<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">JDS</journal-id>
<journal-title-group><journal-title>Journal of Data Science</journal-title></journal-title-group>
<issn pub-type="epub">1683-8602</issn><issn pub-type="ppub">1680-743X</issn><issn-l>1680-743X</issn-l>
<publisher>
<publisher-name>School of Statistics, Renmin University of China</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">JDS1190</article-id>
<article-id pub-id-type="doi">10.6339/25-JDS1190</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Data Science in Action</subject></subj-group></article-categories>
<title-group>
<article-title>Money Laundering Detection with Multi-Aggregation Custom Edge GIN</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5938-7260</contrib-id>
<name><surname>Wójcik</surname><given-names>Filip</given-names></name><email xlink:href="mailto:filip.wojcik@ue.wroc.pl">filip.wojcik@ue.wroc.pl</email><email xlink:href="mailto:ds@filip-wojcik.com">ds@filip-wojcik.com</email><xref ref-type="aff" rid="j_jds1190_aff_001">1</xref><xref ref-type="fn" rid="cor1">∗</xref>
</contrib>
<aff id="j_jds1190_aff_001"><label>1</label>Faculty of Business Intelligence, Komandorska 118/120 54-132 Wroclaw, <institution>Wroclaw University of Economics and Business</institution>, <country>Poland</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Email: <ext-link ext-link-type="uri" xlink:href="mailto:filip.wojcik@ue.wroc.pl">filip.wojcik@ue.wroc.pl</ext-link> or <ext-link ext-link-type="uri" xlink:href="mailto:ds@filip-wojcik.com">ds@filip-wojcik.com</ext-link>.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2025</year></pub-date><pub-date pub-type="epub"><day>12</day><month>6</month><year>2025</year></pub-date><volume content-type="ahead-of-print">0</volume><issue>0</issue><fpage>1</fpage><lpage>19</lpage><supplementary-material id="S1" content-type="archive" xlink:href="jds1190_s001.zip" mimetype="application" mime-subtype="x-zip-compressed">
<caption>
<title>Supplementary Material</title>
<p>The source code for this study is available on GitHub: <uri>https://github.com/maddataanalyst/Graph_MAGIC_Conv</uri>. The repository includes all the necessary components to reproduce the training results.</p>
<p>A supplementary PDF file attached to this publication provides detailed analyses of the train/validation/test splits, hyperparameter tuning results, and a comprehensive breakdown of the model architecture for each dataset.</p>
</caption>
</supplementary-material><history><date date-type="received"><day>30</day><month>9</month><year>2024</year></date><date date-type="accepted"><day>23</day><month>5</month><year>2025</year></date></history>
<permissions><copyright-statement>2025 The Author(s). Published by the School of Statistics and the Center for Applied Statistics, Renmin University of China.</copyright-statement><copyright-year>2025</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>Detecting illicit transactions in Anti-Money Laundering (AML) systems remains a significant challenge due to class imbalances and the complexity of financial networks. This study introduces the Multiple Aggregations for Graph Isomorphism Network with Custom Edges (MAGIC) convolution, an enhancement of the Graph Isomorphism Network (GIN) designed to improve the detection of illicit transactions in AML systems. MAGIC integrates edge convolution (GINE Conv) and multiple learnable aggregations, allowing for varied embedding sizes and increased generalization capabilities. Experiments were conducted using synthetic datasets, which simulate real-world transactions, following the experimental setup of previous studies to ensure comparability. MAGIC, when combined with XGBoost as a link predictor, outperformed existing models in 16 out of 24 metrics, with notable improvements in F1 scores and precision. In the most imbalanced dataset, MAGIC achieved an F1 score of 82.6% and a precision of 90.4% for the illicit class. While MAGIC demonstrated high precision, its recall was lower or comparable to the other models, indicating potential areas for future enhancement. Overall, MAGIC presents a robust approach to AML detection, particularly in scenarios where precision and overall quality are critical. Future research should focus on optimizing the model’s recall, potentially by incorporating additional regularization techniques or advanced sampling methods. Additionally, exploring the integration of foundation models like GraphAny could further enhance the model’s applicability in diverse AML environments.</p>
</abstract>
<kwd-group>
<label>Keywords</label>
<kwd>deep learning</kwd>
<kwd>financial fraud detection</kwd>
<kwd>graph neural networks</kwd>
<kwd>graph representation learning</kwd>
</kwd-group>
</article-meta>
</front>
<back>
<ref-list id="j_jds1190_reflist_001">
<title>References</title>
<ref id="j_jds1190_ref_001">
