{"title":"基于模糊关联约束的图计算货币交易路径挖掘","authors":"Jianying Xiong, H. Gong","doi":"10.1109/ECICE52819.2021.9645617","DOIUrl":null,"url":null,"abstract":"With the rapid increase of economic crimes and the renovation of technology, it is a challenge to analyse the behaviour of capital transactions. A key problem is to infer the path of the capital transaction from the transaction network. Through the network computing theory, we evaluate the risk of the trading node by taking the node as the node weight of the path according to the risk value. According to the directivity of the path of fund transaction, we construct the constraints of account transaction association conditions, calculate the weight of fund transfer path under different constraints, and propose a network graph model combining the characteristics of node-set and transaction constraint rules. Compared with the traditional manual and fixed threshold mode, the model realizes the reasonable reasoning of the transaction path and provides technical support for illegal fund tracking.","PeriodicalId":176225,"journal":{"name":"2021 IEEE 3rd Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mining Money Transaction Path Based on Graph Computing with fuzzy Association Constraints\",\"authors\":\"Jianying Xiong, H. Gong\",\"doi\":\"10.1109/ECICE52819.2021.9645617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid increase of economic crimes and the renovation of technology, it is a challenge to analyse the behaviour of capital transactions. A key problem is to infer the path of the capital transaction from the transaction network. Through the network computing theory, we evaluate the risk of the trading node by taking the node as the node weight of the path according to the risk value. According to the directivity of the path of fund transaction, we construct the constraints of account transaction association conditions, calculate the weight of fund transfer path under different constraints, and propose a network graph model combining the characteristics of node-set and transaction constraint rules. Compared with the traditional manual and fixed threshold mode, the model realizes the reasonable reasoning of the transaction path and provides technical support for illegal fund tracking.\",\"PeriodicalId\":176225,\"journal\":{\"name\":\"2021 IEEE 3rd Eurasia Conference on IOT, Communication and Engineering (ECICE)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 3rd Eurasia Conference on IOT, Communication and Engineering (ECICE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECICE52819.2021.9645617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 3rd Eurasia Conference on IOT, Communication and Engineering (ECICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECICE52819.2021.9645617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mining Money Transaction Path Based on Graph Computing with fuzzy Association Constraints
With the rapid increase of economic crimes and the renovation of technology, it is a challenge to analyse the behaviour of capital transactions. A key problem is to infer the path of the capital transaction from the transaction network. Through the network computing theory, we evaluate the risk of the trading node by taking the node as the node weight of the path according to the risk value. According to the directivity of the path of fund transaction, we construct the constraints of account transaction association conditions, calculate the weight of fund transfer path under different constraints, and propose a network graph model combining the characteristics of node-set and transaction constraint rules. Compared with the traditional manual and fixed threshold mode, the model realizes the reasonable reasoning of the transaction path and provides technical support for illegal fund tracking.