A BAYESIAN APPROACH FOR SUSPICIOUS FINANCIAL ACTIVITY REPORTING

Nida S. Khan, Asma S. Larik, Quratulain Rajput, and Sajjad Haider

References

  1. [1] J. Pearl, Probabilistic reasoning in intelligent systems: Network of plausible inference (San Francisco, California: Morgan Kaufmann Publishers Inc., 1987).
  2. [2] Z. Gao and M. Ye, A framework for data mining-based anti-money laundering research, Journal of Money Laundering Control, 10(2), 2007, 170–179.
  3. [3] P. Lewisch, Money laundering laws as a political instrument: The social cost of arbitrary money laundering enforcement, European Journal of Law and Economics, 26(3), 2008, 405–417.
  4. [4] L.T. Lv, N. Ji, and J.L. Zhang, A RBF neural network model for anti-money laundering, Proc. Int’l Conf. on Wavelet Analysis and Pattern Recognition, Hong kong, China, 2008.
  5. [5] S.N. Wang and J.G. Yang, A money laundering risk evaluation method based on decision tree, Proc. Int’l Conf. on Machine Learning and Cybernetics, Hong kong, China, 2007.
  6. [6] J. Tang and J. Yin, Developing an intelligent data discriminating system of anti-money laundering based on SVM, Proc. Int’l Conf. on Machine Learning and Cybernetics, Guangzhou, China, 2005.
  7. [7] J. Han and M. Kamber, Data mining: Concepts and techniques (San Francisco, California: Morgan Kaufmann Publishers Inc., 2006).
  8. [8] M. Anderberg, Cluster analysis for applications (USA: Academic Press, 1973).
  9. [9] G. Zengan, Application of cluster-based local outlier factor algorithm in anti-money laundering, Proc. Int’l Conf. on Management and Service Science, Wuhan/Beijing, China, 2009.
  10. [10] T. Zhu, An outlier detection model based on cross datasets comparison for financial surveillance, Proc. 2006 IEEE Asia-Pacific Conf. on Service Computing, Guangzhou, China, 2006.
  11. [11] T. Jun, A peer dataset comparison outlier detection model applied to financial surveillance, Proc. 18th International Conf. on Pattern Recognition, Hong kong, China, 2006.
  12. [12] M.F. Jaing, S.S. Tseng, and C.M. Su, Two-phase clustering process for outliers detection, Pattern Recognition Letters, 22, 2001, 691–700.
  13. [13] X. Wang and G. Dong, Research on money laundering detection based on improved minimum spanning tree clustering and its application, Proc. Int’l Symposium on Knowledge Acquisition and Modeling, Wuhan, China, 2009.
  14. [14] S. Gao, D. Xu, H. Wang, and Y. Wang, Intelligent anti-money laundering system, Proc. IEEE Int’l Conf. on Service Operations and Logistics, and Informatics, Shanghai, 2006.
  15. [15] S. Raza and S. Haider, Suspicious activity reporting using dynamic Bayesian network, Procedia Computer Science, 3, 2011, 987–991.
  16. [16] A. Larik and S. Haider, Clustering based anomalous transaction reporting, Procedia Computer Science, 3, 2011, 606–610.
  17. [17] R. Kenaya and K.C. Choek, Euclidean ART neural networks, Proc. World Congress on Engineering and Computer Science, 2008.
  18. [18] Y. Li, D. Duan, G. Hu, and Z. Lu, Discovering hidden group in financial transaction network using hidden Markov model and genetic algorithm, Proc. 6th Int’l Conf. on Fuzzy Systems and Knowledge Discovery, Tianjin, China, 2009.
  19. [19] V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection: A survey, ACM Computer Survey, 41, 2009, 1–58.

Important Links:

Go Back