{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:56:26Z","timestamp":1777492586922,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Swiss National Science Foundation","award":["172610"],"award-info":[{"award-number":["172610"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,14]]},"DOI":"10.1145\/3677052.3698674","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:38:06Z","timestamp":1731566286000},"page":"222-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Graph Feature Preprocessor: Real-time Subgraph-based Feature Extraction for Financial Crime Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4915-6551","authenticated-orcid":false,"given":"Jovan","family":"Blanu\u0161a","sequence":"first","affiliation":[{"name":"IBM Research Europe, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4580-936X","authenticated-orcid":false,"given":"Maximo","family":"Cravero Baraja","sequence":"additional","affiliation":[{"name":"Caltech, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6842-9036","authenticated-orcid":false,"given":"Andreea","family":"Anghel","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0916-5985","authenticated-orcid":false,"given":"Luc","family":"von Niederh\u00e4usern","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0978-0360","authenticated-orcid":false,"given":"Erik","family":"Altman","sequence":"additional","affiliation":[{"name":"IBM Watson Research, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5084-6651","authenticated-orcid":false,"given":"Haris","family":"Pozidis","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4315-6780","authenticated-orcid":false,"given":"Kubilay","family":"Atasu","sequence":"additional","affiliation":[{"name":"TU Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Erik Altman Jovan Blanu\u0161a Luc von Niederh\u00e4usern B\u00e9ni Egressy Andreea Anghel and Kubilay Atasu. 2023. Realistic Synthetic Financial Transactions for Anti-Money Laundering Models. In NeurIPS\u201923 Datasets and Benchmarks Track."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2023. Amazon Fraud Detector. https:\/\/aws.amazon.com\/fraud-detector\/ Accessed: 2023-01-10."},{"key":"e_1_3_2_1_3_1","volume-title":"Graph Theory","author":"Balakrishnan V\u00a0K","unstructured":"V\u00a0K Balakrishnan. 1997. Graph Theory. McGraw-Hill Professional, New York, NY."},{"key":"e_1_3_2_1_4_1","volume-title":"Relational inductive biases, deep learning, and graph networks. arXiv preprint arXiv:1806.01261","author":"Battaglia W","year":"2018","unstructured":"Peter\u00a0W Battaglia, Jessica\u00a0B Hamrick, Victor Bapst, Alvaro Sanchez-Gonzalez, Vinicius Zambaldi, Mateusz Malinowski, Andrea Tacchetti, David Raposo, Adam Santoro, Ryan Faulkner, 2018. Relational inductive biases, deep learning, and graph networks. arXiv preprint arXiv:1806.01261 (2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aad9029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490148.3538585"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611642"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3154319"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362342.362367"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352126"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533271.3561727"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2867497"},{"key":"e_1_3_2_1_13_1","unstructured":"Liang Chen Jiaying Peng Yang Liu Jintang Li Fenfang Xie and Zibin Zheng. 2019. XBLOCK Blockchain Datasets: InPlusLab Ethereum Phishing Detection Datasets. http:\/\/xblock.pro\/ethereum\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_20"},{"key":"e_1_3_2_1_16_1","volume-title":"NeurIPS 2020","author":"Chen Zhengdao","year":"2020","unstructured":"Zhengdao Chen, Lei Chen, Soledad Villar, and Joan Bruna. 2020. Can Graph Neural Networks Count Substructures?. In NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc\u2019Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.)."},{"key":"e_1_3_2_1_17_1","unstructured":"IBM Cloud. 2024. IBM Cloud Docs - Virtual Private Cloud (VPC). https:\/\/cloud.ibm.com\/docs\/vpc Accessed: 2024-02-08."},{"key":"e_1_3_2_1_18_1","unstructured":"Thomas\u00a0H. Cormen (Ed.). 2009. Introduction to algorithms (3rd ed ed.). MIT Press Cambridge Mass. OCLC: ocn311310321."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-10-2019-0137"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.F. Balcan, and H.\u00a0Lin (Eds.). Vol.\u00a033. Curran Associates","author":"Corso Gabriele","unstructured":"Gabriele Corso, Luca Cavalleri, Dominique Beaini, Pietro Li\u00f2, and Petar Veli\u010dkovi\u0107. 2020. Principal Neighbourhood Aggregation for Graph Nets. In Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.F. Balcan, and H.\u00a0Lin (Eds.). Vol.\u00a033. Curran Associates, Inc., 13260\u201313271."