GARG-AML against Smurfing: A Scalable and Interpretable Graph-Based Framework for Anti-Money Laundering
Pith reviewed 2026-05-19 11:25 UTC · model grok-4.3
The pith
GARG-AML detects smurfing using density patterns in second-order neighborhood matrices
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
GARG-AML demonstrates that smurfing patterns are captured by the densities of specific blocks in the adjacency matrix of an account's second-order neighborhood. This allows expert knowledge of laundering structures to be encoded directly into measurable network properties. Combined with standard classifiers, these properties generate interpretable risk scores that achieve state-of-the-art detection results on multiple datasets while remaining efficient for large-scale graphs.
What carries the argument
Second-order neighbourhood adjacency matrix whose block densities translate smurfing expert knowledge into risk-scoring features.
If this is right
- Banks can deploy the framework on full-scale transaction networks without excessive computational demands.
- Risk scores derive from transparent network measures, aiding investigators in reviewing and acting on alerts.
- The method works for both directed and undirected graphs, fitting various transaction data formats.
- Results remain competitive with complex models across synthetic and real-world open datasets.
Where Pith is reading between the lines
- Neighborhood density features could be adapted to identify other forms of coordinated financial crime.
- Adding time-based information to the matrix might improve detection of sequential laundering steps.
- The lightweight nature supports embedding the scores into existing real-time monitoring pipelines at financial institutions.
Load-bearing premise
The density patterns within the second-order neighbourhood adjacency matrix reliably distinguish smurfing behavior in the tested datasets.
What would settle it
A test on an independent dataset with verified smurfing and legitimate accounts where the block density features do not yield separation in risk scores exceeding baseline random performance.
Figures
read the original abstract
Purpose: We introduce GARG-AML, a fast and transparent graph-based method to catch `smurfing', a common money-laundering tactic. It assigns a single, easy-to-understand risk score to every account in both directed and undirected networks. Unlike overly complex models, it balances detection power with the speed and clarity that investigators require. Methodology: The method maps an account's immediate and secondary connections (its second-order neighbourhood) into an adjacency matrix. By measuring the density of specific blocks within this matrix, GARG-AML flags patterns that mimic smurfing behaviour. We further boost the model's performance using decision trees and gradient-boosting classifiers, testing the results against current state-of-the-art on both synthetic and open-source data. Findings: GARG-AML matches or beats state-of-the-art performance across all tested datasets. Crucially, it easily processes the massive transaction graphs typical of large financial institutions. By leveraging only the adjacency matrix of the second-order neighbourhood and basic network features, this work highlights the potential of fundamental network properties towards advancing fraud detection. Originality: The originality lies in the translation of human expert knowledge of smurfing directly into a simple network representation, rather than relying on uninterpretable deep learning. Because GARG-AML is built expressly for the real-world business demands of scalability and interpretability, banks can easily incorporate it in their existing AML solutions.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces GARG-AML, a graph-based anti-money laundering framework that detects smurfing by mapping each account's second-order neighborhood into an adjacency matrix, computing densities of specific blocks within that matrix to encode smurfing patterns, and feeding these features plus basic network statistics into decision-tree and gradient-boosting classifiers. It reports that the approach matches or exceeds state-of-the-art performance on synthetic and open-source datasets while remaining scalable to large transaction graphs and more interpretable than deep-learning alternatives.
Significance. If the performance claims hold under rigorous validation, the work offers a practical, interpretable alternative to black-box models for AML, directly translating domain knowledge of smurfing into simple network-density features. The emphasis on scalability via adjacency-matrix operations and the avoidance of complex embeddings could be valuable for real-world deployment in financial institutions, provided the features demonstrably add signal beyond standard graph statistics.
major comments (2)
- [§4] §4 (Experimental Results) and Abstract: the claim that GARG-AML 'matches or beats state-of-the-art performance across all tested datasets' is unsupported by any reported numerical metrics, baseline names, validation protocol (e.g., train/test split, cross-validation), or error analysis. Without these, it is impossible to evaluate whether the reported gains are statistically meaningful or sensitive to data choices.
