Detailed Information

Cited 1 time in webofscience Cited 6 time in scopus
Metadata Downloads

A Suspicious Financial Transaction Detection Model Using Autoencoder and Risk-Based Approach

Full metadata record
DC Field Value Language
dc.contributor.authorKoo, Kyungmo-
dc.contributor.authorPark, Minyoung-
dc.contributor.authorYoon, Byungun-
dc.date.accessioned2024-08-08T12:01:23Z-
dc.date.available2024-08-08T12:01:23Z-
dc.date.issued2024-05-
dc.identifier.issn2169-3536-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/21977-
dc.description.abstractThis study focuses on the detection of suspicious transactions characterized by the opaque and complex electronic channels that have emerged with the advancement of electronic financial technology. A model that can immediately reflect trends in various types of fund and transaction flows, and autonomously learn complex transaction types, is proposed. As a key outcome, an internal control model for detecting suspicious transactions based on the risk-based approach is constructed by utilizing autoencoder to enhance anti-money laundering (AML) operations, and this method surpasses traditional AML methods. Additionally, the proposed model facilitates the extraction of candidate factors for suspicious transactions and updates warning models in AML monitoring systems, thereby allowing for the analysis of alert cases. As a result, AML operations based on the proposed model are quantitatively and qualitatively superior to those based on the traditional approaches, resulting in swift processing by avoiding exhaustive examinations of suspicious transaction types. This research provides information that can improve the AML operation systems used within the financial sector by evaluating the risk of suspicious transactions and reflecting various elements of funds and transactions.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-
dc.titleA Suspicious Financial Transaction Detection Model Using Autoencoder and Risk-Based Approach-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2024.3399824-
dc.identifier.scopusid2-s2.0-85193263403-
dc.identifier.wosid001230177500001-
dc.identifier.bibliographicCitationIEEE Access, v.12, pp 68926 - 68939-
dc.citation.titleIEEE Access-
dc.citation.volume12-
dc.citation.startPage68926-
dc.citation.endPage68939-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusFRAUD DETECTION-
dc.subject.keywordAuthorRisk-based approach (RBA)-
dc.subject.keywordAuthoranti money laundering (AML)-
dc.subject.keywordAuthorautoencoder-
dc.subject.keywordAuthormoney laundering symptoms-
dc.subject.keywordAuthorsuspicious transaction report (STR)-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Industrial and Systems Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yoon, Byung Un photo

Yoon, Byung Un
College of Engineering (Department of Industrial and Systems Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE