TasksSotADatasetsPapersMethodsSubmitAbout
Papers With Code 2

A community resource for machine learning research: papers, code, benchmarks, and state-of-the-art results.

Explore

Notable BenchmarksAll SotADatasetsPapersMethods

Community

Submit ResultsAbout

Data sourced from the PWC Archive (CC-BY-SA 4.0). Built by the community, for the community.

Papers/Network Analytics for Anti-Money Laundering -- A Systemati...

Network Analytics for Anti-Money Laundering -- A Systematic Literature Review and Experimental Evaluation

Bruno Deprez, Toon Vanderschueren, Bart Baesens, Tim Verdonck, Wouter Verbeke

2024-05-29Feature EngineeringFraud Detection
PaperPDFCode(official)

Abstract

Money laundering presents a pervasive challenge, burdening society by financing illegal activities. The use of network information is increasingly being explored to more effectively combat money laundering, given it involves connected parties. This led to a surge in research on network analytics (NA) for anti-money laundering (AML). The literature on NA for AML is, however, fragmented and a comprehensive overview of existing work is missing. This results in limited understanding of the methods to apply and their comparative detection power. Therefore, this paper presents an extensive and unique literature review, based on 97 papers from Web of Science and Scopus, resulting in a taxonomy following a recently proposed fraud analytics framework. We conclude that most research relies on expert-based rules and manual features, while deep learning methods have been gaining traction. This paper also presents a comprehensive framework to evaluate and compare the performance of prominent NA methods in a standardized setup. We apply it on two publicly available data sets, comparing manual feature engineering, random walk-based, and deep learning methods. We conclude that (1) network analytics increases the predictive power, but caution is needed when applying GNNs based on the class imbalance and network topology, and that (2) care should be taken with open-source data as this can give overly optimistic results. The open-source implementation facilitates researchers and practitioners to extend upon the results and experiment on proprietary data, promoting a standardized approach for the analysis and evaluation of network analytics for AML.

Results

TaskDatasetMetricValueModel
Fraud DetectionElliptic DatasetAUC0.8329GCN
Fraud DetectionElliptic DatasetAUPRC0.5946GCN
Fraud DetectionElliptic DatasetAUC0.8279GraphSAGE
Fraud DetectionElliptic DatasetAUPRC0.6312GraphSAGE
Fraud DetectionElliptic DatasetAUC0.8102GAT
Fraud DetectionElliptic DatasetAUPRC0.5886GAT
Fraud DetectionElliptic DatasetAUC0.8089GIN
Fraud DetectionElliptic DatasetAUPRC0.5517GIN
Fraud DetectionElliptic DatasetAUC0.5263Node2vec
Fraud DetectionElliptic DatasetAUPRC0.0594Node2vec
Fraud DetectionElliptic DatasetAUC0.45Deepwalk
Fraud DetectionElliptic DatasetAUPRC0.0488Deepwalk
Active Speaker DetectionElliptic DatasetAUC0.8329GCN
Active Speaker DetectionElliptic DatasetAUPRC0.5946GCN
Active Speaker DetectionElliptic DatasetAUC0.8279GraphSAGE
Active Speaker DetectionElliptic DatasetAUPRC0.6312GraphSAGE
Active Speaker DetectionElliptic DatasetAUC0.8102GAT
Active Speaker DetectionElliptic DatasetAUPRC0.5886GAT
Active Speaker DetectionElliptic DatasetAUC0.8089GIN
Active Speaker DetectionElliptic DatasetAUPRC0.5517GIN
Active Speaker DetectionElliptic DatasetAUC0.5263Node2vec
Active Speaker DetectionElliptic DatasetAUPRC0.0594Node2vec
Active Speaker DetectionElliptic DatasetAUC0.45Deepwalk
Active Speaker DetectionElliptic DatasetAUPRC0.0488Deepwalk

Related Papers

Graph Learning2025-07-08Advancing Magnetic Materials Discovery -- A structure-based machine learning approach for magnetic ordering and magnetic moment prediction2025-07-02Prompt Mechanisms in Medical Imaging: A Comprehensive Survey2025-06-28Quantum Reinforcement Learning Trading Agent for Sector Rotation in the Taiwan Stock Market2025-06-26Temporal-Aware Graph Attention Network for Cryptocurrency Transaction Fraud Detection2025-06-26Tabular Feature Discovery With Reasoning Type Exploration2025-06-25A Deep Learning Approach to Identify Rock Bolts in Complex 3D Point Clouds of Underground Mines Captured Using Mobile Laser Scanners2025-06-25An Attack Method for Medical Insurance Claim Fraud Detection based on Generative Adversarial Network2025-06-22