{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:20:43Z","timestamp":1768281643190,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3642572","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:36:52Z","timestamp":1765564612000},"page":"1041-1063","source":"Crossref","is-referenced-by-count":0,"title":["Intent-Aware Multi-Source Hybrid Attention for Financial Fraud Detection and Capital Flow Prediction"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7772-8704","authenticated-orcid":false,"given":"Yuhan","family":"Wang","sequence":"first","affiliation":[{"name":"UNSW Business School (E12), UNSW Sydney, Kensington, NSW, Australia"}]},{"given":"Wenhao","family":"Kang","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2020.101694"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12294"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2006.05.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.irfa.2023.102566"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12273"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/restud\/rdt004"},{"key":"ref8","article-title":"CreditCard: Credit screening with machine learning models for business loans","volume":"22","author":"Zhang","year":"2022","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715166"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2866725"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2012.6339928"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.06.019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5086-2"},{"key":"ref17","article-title":"Can deep learning predict risky retail investors? A case study in financial risk behavior forecasting","author":"Yang","year":"2018","journal-title":"arXiv:1812.06175"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23551-2_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.02.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_5"},{"key":"ref21","article-title":"Feature importance analysis for financial fraud detection using explainable AI","volume":"23","author":"Zhao","year":"2023","journal-title":"Sensors"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.04.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.33"},{"key":"ref24","article-title":"A comprehensive survey of data mining-based fraud detection research","author":"Phua","year":"2010","journal-title":"arXiv:1009.6119"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3934\/mcrf.2019003"},{"key":"ref26","article-title":"Financial time series forecasting with multi-modality graph neural networks","volume":"21","author":"Chen","year":"2021","journal-title":"Sensors"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3302425.3302457"},{"key":"ref28","first-page":"998","article-title":"Anomaly detection on big data in financial markets","volume-title":"Proc. IEEE\/ACM Int. Conf. Adv. Social Netw. Anal. Mining (ASONAM)","author":"Ahmed"},{"key":"ref29","article-title":"Explainable deep learning for financial risk assessment with integrated gradients","volume":"22","author":"Wang","year":"2022","journal-title":"Sensors"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2024.049152"},{"key":"ref31","article-title":"Multi-head attention graph neural networks for mobile money fraud detection","volume":"22","author":"Xu","year":"2022","journal-title":"Sensors"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ECIT50008.2020.00060"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/app14177782"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/01443615.2021.1945006"},{"key":"ref36","article-title":"Realistic synthetic financial transactions for anti-money laundering models","author":"Altman","year":"2023","journal-title":"arXiv:2306.16424"},{"key":"ref37","article-title":"Mamba: Linear-time sequence modeling with selective state spaces","author":"Gu","year":"2023","journal-title":"arXiv:2312.00752"},{"key":"ref38","article-title":"Can KAN work? Exploring the potential of Kolmogorov\u2013Arnold networks in computer vision","author":"Cang","year":"2024","journal-title":"arXiv:2411.06727"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.04.057"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3426955"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-024-40474-y"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3440637"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d15-1166"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102596"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3166891"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11299533.pdf?arnumber=11299533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:52Z","timestamp":1768255372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11299533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3642572","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}