暂无分享,去创建一个
[1] E. Takáts,et al. A Theory of 'Crying Wolf': The Economics of Money Laundering Enforcement , 2007, SSRN Electronic Journal.
[2] Stefan Axelsson,et al. Money Laundering Detection using Synthetic Data , 2012 .
[3] Yu-To Chen,et al. Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring , 2011 .
[4] P. Jaccard,et al. Etude comparative de la distribution florale dans une portion des Alpes et des Jura , 1901 .
[5] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[6] 이주현,et al. 7 , 1871, Testament d'un patriote exécuté.
[7] Andrea Fronzetti Colladon,et al. Using social network analysis to prevent money laundering , 2021, Expert Syst. Appl..
[8] Craig A. Knoblock,et al. PDDL-the planning domain definition language , 1998 .
[9] Max Welling,et al. Modeling Relational Data with Graph Convolutional Networks , 2017, ESWC.
[10] Jason Kingdon,et al. AI Fights Money Laundering , 2004, IEEE Intell. Syst..
[11] Wil M. P. van der Aalst,et al. Process Mining , 2016, Springer Berlin Heidelberg.
[12] Santiago Ontan'on,et al. An overview of distance and similarity functions for structured data , 2020, Artificial Intelligence Review.
[13] Dietrich Wettschereck,et al. Relational Instance-Based Learning , 1996, ICML.
[14] E. Takáts,et al. A Theory of “Crying Wolf”; The Economics of Money Laundering Enforcement , 2007 .
[15] Sajjad Haider,et al. Clustering based anomalous transaction reporting , 2011, WCIT.
[16] Zhiyuan Chen,et al. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review , 2018, Knowledge and Information Systems.
[17] Su-nan Wang,et al. A Money Laundering Risk Evaluation Method Based on Decision Tree , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[18] Pierre Sens,et al. Stream Processing of Healthcare Sensor Data: Studying User Traces to Identify Challenges from a Big Data Perspective , 2015, ANT/SEIT.
[19] Lin-Tao Lv,et al. A RBF neural network model for anti-money laundering , 2008, 2008 International Conference on Wavelet Analysis and Pattern Recognition.
[20] Toyotaro Suzumura,et al. Scalable Graph Learning for Anti-Money Laundering: A First Look , 2018, ArXiv.
[21] Sajjad Haider,et al. Suspicious activity reporting using dynamic bayesian networks , 2011, WCIT.
[22] Kim-Kwang Raymond Choo,et al. Modelling of money laundering and terrorism financing typologies , 2012 .
[23] Nada Lavrač,et al. Relational Data Mining , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[24] Ted E. Senator,et al. The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions , 1995, IAAI.
[25] Lee Sael,et al. Procedia Computer Science , 2015 .
[26] T. Yalcinoz,et al. Implementing soft computing techniques to solve economic dispatch problem in power systems , 2008, Expert Syst. Appl..
[27] Raquel Fuentetaja. The CBP planner , 2011 .
[28] C. Humby,et al. Process Mining: Data science in Action , 2014 .
[29] Charu C. Aggarwal,et al. Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.
[30] Nida Sadaf Khan,et al. Ontology Based Expert-System for Suspicious Transactions Detection , 2014, Comput. Inf. Sci..
[31] Habib Hamam,et al. Artificial Intelligence Review , 2019, Advanced Methodologies and Technologies in Artificial Intelligence, Computer Simulation, and Human-Computer Interaction.
[32] Zuraidah Mohd Sanusi,et al. Money Laundering Risk: From the Bankers’ and Regulators Perspectives☆ , 2015 .
[33] Waleed Alhosani,et al. Anti-Money Laundering , 2016 .
[34] Xingrong Luo. Suspicious Transaction Detection for Anti-Money Laundering , 2014 .