- [§3.2] §3.2 (Feature Construction): the central assumption that block densities in the second-order neighbourhood adjacency matrix reliably isolate smurfing signatures lacks supporting evidence such as ablation studies removing the density features, statistical comparison against degree-preserving null models, or explicit derivation of the chosen blocks from expert rules versus post-hoc tuning. In power-law transaction graphs this risks confounding with legitimate hub activity.
minor comments (2)
- [Abstract] The abstract and introduction repeatedly use 'second-order neighbourhood' without a precise definition or pseudocode for how the adjacency matrix is constructed from directed versus undirected edges.
- [Introduction] Missing references to prior graph-based AML work that also uses local density or motif features would help situate the novelty claim.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback. We address each major comment below and have revised the manuscript to provide the requested details and supporting analyses.
read point-by-point responses
-
Referee: [§4] §4 (Experimental Results) and Abstract: the claim that GARG-AML 'matches or beats state-of-the-art performance across all tested datasets' is unsupported by any reported numerical metrics, baseline names, validation protocol (e.g., train/test split, cross-validation), or error analysis. Without these, it is impossible to evaluate whether the reported gains are statistically meaningful or sensitive to data choices.
Authors: We agree that the performance claims require more explicit quantitative support. In the revised manuscript we will add a results table reporting concrete metrics (precision, recall, F1-score, AUC-ROC) for GARG-AML and the specific state-of-the-art baselines evaluated, together with the exact validation protocol (train/test splits and cross-validation folds) and a brief error analysis. These additions will allow direct assessment of statistical significance and sensitivity. revision: yes
-
Referee: [§3.2] §3.2 (Feature Construction): the central assumption that block densities in the second-order neighbourhood adjacency matrix reliably isolate smurfing signatures lacks supporting evidence such as ablation studies removing the density features, statistical comparison against degree-preserving null models, or explicit derivation of the chosen blocks from expert rules versus post-hoc tuning. In power-law transaction graphs this risks confounding with legitimate hub activity.
Authors: The selected blocks are derived directly from domain-expert descriptions of smurfing structures (multiple low-value transfers routed through intermediary accounts). In the revision we will add (i) an ablation study quantifying the contribution of the density features, (ii) a comparison against degree-preserving null models to demonstrate that the features capture more than degree distribution, and (iii) an explicit statement of the expert-rule origin of the block definitions. We will also clarify why the chosen blocks are unlikely to be confounded with generic hub activity in power-law graphs, as they target specific off-diagonal density patterns rather than overall degree. revision: yes
Circularity Check
No circularity: features from domain-expert block densities fed to standard classifiers
full rationale
The derivation constructs second-order neighbourhood adjacency matrices and extracts block densities as direct encodings of smurfing patterns drawn from expert knowledge. These engineered features are then passed to off-the-shelf decision trees and gradient-boosting classifiers. No equations reduce a claimed prediction to a fitted parameter by construction, no self-citation supplies a uniqueness theorem that forces the representation, and no ansatz is smuggled in. The central performance claims rest on empirical evaluation against external datasets rather than tautological re-use of inputs.
Axiom & Free-Parameter Ledger
free parameters (1)
- Density block thresholds or cut-offs
axioms (1)
- domain assumption Smurfing behaviour manifests as identifiable density patterns in the second-order neighbourhood of transaction graphs.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
GARG-AML measures the similarity between an observed pattern and the pure smurfing template by analysing the expected density and actual density (or sparsity) of each block... scoretotal = score2 − l1 · score1 + l3 · score3 / (l1 + l3)
-
IndisputableMonolith/Foundation/AlexanderDuality.leanalexander_duality_circle_linking unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
the adjacency matrix of the second-order neighbourhood of v is of size (m + n) × (m + n)... block1, block2, block3
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
URL https://data.world/lpetrocelli/czech-financial-dataset-real-anonymized-transactions
1999. URL https://data.world/lpetrocelli/czech-financial-dataset-real-anonymized-transactions
work page 1999
-
[2]
Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain
Ismail Alarab, Simant Prakoonwit, and Mohamed Ikbal Nacer. Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In Proceedings of the 2020 5th International Conference on Machine Learning Technologies , ICMLT ’20, page 23–27, New York, NY , USA, 2020. Association for Computing Machinery. ISBN 9781450377645. doi:10.11...