<mixed-citation publication-type="chapter"> <string-name><surname>Alarab</surname> <given-names>I</given-names></string-name>, <string-name><surname>Prakoonwit</surname> <given-names>S</given-names></string-name>, <string-name><surname>Nacer</surname> <given-names>MI</given-names></string-name> (<year>2020</year>). <chapter-title>Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain</chapter-title>. In: <source><italic>ICMLT 2020: 5th International Conference on Machine Learning Technologies</italic></source>. <conf-loc>Beijing, China</conf-loc>, <conf-date>June, 2020</conf-date>, <fpage>23</fpage>–<lpage>27</lpage>. <publisher-name>Association for Computing Machinery</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_002">
<mixed-citation publication-type="journal"> <string-name><surname>Alsuwailem</surname> <given-names>AAS</given-names></string-name>, <string-name><surname>Saudagar</surname> <given-names>AKJ</given-names></string-name> (<year>2020</year>). <article-title>Anti-money laundering systems: A systematic literature review</article-title>. <source><italic>Journal of Money Laundering Control</italic></source>, <volume>23</volume>: <fpage>833</fpage>–<lpage>848</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1108/JMLC-02-2020-0018" xlink:type="simple">https://doi.org/10.1108/JMLC-02-2020-0018</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_003">
<mixed-citation publication-type="journal"> <string-name><surname>Behera</surname> <given-names>DK</given-names></string-name>, <string-name><surname>Das</surname> <given-names>M</given-names></string-name>, <string-name><surname>Swetanisha</surname> <given-names>S</given-names></string-name>, <string-name><surname>Nayak</surname> <given-names>J</given-names></string-name>, <string-name><surname>Vimal</surname> <given-names>S</given-names></string-name>, <string-name><surname>Naik</surname> <given-names>B</given-names></string-name> (<year>2021</year>). <article-title>Follower link prediction using the xgboost classification model with multiple graph features</article-title>. <source><italic>Wireless Personal Communications</italic></source>, <volume>127</volume>(<issue>1</issue>): <fpage>695</fpage>–<lpage>714</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11277-021-08399-y" xlink:type="simple">https://doi.org/10.1007/s11277-021-08399-y</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_004">
<mixed-citation publication-type="chapter"> <string-name><surname>Bouthillier</surname> <given-names>X</given-names></string-name>, <string-name><surname>Delaunay</surname> <given-names>P</given-names></string-name>, <string-name><surname>Bronzi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Trofimov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Nichyporuk</surname> <given-names>B</given-names></string-name>, <string-name><surname>Szeto</surname> <given-names>J</given-names></string-name>, <etal>et al.</etal> (<year>2021</year>). <chapter-title>Accounting for variance in machine learning benchmarks</chapter-title>. In: <source><italic>Proceedings of Machine Learning and Systems</italic></source> (<string-name><given-names>A</given-names> <surname>Smola</surname></string-name>, <string-name><given-names>A</given-names> <surname>Dimakis</surname></string-name>, <string-name><given-names>I</given-names> <surname>Stoica</surname></string-name>, eds.), volume <volume>3</volume>, <fpage>747</fpage>–<lpage>769</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_005">
<mixed-citation publication-type="other"> <string-name><surname>Brossard</surname> <given-names>R</given-names></string-name>, <string-name><surname>Frigo</surname> <given-names>O</given-names></string-name>, <string-name><surname>Dehaene</surname> <given-names>D</given-names></string-name> (<year>2020</year>). Graph convolutions that can finally model local structure. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/2011.15069</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_006">
<mixed-citation publication-type="chapter"> <string-name><surname>Bruna</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zaremba</surname> <given-names>W</given-names></string-name>, <string-name><surname>Szlam</surname> <given-names>A</given-names></string-name>, <string-name><surname>LeCun</surname> <given-names>Y</given-names></string-name> (<year>2014</year>). <chapter-title>Spectral networks and deep locally connected networks on graphs</chapter-title>. In: <source><italic>Conf. on Learning Representations, ICLR 2014—Conference Track Proceedings</italic></source> (<string-name><given-names>Y</given-names> <surname>Bengio</surname></string-name>, <string-name><given-names>Y</given-names> <surname>LeCun</surname></string-name>, eds.), <fpage>1</fpage>–<lpage>14</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_007">
<mixed-citation publication-type="chapter"> <string-name><surname>Chen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Guestrin</surname> <given-names>C</given-names></string-name> (<year>2016</year>). <chapter-title>Xgboost: A scalable tree boosting system</chapter-title>. In: <source><italic>Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining—KDD ’16</italic></source>, <fpage>785</fpage>–<lpage>794</lpage>. <publisher-name>ACM Press</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_008">
