4,008
Views
2
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

Privacy-preserving data mining of cross-border financial flows

ORCID Icon, ORCID Icon & ORCID Icon | (Reviewing editor)
Article: 2046680 | Received 06 Oct 2020, Accepted 21 Feb 2022, Published online: 15 Mar 2022

References

  • Adam, N. R., & Wortmann, J. C. (1989, December). Security-Control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 515–18. https://doi.org/10.1145/76894.76895
  • Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record 29 2 , 439–450. doi:https://doi.org/10.1145/335191.335438
  • Akoglu, L., Tong, H., & Koutra, D. (2015). Graph based anomaly detection and description. Data Mining and Knowledge Discovery, 29(3), 626–688. https://doi.org/10.1007/s10618-014-0365-y
  • Babus, A. (2016). The formation of financial networks. The RAND Journal of Economics, 47(2), 239–272. https://doi.org/10.1111/1756-2171.12126
  • Cios, K. J., & Moore, W. G. (2002, September). Uniqueness of medical data mining. Artificial Intelligence in Medicine, 26(1–2 1–24 doi:10.1016/S0933-3657(02)00049-0).
  • Clifton, C., & Vaidya, J. (2004). Privacy-Preserving data mining: why, how, and when. IEEE Security & Privacy Magazine 2 (IEEE) , (pp. 19–27).
  • Cox, D. (2014). Handbook of Anti-Money laundering. John Wiley & Sons Ltd.
  • Deshkar, S, Thanseeh, R. A, Menon, V. G. (2017). A review on IoT based m-Health systems for diabetes. International Journal of Computer Science and Telecommunications, 8 1 , 13–18.
  • Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. Theory of cryptography conference, (pp. 265–284). Springer.
  • FATF. (2014). Guidance for a risk-based approach: The Banking Sector. https://protect-za.mimecast.com/s/crgICElv6pC5GRwiNofra?domain=fatf-gafi.org
  • Freund, C. L., & Weinhold, D. (2004). The effect of the Internet on international trade. Journal of International Economics, 62(1), 171–189. doi:https://doi.org/10.1016/S0022-1996(03)00059-X
  • Harvey, J. (2004). Compliance and reporting issues arising for financial institutions from money laundering regulation: A preliminary cost benefit study. Journal of Money Laundering Control, 7(4), 333–346. https://doi.org/10.1108/13685200410810047
  • Kang, S. (2018). Rethinking the global anti-money laundering regulations to deter corruption. INTERNATIONAL AND COMPARATIVE LAW QUARTERLY, 67(3), 695–720. https://doi.org/10.1017/S0020589318000106
  • Kou, G., Peng, Y., Shi, Y., & Chen, Z. (2007, July). Privacy-Preserving Data Mining of Medical Data Using Data Separation-Based Techniques. Data Science Journal, 6, S429–S434. https://doi.org/10.2481/dsj.6.S429
  • Li, X., Liu, S., Li, Z., Han, X., Shi, C., Hooi, B., … Cheng, X. (2020). Flowscope: Spotting money laundering based on graphs. Proceedings of the AAAI conference on artificial intelligence, (pp. 4731–4738). AAAI.
  • Liu, S., Hooi, B., & Faloutsos, C. (2017). HoloScope: Topology-and-Spike aware Fraud Detection. Proceedings of the 2017 ACM on conference on information and knowledge management 6-10 Nov (ACM) Singapore, (pp. 1539–1548 10.1145/3132847.3133018.
  • Lv, L.-T., Ji, N., & Zhang, J.-L. (2008). A RBF neural network model for anti-money laundering. 2008 International Conference on Wavelet Analysis and Pattern Recognition, 1 (IEEE), (pp. 209–215). https://doi.org/10.1109/ICWAPR.2008.4635778
  • Magnusson, D., & Harvey, J. (2009). The costs of implementing the anti-money laundering regulations in Sweden. Journal of Money Laundering Control, 12(2), 101–112. https://doi.org/10.1108/13685200910951884
  • Meltzer, J. P. (2015). The internet, cross‐border data flows and international trade. Asia & the Pacific Policy Studies, 2(1), 90–102. https://doi.org/10.1002/app5.60
  • Neanidis, K. C. (2019). Volatile capital flows and economic growth: The role of banking supervision. Journal of Financial Stability, 40 February 2019 , 77–93. doi:https://doi.org/10.1016/j.jfs.2018.05.002
  • Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32(3), 245–251. doi:https://doi.org/10.1016/j.socnet.2010.03.006
  • Ostry, J. D., Gosh, A. R., Chamon, M., & Qureshi, M. S. (2012). “Tools for managing financial stability risks from capital inflows. Journal of International Economics, 88(2), 407–421. https://doi.org/10.1016/j.jinteco.2012.02.002
  • Pathak, M., Rane, S., & Raj, B. (2010). Multiparty differential privacy via aggregation of locally trained classifiers. International conference on Neural Information Processing Systems (NIPS), 2, (pp. 1876–1884). Association for Computing Machinery (ACM).