-
[3]
Realistic synthetic financial transactions for anti-money laundering models
Erik Altman, Jovan Blanuša, Luc von Niederhäusern, Beni Egressy, Andreea Anghel, and Kubilay Atasu. Realistic synthetic financial transactions for anti-money laundering models. In A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, editors, Advances in Neural Information Processing Systems, volume 36, pages 29851– 29874. Curran Associates...
work page 2023
-
[4]
Emergence of scaling in random networks
Albert-László Barabási and Réka Albert. Emergence of scaling in random networks. Science, 286(5439):509–512,
-
[5]
Fast unfolding of com- munities in large networks
Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of com- munities in large networks. Journal of Statistical Mechanics: Theory and Experiment , 2008(10):P10008, oct
work page 2008
-
[6]
Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre
doi:10.1088/1742-5468/2008/10/P10008. URL https://dx.doi.org/10.1088/1742-5468/2008/10/ P10008
-
[7]
Richard J. Bolton and David J. Hand. Statistical Fraud Detection: A Review. Statistical Science, 17(3):235 – 255,
-
[8]
doi:10.1214/ss/1042727940
-
[9]
Laundrograph: Self-supervised graph representation learning for anti-money laundering
Mário Cardoso, Pedro Saleiro, and Pedro Bizarro. Laundrograph: Self-supervised graph representation learning for anti-money laundering. In Proceedings of the Third ACM International Conference on AI in Finance, ICAIF ’22, page 130–138, New York, NY , USA, 2022. Association for Computing Machinery. ISBN 9781450393768. doi:10.1145/3533271.3561727. URL https...
-
[10]
Zhiyuan Chen, Le Dinh Van Khoa, Ee Na Teoh, Amril Nazir, Ettikan Kandasamy Karuppiah, and Kim Sim Lam. Machine learning techniques for anti-money laundering (aml) solutions in suspicious transaction detection: a review. Knowledge and Information Systems, 57(2):245–285, 2018. doi:10.1007/s10115-017-1144-z. URL https://doi.org/10.1007/s10115-017-1144-z
-
[11]
The relationship between precision-recall and roc curves
Jesse Davis and Mark Goadrich. The relationship between precision-recall and roc curves. In Proceedings of the 23rd International Conference on Machine Learning , ICML ’06, page 233–240, New York, NY , USA,
-
[12]
Association for Computing Machinery. ISBN 1595933832. doi:10.1145/1143844.1143874. URL https: //doi.org/10.1145/1143844.1143874
-
[13]
Statistical comparisons of classifiers over multiple data sets
Janez Demšar. Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research, 7(1):1–30, 2006. URL http://jmlr.org/papers/v7/demsar06a.html
work page 2006
-
[14]
Bruno Deprez, Toon Vanderschueren, Bart Baesens, Tim Verdonck, and Wouter Verbeke. Network analyt- ics for anti-money laundering – a systematic literature review and experimental evaluation. arXiv preprint arXiv:2405.19383, 2024. URL https://arxiv.org/abs/2405.19383
-
[15]
Rafał Dre˙zewski, Jan Sepielak, and Wojciech Filipkowski. The application of social network analysis algorithms in a system supporting money laundering detection. Information Sciences, 295:18–32, 2015. ISSN 0020-0255. doi:https://doi.org/10.1016/j.ins.2014.10.015. URL https://www.sciencedirect.com/science/article/ pii/S0020025514009979
-
[16]
Anomaly detection in graphs of bank transactions for anti money laundering applications
Bogdan Dumitrescu, Andra B˘altoiu, and ¸ Stefania Budulan. Anomaly detection in graphs of bank transactions for anti money laundering applications. IEEE Access, 10:47699–47714, 2022. doi:10.1109/ACCESS.2022.3170467
-
[17]
Provably powerful graph neural networks for directed multigraphs
