{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:59:37Z","timestamp":1772643577457,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T00:00:00Z","timestamp":1700870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3604237.3626882","type":"proceedings-article","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T18:09:47Z","timestamp":1700935787000},"page":"133-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The GANfather: Controllable generation of malicious activity to improve defence systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2759-2301","authenticated-orcid":false,"given":"Ricardo Ribeiro","family":"Pereira","sequence":"first","affiliation":[{"name":"Feedzai, Portugal and DCC \/ FCUP, University of Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9552-3151","authenticated-orcid":false,"given":"Jacopo","family":"Bono","sequence":"additional","affiliation":[{"name":"Feedzai, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6658-2099","authenticated-orcid":false,"given":"Jo\u00e3o Tiago","family":"Ascens\u00e3o","sequence":"additional","affiliation":[{"name":"Feedzai, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8250-041X","authenticated-orcid":false,"given":"David","family":"Apar\u00edcio","sequence":"additional","affiliation":[{"name":"DCC \/ FCUP, University of Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5768-1383","authenticated-orcid":false,"given":"Pedro","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"DCC \/ FCUP, University of Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5281-1970","authenticated-orcid":false,"given":"Pedro","family":"Bizarro","sequence":"additional","affiliation":[{"name":"Feedzai, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3031843"},{"key":"e_1_3_2_1_2_1","volume-title":"International conference on machine learning. PMLR, 214\u2013223","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214\u2013223."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI","author":"Burke Robin","year":"2005","unstructured":"Robin Burke, Bamshad Mobasher, and Runa Bhaumik. 2005. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005). 17\u201324."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.109"},{"key":"e_1_3_2_1_6_1","volume-title":"Synthetic Data Generation for Fraud Detection using GANs. arXiv preprint arXiv:2109.12546","author":"Charitou Charitos","year":"2021","unstructured":"Charitos Charitou, Simo Dragicevic, and Artur\u00a0d\u2019Avila Garcez. 2021. Synthetic Data Generation for Fraud Detection using GANs. arXiv preprint arXiv:2109.12546 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1144-z"},{"key":"e_1_3_2_1_8_1","volume-title":"MolGAN: An implicit generative model for small molecular graphs. arXiv preprint arXiv:1805.11973","author":"De\u00a0Cao Nicola","year":"2018","unstructured":"Nicola De\u00a0Cao and Thomas Kipf. 2018. MolGAN: An implicit generative model for small molecular graphs. arXiv preprint arXiv:1805.11973 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.ap07625"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2009.5302396"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"key":"e_1_3_2_1_12_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis) 5, 4","author":"Harper F\u00a0Maxwell","year":"2015","unstructured":"F\u00a0Maxwell Harper and Joseph\u00a0A Konstan. 2015. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis) 5, 4 (2015), 1\u201319."},{"key":"e_1_3_2_1_14_1","volume-title":"Detecting money laundering transactions with machine learning. Journal of Money Laundering Control","author":"Jullum Martin","year":"2020","unstructured":"Martin Jullum, Anders L\u00f8land, Ragnar\u00a0Bang Huseby, Geir \u00c5nonsen, and Johannes Lorentzen. 2020. Detecting money laundering transactions with machine learning. Journal of Money Laundering Control (2020)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_16_1","volume-title":"Force Report","author":"Lannoo Karel","year":"2021","unstructured":"Karel Lannoo and Richard Parlour. 2021. Anti-Money Laundering in the EU: Time to get serious. CEPS Task Force Report 28 Jan 2021.http:\/\/aei.pitt.edu\/103318\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3183210"},{"key":"e_1_3_2_1_19_1","volume-title":"Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity. arXiv preprint arXiv:2005.14635","author":"Lorenz Joana","year":"2020","unstructured":"Joana Lorenz, Maria\u00a0In\u00eas Silva, David Apar\u00edcio, Jo\u00e3o\u00a0Tiago Ascens\u00e3o, and Pedro Bizarro. 2020. Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity. arXiv preprint arXiv:2005.14635 (2020)."},{"key":"e_1_3_2_1_20_1","volume-title":"The Case of Yelp.com. American Economic Journal - Applied Economics","author":"Luca Michael","year":"2016","unstructured":"Michael Luca. 2016. Reviews, Reputation, and Revenue: The Case of Yelp.com. American Economic Journal - Applied Economics (2016)."