},{"key":"e_1_3_2_1_21_1","volume-title":"Q3","author":"Cser Andras","year":"2022","unstructured":"Andras Cser, Merritt Maxix, Caroline Provost, and Peggy Dostie. 2022. The Forrester Wave\u2122: Anti-Money-Laundering Solutions, Q3 2022. Technical Report. Forrester. 1\u201310 pages. https:\/\/www.forrester.com\/report\/the-forrester-wave-tm-anti-money-laundering-solutions-q3-2022\/RES176346Accessed: 2023-01-10."},{"key":"e_1_3_2_1_22_1","unstructured":"Ahmad\u00a0Naser Eddin Jacopo Bono David Apar\u00edcio David Polido Jo\u00e3o\u00a0Tiago Ascens\u00e3o Pedro Bizarro and Pedro Ribeiro. 2022. Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs. arXiv:2112.07508 [cs]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186183"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_1_25_1","volume-title":"Incremental calculation of weighted mean and variance. (01","author":"Finch Tony","year":"2009","unstructured":"Tony Finch. 2009. Incremental calculation of weighted mean and variance. (01 2009), 1\u20138."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbab159"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3600270.3600307"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55814-7_12"},{"key":"e_1_3_2_1_29_1","unstructured":"William\u00a0L. Hamilton Rex Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2012.03.001"},{"key":"e_1_3_2_1_31_1","volume-title":"Strategies for pre-training graph neural networks. arXiv preprint arXiv:1905.12265","author":"Hu Weihua","year":"2019","unstructured":"Weihua Hu, Bowen Liu, Joseph Gomes, Marinka Zitnik, Percy Liang, Vijay Pande, and Jure Leskovec. 2019. Strategies for pre-training graph neural networks. arXiv preprint arXiv:1905.12265 (2019)."},{"key":"e_1_3_2_1_32_1","unstructured":"IBM. 2023. AI Toolkit for IBM Z and LinuxONE. https:\/\/www.ibm.com\/products\/ai-toolkit-for-z-and-linuxone Accessed: 2024-01-25."},{"key":"e_1_3_2_1_33_1","unstructured":"IBM. 2023. Cloud Pak for Data. https:\/\/www.ibm.com\/products\/cloud-pak-for-data Accessed: 2023-02-21."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.5407133"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814096"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/21649502.2013.802877"},{"key":"e_1_3_2_1_37_1","unstructured":"Hiroki Kanezashi Toyotaro Suzumura Xin Liu and Takahiro Hirofuchi. 2022. Ethereum Fraud Detection with Heterogeneous Graph Neural Networks. arXiv:2203.12363 [cs]."},{"key":"e_1_3_2_1_38_1","volume-title":"Advances in Neural Information Processing Systems, Vol.\u00a030. Curran Associates","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. In Advances in Neural Information Processing Systems, Vol.\u00a030. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/6449f44a102fde848669bdd9eb6b76fa-Paper.pdf"},{"key":"e_1_3_2_1_39_1","volume-title":"Money Laundering: A Guide for Criminal Investigators","author":"Kinnison Nancy","year":"2011","unstructured":"Nancy Kinnison and John Madinger (Eds.). 2011. Money Laundering: A Guide for Criminal Investigators, Third Edition. Routledge, Boston, MA."},{"key":"e_1_3_2_1_40_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations.","author":"N.","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1201\/b16923"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378346"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062652"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-23932-z"},{"key":"e_1_3_2_1_47_1","volume-title":"Advances in Neural Information Processing Systems 30. Curran Associates","author":"Lundberg M","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems 30. Curran Associates, Inc., 4765\u20134774."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/0205007"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134076"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134076"},{"key":"e_1_3_2_1_51_1","unstructured":"Catarina Oliveira Jo\u00e3o Torres Maria\u00a0In\u00eas Silva David Apar\u00edcio Jo\u00e3o\u00a0Tiago Ascens\u00e3o and Pedro Bizarro. 2021. GuiltyWalker: Distance to illicit nodes in the Bitcoin network. arXiv:2102.05373 [cs]."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0076-8"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004930070035"},{"key":"e_1_3_2_1_55_1","volume-title":"AAAI\u201921","author":"Qin Xiao","unstructured":"Xiao Qin, Nasrullah Sheikh, Berthold Reinwald, and Lingfei Wu. 2021. Relation-aware Graph Attention Model with Adaptive Self-adversarial Training. In AAAI\u201921. AAAI Press, 9368\u20139376."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3229874"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/3494124.3494128"},{"key":"e_1_3_2_1_58_1","unstructured":"C++ reference. 2023. std::unordered_map. https:\/\/en.cppreference.com\/w\/cpp\/container\/unordered_map Accessed: 2023-02-21."