{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:37:16Z","timestamp":1758807436208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:00:00Z","timestamp":1602720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,15]]},"DOI":"10.1145\/3383455.3422536","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:51:48Z","timestamp":1633618308000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Simulating and classifying behavior in adversarial environments based on action-state traces"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Borrajo","sequence":"first","affiliation":[{"name":"J.P.Morgan AI Research"}]},{"given":"Manuela","family":"Veloso","sequence":"additional","affiliation":[{"name":"J.P.Morgan AI Research"}]},{"given":"Sameena","family":"Shah","sequence":"additional","affiliation":[{"name":"J.P.Morgan AI Research"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the World Conference on Soft Computing.","author":"Chen Yu-To","year":"2011","unstructured":"Yu-To Chen and Johan Mathe . 2011 . Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring . In Proceedings of the World Conference on Soft Computing. Yu-To Chen and Johan Mathe. 2011. Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring. In Proceedings of the World Conference on Soft Computing."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1144-z"},{"volume-title":"Relational Data Mining","author":"Dzeroski Saso","key":"e_1_3_2_1_4_1","unstructured":"Saso Dzeroski and Nada Lavrac . 2010. Relational Data Mining . Springer . Saso Dzeroski and Nada Lavrac. 2010. Relational Data Mining. Springer."},{"volume-title":"Relational Instance Based Learning. In Machine Learning - Proceedings 13th International Conference on Machine Learning, Lorenza Saitta (Ed.). Morgan Kaufmann Publishers, 122 -- 130","author":"Emde W.","key":"e_1_3_2_1_5_1","unstructured":"W. Emde and D. Wettschereck . 1996 . Relational Instance Based Learning. In Machine Learning - Proceedings 13th International Conference on Machine Learning, Lorenza Saitta (Ed.). Morgan Kaufmann Publishers, 122 -- 130 . W. Emde and D. Wettschereck. 1996. Relational Instance Based Learning. In Machine Learning - Proceedings 13th International Conference on Machine Learning, Lorenza Saitta (Ed.). Morgan Kaufmann Publishers, 122 -- 130."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.029"},{"key":"e_1_3_2_1_7_1","volume-title":"Preprints of Workshop on International Planning Competition (IPC), ICAPS.","author":"Fuentetaja Raquel","year":"2011","unstructured":"Raquel Fuentetaja . 2011 . The CBP planner . In Preprints of Workshop on International Planning Competition (IPC), ICAPS. Raquel Fuentetaja. 2011. The CBP planner. In Preprints of Workshop on International Planning Competition (IPC), ICAPS."},{"key":"e_1_3_2_1_8_1","unstructured":"M. Ghallab A. Howe C. Knoblock D. McDermott A. Ram M. Veloso D. Weld and D. Wilkins. 1998. PDDL - the planning domain definition language. Technical Report CVC TR-98-003\/DCS TR-1165. Yale Center for Computational Vision and Control.  M. Ghallab A. Howe C. Knoblock D. McDermott A. Ram M. Veloso D. Weld and D. Wilkins. 1998. PDDL - the planning domain definition language . Technical Report CVC TR-98-003\/DCS TR-1165. Yale Center for Computational Vision and Control."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_3_2_1_10_1","volume-title":"Kim-Kwang Raymond Choo, and Lin Liu","author":"Irwin Angela","year":"2012","unstructured":"Angela Irwin , Kim-Kwang Raymond Choo, and Lin Liu . 2012 . Modelling of Money Laundering and Terrorism Financing Typologies. Journal of Money Laundering Control 15 (01 2012), 316. Angela Irwin, Kim-Kwang Raymond Choo, and Lin Liu. 2012. Modelling of Money Laundering and Terrorism Financing Typologies. Journal of Money Laundering Control 15 (01 2012), 316."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)01075-8"},{"key":"e_1_3_2_1_12_1","first-page":"547","article-title":"\u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura","volume":"37","author":"Jaccard Paul","year":"1901","unstructured":"Paul Jaccard . 1901 . \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura . Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles 37 (1901), 547 -- 579 . Paul Jaccard. 