},{"key":"e_1_3_2_1_21_1","volume-title":"2008 International Conference on Wavelet Analysis and Pattern Recognition, Vol.\u00a01. IEEE, 209\u2013215","author":"Lv Lin-Tao","year":"2008","unstructured":"Lin-Tao Lv, Na Ji, and Jiu-Long Zhang. 2008. A RBF neural network model for anti-money laundering. In 2008 International Conference on Wavelet Analysis and Pattern Recognition, Vol.\u00a01. IEEE, 209\u2013215."},{"key":"e_1_3_2_1_22_1","volume-title":"GuiltyWalker: Distance to illicit nodes in the Bitcoin network. arXiv preprint arXiv:2102.05373","author":"Oliveira Catarina","year":"2021","unstructured":"Catarina Oliveira, Jo\u00e3o Torres, Maria\u00a0In\u00eas Silva, David Apar\u00edcio, Jo\u00e3o\u00a0Tiago Ascens\u00e3o, and Pedro Bizarro. 2021. GuiltyWalker: Distance to illicit nodes in the Bitcoin network. arXiv preprint arXiv:2102.05373 (2021)."},{"key":"e_1_3_2_1_23_1","unstructured":"Arin Ray. 2021. IT and operational spending in AML-KYC: 2021 edition. https:\/\/www.celent.com\/insights\/428901357"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.162"},{"key":"e_1_3_2_1_25_1","volume-title":"Detection of money laundering groups using supervised learning in networks. arXiv preprint arXiv:1608.00708","author":"Savage David","year":"2016","unstructured":"David Savage, Qingmai Wang, Pauline Chou, Xiuzhen Zhang, and Xinghuo Yu. 2016. Detection of money laundering groups using supervised learning in networks. arXiv preprint arXiv:1608.00708 (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 1\u20137.","author":"Soltani Reza","year":"2016","unstructured":"Reza Soltani, Uyen\u00a0Trang Nguyen, Yang Yang, Mohammad Faghani, Alaa Yagoub, and Aijun An. 2016. A new algorithm for money laundering detection based on structural similarity. In 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 1\u20137."},{"key":"e_1_3_2_1_27_1","volume-title":"PAKDD (1)","author":"Sun Xiaobing","unstructured":"Xiaobing Sun, Jiabao Zhang, Qiming Zhao, Shenghua Liu, Jinglei Chen, Ruoyu Zhuang, Huawei Shen, and Xueqi Cheng. 2021. CubeFlow: Money Laundering Detection with Coupled Tensors.. In PAKDD (1). Springer, 78\u201390."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"e_1_3_2_1_29_1","volume-title":"2005 International conference on machine learning and cybernetics, Vol.\u00a06. IEEE, 3453\u20133457","author":"Tang Jun","year":"2005","unstructured":"Jun Tang and Jian Yin. 2005. Developing an intelligent data discriminating system of anti-money laundering based on SVM. In 2005 International conference on machine learning and cybernetics, Vol.\u00a06. IEEE, 3453\u20133457."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"Muhammad Usama Muhammad Asim Siddique Latif Junaid Qadir and Ala-Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). 78\u201383. https:\/\/doi.org\/10.1109\/IWCMC.2019.8766353","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"e_1_3_2_1_31_1","volume-title":"Controllable Data Generation by Deep Learning: A Review. arXiv preprint arXiv:2207.09542","author":"Wang Shiyu","year":"2022","unstructured":"Shiyu Wang, Yuanqi Du, Xiaojie Guo, Bo Pan, and Liang Zhao. 2022. Controllable Data Generation by Deep Learning: A Review. arXiv preprint arXiv:2207.09542 (2022)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/KAM.2009.221"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/15614260308020"},{"key":"e_1_3_2_1_34_1","volume-title":"Scalable graph learning for anti-money laundering: A first look. arXiv preprint arXiv:1812.00076","author":"Weber Mark","year":"2018","unstructured":"Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki Kanezashi, Tim Kaler, Charles\u00a0E Leiserson, and Tao\u00a0B Schardl. 2018. Scalable graph learning for anti-money laundering: A first look. arXiv preprint arXiv:1812.00076 (2018)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.041"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117078"}],"event":{"name":"ICAIF '23: 4th ACM International Conference on AI in Finance","location":"Brooklyn NY USA","acronym":"ICAIF '23"},"container-title":["4th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604237.3626882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604237.3626882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:37:32Z","timestamp":1755884252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604237.3626882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,25]]},"references-count":37,"alternative-id":["10.1145\/3604237.3626882","10.1145\/3604237"],"URL":"https:\/\/doi.org\/10.1145\/3604237.3626882","relation":{},"subject":[],"published":{"date-parts":[[2023,11,25]]},"assertion":[{"value":"2023-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}