Béni Egressy, Luc von Niederhäusern, Jovan Blanuša, Erik Altman, Roger Wattenhofer, and Kubilay Atasu. Provably powerful graph neural networks for directed multigraphs. Proceedings of the AAAI Conference on Artificial Intelligence, 38(10):11838–11846, Mar. 2024. doi:10.1609/aaai.v38i10.29069. URL https://ojs. aaai.org/index.php/AAAI/article/view/29069
-
[18]
Paul Erd ˝os and Alfréd Rényi. On random graphs. Publicationes Mathematicae Debrecen, 6(290-297):18, 1959
work page 1959
-
[19]
International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation
FATF. International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation. FATF, Paris, France, 2012-2023. URL www.fatf-gafi.org/en/publications/Fatfrecommendations/ Fatf-recommendations.html
work page 2012
-
[20]
Resolution limit in community detection
Santo Fortunato and Marc Barthélemy. Resolution limit in community detection. Proceedings of the National Academy of Sciences, 104(1):36–41, 2007. doi:10.1073/pnas.0605965104. URL https://www.pnas.org/doi/ abs/10.1073/pnas.0605965104. 19 GARG-AML against Smurfing: A Scalable and Interpretable Graph-Based Framework for Anti-Money Laundering
-
[21]
Milton Friedman. The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association, 32(200):675–701, 1937. doi:10.1080/01621459.1937.10503522. URL https://www.tandfonline.com/doi/abs/10.1080/01621459.1937.10503522
-
[22]
A comparison of alternative tests of significance for the problem of m rankings
Milton Friedman. A comparison of alternative tests of significance for the problem of m rankings. The Annals of Mathematical Statistics, 11(1):86–92, 1940. ISSN 00034851. URL http://www.jstor.org/stable/2235971
-
[23]
Andrea Fronzetti Colladon and Elisa Remondi. Using social network analysis to prevent money laundering.Expert Systems with Applications, 67:49–58, 2017. ISSN 0957-4174. doi:https://doi.org/10.1016/j.eswa.2016.09.029. URL https://www.sciencedirect.com/science/article/pii/S0957417416305139
-
[24]
Aric Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynamics, and function using networkx. In Proceedings of the 7th Python in Science Conference (SciPy2008), page 11–15, 2008. URL https://www.osti.gov/biblio/960616
work page 2008
-
[25]
Dattatray Vishnu Kute, Biswajeet Pradhan, Nagesh Shukla, and Abdullah Alamri. Deep learning and explainable artificial intelligence techniques applied for detecting money laundering–a critical review. IEEE Access, 9: 82300–82317, 2021
work page 2021
-
[26]
Community detection algorithms: A comparative analysis
Andrea Lancichinetti and Santo Fortunato. Community detection algorithms: A comparative analysis. Phys. Rev. E, 80:056117, 2009. doi:10.1103/PhysRevE.80.056117
-
[27]
Autoaudit: Mining accounting and time-evolving graphs
Meng-Chieh Lee, Yue Zhao, Aluna Wang, Pierre Jinghong Liang, Leman Akoglu, Vincent S Tseng, and Christos Faloutsos. Autoaudit: Mining accounting and time-evolving graphs. In 2020 IEEE International Conference on Big Data (Big Data), pages 950–956. IEEE, 2020. doi:10.1109/BigData50022.2020.9378346
-
[28]
Kevin J. Leonard. The development of a rule based expert system model for fraud alert in con- sumer credit. European Journal of Operational Research , 80(2):350–356, 1995. ISSN 0377-2217. doi:https://doi.org/10.1016/0377-2217(93)E0249-W. URL https://www.sciencedirect.com/science/ article/pii/0377221793E0249W
-
[29]
Michael Levi and Peter Reuter. Money laundering. Crime and justice, 34(1):289–375, 2006. doi:10.1086/501508
-
[30]
Flowscope: Spotting money laundering based on graphs