<mixed-citation publication-type="journal"> <string-name><surname>Corso</surname> <given-names>G</given-names></string-name>, <string-name><surname>Cavalleri</surname> <given-names>L</given-names></string-name>, <string-name><surname>Beaini</surname> <given-names>D</given-names></string-name>, <string-name><surname>Liò</surname> <given-names>P</given-names></string-name>, <string-name><surname>Velickovic</surname> <given-names>P</given-names></string-name> (<year>2020</year>). <article-title>Principal neighbourhood aggregation for graph nets</article-title>. <source><italic>Advances in Neural Information Processing Systems</italic></source>, <volume>33</volume>: <fpage>13260</fpage>–<lpage>13271</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_009">
<mixed-citation publication-type="journal"> <string-name><surname>Defferrard</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bresson</surname> <given-names>X</given-names></string-name>, <string-name><surname>Vandergheynst</surname> <given-names>P</given-names></string-name> (<year>2016</year>). <article-title>Convolutional neural networks on graphs with fast localized spectral filtering</article-title>. <source><italic>Advances in Neural Information Processing Systems</italic></source>, <volume>29</volume>: <fpage>3837</fpage>–<lpage>3845</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_010">
<mixed-citation publication-type="journal"> <string-name><surname>Dumitrescu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Baltoiu</surname> <given-names>A</given-names></string-name>, <string-name><surname>Budulan</surname> <given-names>S</given-names></string-name> (<year>2022</year>). <article-title>Anomaly detection in graphs of bank transactions for anti money laundering applications</article-title>. <source><italic>IEEE Access</italic></source>, <volume>10</volume>: <fpage>47699</fpage>–<lpage>47714</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2022.3170467" xlink:type="simple">https://doi.org/10.1109/ACCESS.2022.3170467</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_011">
<mixed-citation publication-type="other"> <string-name><surname>Eddin</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Bono</surname> <given-names>J</given-names></string-name>, <string-name><surname>Aparício</surname> <given-names>D</given-names></string-name>, <string-name><surname>Polido</surname> <given-names>D</given-names></string-name>, <string-name><surname>Ascensão</surname> <given-names>JT</given-names></string-name>, <string-name><surname>Bizarro</surname> <given-names>P</given-names></string-name>, et al. (<year>2021</year>). Anti-money laundering alert optimization using machine learning with graphs. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/2112.07508</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_012">
<mixed-citation publication-type="chapter"> <string-name><surname>Gallicchio</surname> <given-names>C</given-names></string-name>, <string-name><surname>Micheli</surname> <given-names>A</given-names></string-name> (<year>2010</year>). <chapter-title>Graph echo state networks</chapter-title>. In: <source><italic>The 2010 International Joint Conference on Neural Networks (IJCNN)</italic></source>, <fpage>1</fpage>–<lpage>10</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_013">
<mixed-citation publication-type="chapter"> <string-name><surname>Gilmer</surname> <given-names>J</given-names></string-name>, <string-name><surname>Schoenholz</surname> <given-names>SS</given-names></string-name>, <string-name><surname>Riley</surname> <given-names>PF</given-names></string-name>, <string-name><surname>Vinyals</surname> <given-names>O</given-names></string-name>, <string-name><surname>Dahl</surname> <given-names>GE</given-names></string-name> (<year>2017</year>). <chapter-title>Neural message passing for quantum chemistry</chapter-title>. In: <source><italic>ICML</italic></source> (<string-name><given-names>D</given-names> <surname>Precup</surname></string-name>, <string-name><given-names>YW</given-names> <surname>Teh</surname></string-name>, eds.), volume <volume>70</volume> of <series><italic>Proceedings of Machine Learning Research, PMLR</italic></series>, <fpage>1263</fpage>–<lpage>1272</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_014">
<mixed-citation publication-type="chapter"> <string-name><surname>Gori</surname> <given-names>M</given-names></string-name>, <string-name><surname>Monfardini</surname> <given-names>G</given-names></string-name>, <string-name><surname>Scarselli</surname> <given-names>F</given-names></string-name> (<year>2005</year>). <chapter-title>A new model for learning in graph domains</chapter-title>. In: <source><italic>Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005</italic></source>, <fpage>729</fpage>–<lpage>734</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_015">
<mixed-citation publication-type="journal"> <string-name><surname>Hamilton</surname> <given-names>WL</given-names></string-name> (<year>2020</year>). <article-title>Graph representation learning Hamilton</article-title>. <source><italic>Synthesis Lectures on Artificial Intelligence and Machine Learning</italic></source>, <volume>14</volume>: <fpage>1</fpage>–<lpage>159</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/978-3-031-01588-5" xlink:type="simple">https://doi.org/10.1007/978-3-031-01588-5</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_016">