},{"key":"e_1_3_2_1_59_1","unstructured":"IBM Research. 2022. Graph Feature Preprocessor Public Examples. https:\/\/github.com\/IBM\/snapml-examples\/blob\/main\/examples\/graph_feature_preprocessor\/graph_feature_preprocessor.ipynb Accessed: 2023-03-3."},{"key":"e_1_3_2_1_60_1","unstructured":"IBM Research. 2022. Graph Feature PreprocessorDocumentation. https:\/\/snapml.readthedocs.io\/en\/latest\/graph_preprocessor.html Accessed: 2023-01-10."},{"key":"e_1_3_2_1_61_1","unstructured":"IBM Research. 2022. Snap ML PyPI package. https:\/\/pypi.org\/project\/snapml\/ Accessed: 2023-01-10."},{"key":"e_1_3_2_1_62_1","volume-title":"Chasing Dirty Money: The Fight Against Money Laundering","author":"Reuter Peter","unstructured":"Peter Reuter and Edwin\u00a0M. Truman. 2004. Chasing Dirty Money: The Fight Against Money Laundering. Institute for International Economics, Washington, DC, Chapter Money Laundering: Methods and Markets."},{"key":"e_1_3_2_1_63_1","unstructured":"Evan Rivera Jovan Blanu\u0161a Jawaharlal Rajan Alexis Landis and Haris Pozidis. 2024. AI on IBM Z Anti-Money Laundering Solution Template. https:\/\/github.com\/ambitus\/aionz-st-anti-money-laundering Accessed: 2024-10-02."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0047"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00325-y"},{"key":"e_1_3_2_1_66_1","volume-title":"Scikit-learn: Preprocessing Data. https:\/\/scikit-learn.org\/stable\/modules\/preprocessing.html Accessed: 2023-01-16.","year":"2022","unstructured":"scikit-learn developers. 2022. Scikit-learn: Preprocessing Data. https:\/\/scikit-learn.org\/stable\/modules\/preprocessing.html Accessed: 2023-01-16."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86514-6_11"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380581"},{"key":"e_1_3_2_1_69_1","unstructured":"Toyotaro Suzumura and Hiroki Kanezashi. 2021. Anti-Money Laundering Datasets: InPlusLab Anti-Money Laundering DataDatasets. http:\/\/github.com\/IBM\/AMLSim\/."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8020-5_2"},{"key":"e_1_3_2_1_71_1","volume-title":"Graph Attention Networks. International Conference on Learning Representations","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. International Conference on Learning Representations (2018)."},{"key":"e_1_3_2_1_72_1","volume-title":"Deep Graph Infomax.ICLR (Poster) 2, 3","author":"Velickovic Petar","year":"2019","unstructured":"Petar Velickovic, William Fedus, William\u00a0L Hamilton, Pietro Li\u00f2, Yoshua Bengio, and R\u00a0Devon Hjelm. 2019. Deep Graph Infomax.ICLR (Poster) 2, 3 (2019), 4."},{"key":"e_1_3_2_1_73_1","unstructured":"Samourai Wallet. 2021. Whirlpool Coinjoin. https:\/\/samouraiwallet.com\/whirlpool"},{"key":"e_1_3_2_1_74_1","volume-title":"A Review on Graph Neural Network Methods in Financial Applications. CoRR abs\/2111.15367","author":"Wang Jianian","year":"2021","unstructured":"Jianian Wang, Sheng Zhang, Yanghua Xiao, and Rui Song. 2021. A Review on Graph Neural Network Methods in Financial Applications. CoRR abs\/2111.15367 (2021). arXiv:2111.15367"},{"key":"e_1_3_2_1_75_1","volume-title":"Claudio Bellei, Tom Robinson, and Charles\u00a0E Leiserson.","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl\u00a0I Weidele, Claudio Bellei, Tom Robinson, and Charles\u00a0E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"e_1_3_2_1_77_1","unstructured":"Xblock. 2024. Ethereum Phishing Transaction Network. https:\/\/www.kaggle.com\/datasets\/xblock\/ethereum-phishing-transaction-network Accessed: 2023-01-27."},{"key":"e_1_3_2_1_78_1","volume-title":"How powerful are graph neural networks?arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks?arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_1_79_1","volume-title":"Motif-based Graph Self-Supervised Learning for Molecular Property Prediction. CoRR abs\/2110.00987","author":"Zhang Zaixi","year":"2021","unstructured":"Zaixi Zhang, Qi Liu, Hao Wang, Chengqiang Lu, and Cheekong Lee. 2021. Motif-based Graph Self-Supervised Learning for Molecular Property Prediction. CoRR abs\/2110.00987 (2021). arXiv:2110.00987"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380172"}],"event":{"name":"ICAIF '24: 5th ACM International Conference on AI in Finance","location":"Brooklyn NY USA","acronym":"ICAIF '24"},"container-title":["Proceedings of the 5th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677052.3698674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:28Z","timestamp":1755882628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":80,"alternative-id":["10.1145\/3677052.3698674","10.1145\/3677052"],"URL":"https:\/\/doi.org\/10.1145\/3677052.3698674","relation":{},"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"2024-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}