Xiangfeng Li, Shenghua Liu, Zifeng Li, Xiaotian Han, Chuan Shi, Bryan Hooi, He Huang, and Xueqi Cheng. Flowscope: Spotting money laundering based on graphs. Proceedings of the AAAI Conference on Artificial Intelligence, 34(04):4731–4738, 2020. doi:10.1609/aaai.v34i04.5906. URL https://ojs.aaai.org/index. php/AAAI/article/view/5906
-
[31]
Knowledge discovery in cryptocurrency transactions: A survey
Xiao Fan Liu, Xin-Jian Jiang, Si-Hao Liu, and Chi Kong Tse. Knowledge discovery in cryptocurrency transactions: A survey. Ieee access, 9:37229–37254, 2021. doi:10.1109/ACCESS.2021.3062652
-
[32]
Kulatilleke, Mohanad Sarhan, Siamak Layeghy, and Marius Portmann
Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. Inspection-l: self- supervised gnn node embeddings for money laundering detection in bitcoin. Applied Intelligence, 53(16):19406– 19417, 2023. doi:10.1007/s10489-023-04504-9. URL https://doi.org/10.1007/s10489-023-04504-9
-
[33]
Money laundering: a guide for criminal investigators
John Madinger. Money laundering: a guide for criminal investigators. CRC Press, Boca Raton, 3rd ed. edition,
-
[34]
ISBN 978-1-4398-6912-3
-
[35]
Distribution-free multiple comparisons
Peter Bjorn Nemenyi. Distribution-free multiple comparisons. Princeton University, 1963
work page 1963
-
[36]
Finding and evaluating community structure in networks
Mark EJ Newman and Michelle Girvan. Finding and evaluating community structure in networks. Physical review E, 69(2):026113, 2004. URL https://doi.org/10.1103/PhysRevE.69.026113
-
[37]
Brice Ozenne, Fabien Subtil, and Delphine Maucort-Boulch. The precision–recall curve overcame the optimism of the receiver operating characteristic curve in rare diseases. Journal of clinical epidemiology, 68(8):855–859, 2015
work page 2015
-
[38]
Berkan Oztas, Deniz Cetinkaya, Festus Adedoyin, Marcin Budka, Gokhan Aksu, and Huseyin Dogan. Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry. Future Generation Computer Systems, 159:161–171, 2024
work page 2024
-
[39]
Discovering bitcoin mixing using anomaly detection
Mario Alfonso Prado-Romero, Christian Doerr, and Andrés Gago-Alonso. Discovering bitcoin mixing using anomaly detection. In Marcelo Mendoza and Sergio Velastín, editors, Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, pages 534–541, Cham, 2018. Springer International Publishing. ISBN 978-3-319-75193-1
work page 2018
-
[40]
Association rules applied to credit card fraud detection
Daniel Sánchez, MA Vila, L Cerda, and José-Maria Serrano. Association rules applied to credit card fraud detection. Expert Systems with Applications, 36(2, Part 2):3630–3640, 2009. doi:https://doi.org/10.1016/j.eswa.2008.02.001
-
[41]
Ted E Senator, Henry G Goldberg, Jerry Wooton, Matthew A Cottini, AF Umar Khan, Christina D Klinger, Winston M Llamas, Michael P Marrone, and Raphael WH Wong. Financial crimes enforcement network ai system 20 GARG-AML against Smurfing: A Scalable and Interpretable Graph-Based Framework for Anti-Money Laundering (fais) identifying potential money launderin...
-
[42]
doi:10.1609/aimag.v16i4.1169
-
[43]
Smotef: Smurf money laundering detection using temporal order and flow analysis
Shiva Shadrooh and Kjetil Nørvåg. Smotef: Smurf money laundering detection using temporal order and flow analysis. Applied Intelligence, 2024. doi:10.1007/s10489-024-05545-4. URL https://doi.org/10.1007/ s10489-024-05545-4
-
[44]
Michele Starnini, Charalampos E. Tsourakakis, Maryam Zamanipour, André Panisson, Walter Allasia, Marco Fornasiero, Laura Li Puma, Valeria Ricci, Silvia Ronchiadin, Angela Ugrinoska, Marco Varetto, and Dario Moncalvo. Smurf-based anti-money laundering in time-evolving transaction networks. In Yuxiao Dong, Nicolas Kourtellis, Barbara Hammer, and Jose A. Loz...