<mixed-citation publication-type="chapter"> <string-name><surname>Hamilton</surname> <given-names>WL</given-names></string-name>, <string-name><surname>Ying</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name> (<year>2017</year>). <chapter-title>Inductive representation learning on large graphs</chapter-title>. In: <source><italic>NIPS</italic></source> (<string-name><given-names>I</given-names> <surname>Guyon</surname></string-name>, <string-name><given-names>U</given-names> <surname>von Luxburg</surname></string-name>, <string-name><given-names>S</given-names> <surname>Bengio</surname></string-name>, <string-name><given-names>HM</given-names> <surname>Wallach</surname></string-name>, <string-name><given-names>R</given-names> <surname>Fergus</surname></string-name>, <string-name><given-names>SVN</given-names> <surname>Vishwanathan</surname></string-name>, <string-name><given-names>R</given-names> <surname>Garnett</surname></string-name>, eds.), <fpage>1024</fpage>–<lpage>1034</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_017">
<mixed-citation publication-type="journal"> <string-name><surname>Han</surname> <given-names>J</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Towey</surname> <given-names>K</given-names></string-name> (<year>2020</year>). <article-title>Artificial intelligence for anti-money laundering: A review and extension</article-title>. <source><italic>Digital Finance</italic></source>, <volume>2</volume>: <fpage>211</fpage>–<lpage>239</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s42521-020-00023-1" xlink:type="simple">https://doi.org/10.1007/s42521-020-00023-1</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_018">
<mixed-citation publication-type="other"> <string-name><surname>Hu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Gomes</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zitnik</surname> <given-names>M</given-names></string-name>, <string-name><surname>Liang</surname> <given-names>P</given-names></string-name>, <string-name><surname>Pande</surname> <given-names>VS</given-names></string-name>, et al. (<year>2019</year>). Pre-training graph neural networks. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1905.12265</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_019">
<mixed-citation publication-type="chapter"> <string-name><surname>Izmailov</surname> <given-names>P</given-names></string-name>, <string-name><surname>Podoprikhin</surname> <given-names>D</given-names></string-name>, <string-name><surname>Garipov</surname> <given-names>T</given-names></string-name>, <string-name><surname>Vetrov</surname> <given-names>D</given-names></string-name>, <string-name><surname>Wilson</surname> <given-names>AG</given-names></string-name> (<year>2018</year>). <chapter-title>Averaging weights leads to wider optima and better generalization</chapter-title>. In: <source><italic>UAI</italic></source> (<string-name><given-names>A</given-names> <surname>Globerson</surname></string-name>, <string-name><given-names>R</given-names> <surname>Silva</surname></string-name>, eds.), volume <volume>2</volume>, <fpage>876</fpage>–<lpage>885</lpage>. <publisher-name>AUAI Press</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_020">
<mixed-citation publication-type="other"> <string-name><surname>Johannessen</surname> <given-names>F</given-names></string-name>, <string-name><surname>Jullum</surname> <given-names>M</given-names></string-name> (<year>2023</year>). Finding money launderers using heterogeneous graph neural networks. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/2307.13499</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_021">
<mixed-citation publication-type="chapter"> <string-name><surname>Kipf</surname> <given-names>TN</given-names></string-name>, <string-name><surname>Welling</surname> <given-names>M</given-names></string-name> (<year>2017</year>). <chapter-title>Semi-supervised classification with graph convolutional networks</chapter-title>. In: <source><italic>ICLR Poster</italic></source>, <fpage>1</fpage>–<lpage>14</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_022">
<mixed-citation publication-type="chapter"> <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name>, <string-name><surname>Faloutsos</surname> <given-names>C</given-names></string-name> (<year>2006</year>). <chapter-title>Sampling from large graphs</chapter-title>. In: <source><italic>KDD</italic></source> (<string-name><given-names>T</given-names> <surname>Eliassi-Rad</surname></string-name>, <string-name><given-names>LH</given-names> <surname>Ungar</surname></string-name>, <string-name><given-names>M</given-names> <surname>Craven</surname></string-name>, <string-name><given-names>D</given-names> <surname>Gunopulos</surname></string-name>, eds.), volume <volume>2006</volume>, <fpage>631</fpage>–<lpage>636</lpage>. <publisher-name>Association for Computing Machinery</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_023">