  • Pathak, M., Rane, S., Sun, W., & Raj, B. (2011). Privacy preserving probabilistic inference with hidden Markov models. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (pp. 5868–5871). IEEE.
  • Paula, E. L., Ladeira, M., Carvalho, R. N., & Marzagao, T. (2016). Deep learning anomaly detection as support fraud investigation in Brazilian exports and anti-money laundering. 15th IEEE International Conference on Machine Learning and Applications (ICMLA), (pp. 954–960). IEEE. https://doi.org/10.1109/ICMLA.2016.0172
  • Pourhabibi, T., Ong, K.-L., Kam, B., & Boo, Y. (2020). Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decision Support Systems, 133 June 2020 , 113303. doi:https://doi.org/10.1016/j.dss.2020.113303
  • Prakash, B. A., Sridharan, A., Seshadri, M., Machiraju, S., & Faloutsos, C. (2010). EigenSpokes: Surprising patterns and scalable community chipping in large graphs. Pacific-Asia conference on knowledge discovery and data mining, (pp. 435–448). Springer. https://doi.org/10.1007/978-3-642-13672-6_42
  • Qi, X., & Zong, M. (2012). An overview of privacy preserving data mining. 2011 International Conference on Environmental Science and Engineering, 12, (pp. 1341–1347). Elsevier B.V. https://doi.org/10.1016/j.proenv.2012.01.432
  • Rajput, Q., Khan, N. S., Larik, A., & Haider, S. (2014). Ontology-based expert-system for suspicious transactions detection. Computer and Information Science, 7(1 103–114). https://doi.org/10.5539/cis.v7n1p103
  • Silva, T. C., de Souza, S. R., & Tabak, B. M. (2016). Structure and dynamics of the global financial network. Chaos, Solitons and Fractals, 88 C , 218–234. https://doi.org/10.1016/j.chaos.2016.01.023
  • Sreeja, R., Varghese, P., Menon, V. G., & Khosravi, M. R. (2019). A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry, 11(2), 293. https://doi.org/10.3390/sym11020293
  • Stinson, D. R 2006 Cryptography theory and practice Discrete mathematics and its applications (Chapman & Hall/CRC)1-58488-508-4
  • Sun, Q., Qu, Chakrabarti, Chakrabarti, H., Faloutsos, D., & Faloutsos, C. (2005, December). Relevance search and anomaly detection in bipartite graphs. ACM SIGKDD Explorations Newsletter, 7(2), 48–55. doi:https://doi.org/10.1145/1117454.1117461
  • Sun, J., Qu, H., Chakrabarti, D., & Faloutsos, C. (2005). Neighborhood formation and anomaly detection in bipartite graphs. Proceedings of the 5th IEEE International Conference on Data Mining (ICDM), (pp. 418–425). IEEE Computer Society.
  • Sun, X, Zhang, J, Liu, S, Chen, J, Zhuang, R, Shen, H, Cheng, X 2021 CubeFlow: Money Laundering Detection with Coupled Tensors. PAKDD 2021: Advances in Knowledge Discovery and Data Mining. 12712 (Springer)78–90 May 2021 https://doi.org/10.1007/978-3-030-75762-5_7 Part of the Lecture Notes in Computer Science book series (LNCS, volume 12712)
  • Tang, J, Yin, J 2005 Developing an intelligent data discriminating system of anti-money laundering based on SVM. 2005 International Conference on Machine Learning and Cybernetics. Guangzhou 18-21 Aug (IEEE)doi:10.1109/ICMLC.2005.1527539
  • Teichmann, F. M. (2019). Recent trends in money laundering and terrorism financing. Journal of Financial Regulation and Compliance, 27(1), 2–12. https://doi.org/10.1108/JFRC-03-2018-0042
  • van Duyne, P. (1994). Money-Laundering: Estimates in fog. Journal of Financial Crime, 2(1), 58–74. https://doi.org/10.1108/eb025638
  • Walker, J. (1999). How big is global money laundering? Journal of Money Laundering Control, 3(1), 25–37. https://doi.org/10.1108/eb027208
  • Wang, A., Wang, C., Bi, M., & Xu, J. (2018). A review of privacy-preserving machine learning classification. International Conference on Cloud Computing and Security (ICCCS), (pp. 671–682). Springer. Cham.
  • Xiong, H., Z, L., & Zhou, L. Y. (2010). Detecting blackhole and volcano patterns in directed networks. Proceedings of the 10th IEEE International Conference On Data Mining (ICDM), (pp. 294–303). IEEE.
  • Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: Privacy and data mining. IEEE Access, 2, 1149–1176. https://doi.org/10.1109/ACCESS.2014.2362522
  • Zhiguo, Z., Jingqin, S., & Liping, K. (2015). Measuring influence in online social network based on the user-content bipartite graph. Computers in Human Behavior, 52, 184–189. https://doi.org/10.1016/j.chb.2015.04.072