-
[45]
Topology-agnostic detection of temporal money laundering flows in billion- scale transactions, 2023
Haseeb Tariq and Marwan Hassani. Topology-agnostic detection of temporal money laundering flows in billion- scale transactions, 2023
work page 2023
-
[46]
V . A. Traag, L. Waltman, and N. J. van Eck. From louvain to leiden: guaranteeing well-connected communities. Scientific Reports, 9(1):5233, 2019. doi:10.1038/s41598-019-41695-z. URL https://doi.org/10.1038/ s41598-019-41695-z
-
[47]
United Nations Office on Drugs and Crime. Money laundering. https://www.unodc.org/unodc/en/ money-laundering/overview.html, (n.d.)
-
[48]
Catchm: A novel network-based credit card fraud detection method using node representation learning
Rafaël Van Belle, Bart Baesens, and Jochen De Weerdt. Catchm: A novel network-based credit card fraud detection method using node representation learning. Decision Support Systems , 164:113866, 2023. ISSN 0167-9236. doi:https://doi.org/10.1016/j.dss.2022.113866
-
[49]
Duncan J. Watts and Steven H. Strogatz. Collective dynamics of ‘small-world’networks. Nature, 393(6684): 440–442, 1998. doi:10.1038/30918. URL https://doi.org/10.1038/30918
-
[50]
Weidele, Claudio Bellei, Tom Robinson, and Charles E
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics, 2019
work page 2019
-
[51]
Smurfs, money laundering, and the federal criminal law: the crime of structuring transactions
Sarah N Welling. Smurfs, money laundering, and the federal criminal law: the crime of structuring transactions. Fla. L. Rev., 41:287, 1989
work page 1989
-
[52]
Detecting mixing services via mining bitcoin transaction network with hybrid motifs
Jiajing Wu, Jieli Liu, Weili Chen, Huawei Huang, Zibin Zheng, and Yan Zhang. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(4):2237–2249, 2021. doi:10.1109/TSMC.2021.3049278
-
[53]
Towards understanding and demystifying bitcoin mixing services
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, and Kui Ren. Towards understanding and demystifying bitcoin mixing services. In Proceedings of the Web Conference 2021, WWW ’21, page 33–44, New York, NY , USA, 2021. Association for Computing Machinery. ISBN 9781450383127. doi:10.1145/3442381.3449880. URL https://doi.org/10.1145/3...
-
[54]
Distributed agents model for in- trusion detection based on ais
Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, and SunJun Liu. Distributed agents model for in- trusion detection based on ais. Knowledge-Based Systems , 22(2):115–119, 2009. ISSN 0950-
work page 2009
-
[55]
URL https://www.sciencedirect.com/science/ article/pii/S0950705108001391
doi:https://doi.org/10.1016/j.knosys.2008.07.005. URL https://www.sciencedirect.com/science/ article/pii/S0950705108001391
-
[56]
Zhao Yang, René Algesheimer, and Claudio J. Tessone. A comparative analysis of community detection algorithms on artificial networks. Scientific Reports, 6(1):30750, 2016. doi:10.1038/srep30750. URL https: //doi.org/10.1038/srep30750
-
[57]
No smurfs: Revealing fraud chains in mobile money transfers
Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, and Baptiste Hemery. No smurfs: Revealing fraud chains in mobile money transfers. In 2014 Ninth International Conference on Availability, Reliability and Security, pages 11–20. IEEE, 2014. doi:10.1109/ARES.2014.10
-
[58]
Rule extraction from support vector machines based on con- sistent region covering reduction
Pengfei Zhu and Qinghua Hu. Rule extraction from support vector machines based on con- sistent region covering reduction. Knowledge-Based Systems , 42:1–8, 2013. ISSN 0950-7051. doi:https://doi.org/10.1016/j.knosys.2012.12.003. URL https://www.sciencedirect.com/science/ article/pii/S095070511200336X. 21 GARG-AML against Smurfing: A Scalable and Interpreta...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.