of money laundering: anti\u2013money laundering advancements with AI\/ML insights","volume":"17","author":"Gandhi","year":"2024","journal-title":"International Journal on Smart Sensing and Intelligent Systems"},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0014","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1108\/JFC-02-2022-0041","article-title":"Reexamining the anti-money-laundering framework: A legal critique and new approach to combating money laundering","volume":"30","author":"Gilmour","year":"2022","journal-title":"Journal of Financial Crime"},{"key":"10.1016\/j.eswa.2025.130136_bib0015","series-title":"Agent technology: Foundations, applications, and markets","first-page":"283","article-title":"The finCEN AI system: Finding financial crimes in a large database of cash transactions","author":"Goldberg","year":"1998"},{"key":"10.1016\/j.eswa.2025.130136_bib0016","series-title":"Encyclopedia of systems biology","first-page":"154","article-title":"Bonferroni correction","author":"Haynes","year":"2013"},{"key":"10.1016\/j.eswa.2025.130136_bib0017","doi-asserted-by":"crossref","unstructured":"Hinder, F., Vaquet, V., & Hammer, B. (2023). One or two things we know about concept drift \u2013 a survey on monitoring evolving environments. https:\/\/arxiv.org\/abs\/2310.15826.","DOI":"10.3389\/frai.2024.1330257"},{"key":"10.1016\/j.eswa.2025.130136_bib0018","unstructured":"Hu, W., Liu, B., Gomes, J., Zitnik, M., Liang, P., Pande, V. S., & Leskovec, J. (2019). Pre-training graph neural networks. http:\/\/arxiv.org\/abs\/1905.12265."},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0019","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1162\/neco.1991.3.1.79","article-title":"Adaptive mixtures of local experts","volume":"3","author":"Jacobs","year":"1991","journal-title":"Neural Computation"},{"issue":"3","key":"10.1016\/j.eswa.2025.130136_bib0020","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MIS.2004.1","article-title":"Ai fights money laundering","volume":"19","author":"Kingdon","year":"2004","journal-title":"IEEE Intelligent Systems"},{"key":"10.1016\/j.eswa.2025.130136_bib0021","unstructured":"Kipf, T. N., & Welling, M. (2017). Semi-supervised classification with graph convolutional networks. https:\/\/arxiv.org\/abs\/1609.02907."},{"issue":"13","key":"10.1016\/j.eswa.2025.130136_bib0022","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1073\/pnas.1611835114","article-title":"Overcoming catastrophic forgetting in neural networks","volume":"114","author":"Kirkpatrick","year":"2017","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.eswa.2025.130136_bib0023","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2478\/ijssis-2024-0027","article-title":"Explainable deep learning model for predicting money laundering transactions","volume":"17","author":"Kute","year":"2024","journal-title":"International Journal on Smart Sensing and Intelligent Systems"},{"key":"10.1016\/j.eswa.2025.130136_bib0024","series-title":"Proceedings of the web conference 2021","first-page":"3168","article-title":"Pick and choose: A GNN-based imbalanced learning approach for fraud detection","author":"Liu","year":"2021"},{"issue":"12","key":"10.1016\/j.eswa.2025.130136_bib0025","first-page":"2346","article-title":"Learning under concept drift: A review","volume":"31","author":"Lu","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.eswa.2025.130136_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122156","article-title":"Financial fraud detection using graph neural networks: A systematic review","volume":"240","author":"Motie","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130136_bib0027","series-title":"European conference on principles of data mining and knowledge discovery","first-page":"251","article-title":"Unsupervised profiling for identifying superimposed fraud","author":"Murad","year":"1999"},{"issue":"1","key":"10.1016\/j.eswa.2025.130136_bib0028","first-page":"265","article-title":"Algorithm AS 288: Exact smirnov two-sample tests for arbitrary distributions","volume":"43","author":"Nikiforov","year":"1994","journal-title":"Journal of the Royal Statistical Society. Series C (Applied Statistics)"},{"issue":"4","key":"10.1016\/j.eswa.2025.130136_bib0029","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/ai6040069","article-title":"LineMVGNN: Anti-money laundering with line-graph-assisted multi-view graph neural networks","volume":"6","author":"Poon","year":"2025","journal-title":"AI"},{"issue":"6","key":"10.1016\/j.eswa.2025.130136_bib0030","doi-asserted-by":"crossref","first-page":"3611","DOI":"10.63332\/joph.v5i6.2493","article-title":"Emerging technological trends in financial crime and money laundering: A bibliometric analysis of cryptocurrency\u2019s role and global research collaboration","volume":"5","author":"Pramanik","year":"2025","journal-title":"Journal of Posthumanism"},{"key":"10.1016\/j.eswa.2025.130136_bib0031","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"2001","article-title":"iCaRl: Incremental classifier and representation learning","author":"Rebuffi","year":"2017"},{"key":"10.1016\/j.eswa.2025.130136_bib0032","series-title":"Role of sanctions and penalties in the EU\u2019s Anti-Money Laundering (AML) framework","author":"Soaga","year":"2025"},{"key":"10.1016\/j.eswa.2025.130136_bib0033","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., & Bengio, Y. (2018). Graph attention networks. https:\/\/arxiv.org\/abs\/1710.10903."},{"key":"10.1016\/j.eswa.2025.130136_bib0034","series-title":"2018\u202fIEEE International conference on data mining (ICDM)","first-page":"567","article-title":"Deep structure learning for fraud detection","author":"Wang","year":"2018"},{"key":"10.1016\/j.eswa.2025.130136_bib0035","unstructured":"Weber, M., Domeniconi, G., Chen, J., Weidele, D. K. I., Bellei, C., Robinson, T., & Leiserson, C. E. (2019). Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. https:\/\/arxiv.org\/abs\/1908.02591."},{"key":"10.1016\/j.eswa.2025.130136_bib0036","unstructured":"Xu, K., Hu, W., Leskovec, J., & Jegelka, S. (2018). How powerful are graph neural networks?http:\/\/arxiv.org\/abs\/1810.00826."},{"key":"10.1016\/j.eswa.2025.130136_bib0037","series-title":"Shs web of conferences","first-page":"01016","article-title":"Enhancing anti-money laundering detection with self-attention graph neural networks","volume":"vol. 213","author":"Yu","year":"2025"},{"key":"10.1016\/j.eswa.2025.130136_bib0038","series-title":"International conference on machine learning","first-page":"3987","article-title":"Continual learning through synaptic intelligence","author":"Zenke","year":"2017"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425037510?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425037510?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T08:58:55Z","timestamp":1772960335000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425037510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":38,"alternative-id":["S0957417425037510"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130136","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"RACLA: Role-aware continual learning for robust AML detection","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130136","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"130136"}}