1901. \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles 37 (1901), 547--579.","journal-title":"Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.101"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2008.4635778"},{"volume-title":"The 27th workshop of Swedish Artificial Intelligence Society (SAIS). 33--40","author":"Lopez-Rojas E. A.","key":"e_1_3_2_1_16_1","unstructured":"E. A. Lopez-Rojas and S. Axelson . 2012. Money Laundering Detection using Synthetic Data . In The 27th workshop of Swedish Artificial Intelligence Society (SAIS). 33--40 . E. A. Lopez-Rojas and S. Axelson. 2012. Money Laundering Detection using Synthetic Data. In The 27th workshop of Swedish Artificial Intelligence Society (SAIS). 33--40."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.2.16"},{"key":"e_1_3_2_1_18_1","volume-title":"An overview of distance and similarity functions for structured data. Artificial Intelligence Review","author":"Ontan\u00f3n Santiago","year":"2020","unstructured":"Santiago Ontan\u00f3n . 2020. An overview of distance and similarity functions for structured data. Artificial Intelligence Review ( 2020 ), 1--43. Santiago Ontan\u00f3n. 2020. An overview of distance and similarity functions for structured data. Artificial Intelligence Review (2020), 1--43."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v7n1p103"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.162"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"e_1_3_2_1_22_1","volume-title":"Wong","author":"Senator Ted E.","year":"1995","unstructured":"Ted E. Senator , Henry G. Goldberg , Jerry Wooton , Matthew A. Cottini , A.F. Umar Khan , Christina D. Klinger , Winston M. Llamas , Michael P. Marrone , and Raphael W.H . Wong . 1995 . The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions. In Proceedings of IAAI. Ted E. Senator, Henry G. Goldberg, Jerry Wooton, Matthew A. Cottini, A.F. Umar Khan, Christina D. Klinger, Winston M. Llamas, Michael P. Marrone, and Raphael W.H. Wong. 1995. The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions. In Proceedings of IAAI."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/jleo\/ewp018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the International Conference on Machine Learning and Cybernetics.","author":"Wang Su-Nan","year":"2008","unstructured":"Su-Nan Wang and Jian-Gang Yang . 2008 . A Money Laundering Risk Evaluation Method Based on Decision Tree . In Proceedings of the International Conference on Machine Learning and Cybernetics. Su-Nan Wang and Jian-Gang Yang. 2008. A Money Laundering Risk Evaluation Method Based on Decision Tree. In Proceedings of the International Conference on Machine Learning and Cybernetics."},{"key":"e_1_3_2_1_26_1","volume-title":"Scalable Graph Learning for Anti-Money Laundering: A First Look. arXiv preprint arXiv:1812.00076","author":"Weber Mark","year":"2018","unstructured":"Mark Weber , Jie Chen , Toyotaro Suzumura , Aldo Pareja , Tengfei Ma , Hiroki Kanezashi , Tim Kaler , Charles E Leiserson , and Tao B Schardl . 2018. Scalable Graph Learning for Anti-Money Laundering: A First Look. arXiv preprint arXiv:1812.00076 ( 2018 ). Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki Kanezashi, Tim Kaler, Charles E Leiserson, and Tao B Schardl. 2018. Scalable Graph Learning for Anti-Money Laundering: A First Look. arXiv preprint arXiv:1812.00076 (2018)."}],"event":{"name":"ICAIF '20: ACM International Conference on AI in Finance","sponsor":["ACM Association for Computing Machinery"],"location":"New York New York","acronym":"ICAIF '20"},"container-title":["Proceedings of the First ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383455.3422536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:22Z","timestamp":1750199602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422536"}},"subtitle":["an application to money laundering"],"short-title":[],"issued":{"date-parts":[[2020,10,15]]},"references-count":26,"alternative-id":["10.1145\/3383455.3422536","10.1145\/3383455"],"URL":"https:\/\/doi.org\/10.1145\/3383455.3422536","relation":{},"subject":[],"published":{"date-parts":[[2020,10,15]]},"assertion":[{"value":"2021-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}