<mixed-citation publication-type="journal"> <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name>, <string-name><surname>Sosič</surname> <given-names>R</given-names></string-name> (<year>2016</year>). <article-title>Snap: A general-purpose network analysis and graph-mining library</article-title>. <source><italic>ACM Transactions on Intelligent Systems and Technology</italic></source>, <volume>8</volume>: <fpage>1</fpage>–<lpage>20</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_024">
<mixed-citation publication-type="journal"> <string-name><surname>Li</surname> <given-names>G</given-names></string-name>, <string-name><surname>Xiong</surname> <given-names>C</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>G</given-names></string-name>, <string-name><surname>Thabet</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ghanem</surname> <given-names>B</given-names></string-name> (<year>2023</year>). <article-title>Deepergcn: Training deeper gcns with generalized aggregation functions</article-title>. <source><italic>IEEE Transactions on Pattern Analysis and Machine Intelligence</italic></source>, <volume>45</volume>: <fpage>13024</fpage>–<lpage>13034</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_025">
<mixed-citation publication-type="chapter"> <string-name><surname>Liu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Xue</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>C</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Paris</surname> <given-names>C</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <chapter-title>Deep learning for community detection: Progress, challenges and opportunities</chapter-title>. In: <source><italic>IJCAI</italic></source>, <fpage>4981</fpage>–<lpage>4987</lpage>. <comment>ijcai.org</comment>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_026">
<mixed-citation publication-type="other"> <string-name><surname>Opitz</surname> <given-names>J</given-names></string-name>, <string-name><surname>Burst</surname> <given-names>S</given-names></string-name> (<year>2019</year>). Macro F1 and macro F1. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1911.03347</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_027">
<mixed-citation publication-type="other"> <string-name><surname>Parliament</surname> <given-names>TE</given-names></string-name> (<year>2015</year>). Directive (eu) 2015/ 849 of the european parliamend and of the council—of 20 May 2015. <italic>Official Journal of the European Union</italic>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_028">
<mixed-citation publication-type="other"> <string-name><surname>Raschka</surname> <given-names>S</given-names></string-name> (<year>2018</year>). Model evaluation, model selection, and algorithm selection in machine learning performance estimation: Generalization performance vs. model selection. arXiv preprint.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_029">
<mixed-citation publication-type="book"> <string-name><surname>Sammut</surname> <given-names>C</given-names></string-name>, <string-name><surname>Webb</surname> <given-names>GI</given-names></string-name> (<year>2011</year>). <source><italic>Encyclopedia of Machine Learning</italic></source>. <publisher-name>Springer Science &amp; Business Media</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_030">
<mixed-citation publication-type="journal"> <string-name><surname>Scarselli</surname> <given-names>F</given-names></string-name>, <string-name><surname>Gori</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tsoi</surname> <given-names>AC</given-names></string-name>, <string-name><surname>Hagenbuchner</surname> <given-names>M</given-names></string-name>, <string-name><surname>Monfardini</surname> <given-names>G</given-names></string-name> (<year>2009</year>). <article-title>Computational capabilities of graph neural networks</article-title>. <source><italic>IEEE Transactions on Neural Networks</italic></source>, <volume>20</volume>: <fpage>81</fpage>–<lpage>102</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TNN.2008.2005141" xlink:type="simple">https://doi.org/10.1109/TNN.2008.2005141</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_031">
<mixed-citation publication-type="book"> <string-name><surname>Shi</surname> <given-names>C</given-names></string-name> (<year>2022</year>). <source><italic>Heterogeneous Graph Neural Networks</italic></source>. <fpage>351</fpage>–<lpage>369</lpage>. <publisher-name>Springer Nature Singapore</publisher-name>, <publisher-loc>Singapore</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_032">
<mixed-citation publication-type="chapter"> <string-name><surname>Silva</surname> <given-names>ÍDG</given-names></string-name>, <string-name><surname>Correia</surname> <given-names>LHA</given-names></string-name>, <string-name><surname>Maziero</surname> <given-names>EG</given-names></string-name> (<year>2023</year>). <chapter-title>Graph neural networks applied to money laundering detection in intelligent information systems</chapter-title>. In: <source><italic>Proceedings of the XIX Brazilian Symposium on Information Systems</italic></source> (<string-name><given-names>MXC</given-names> <surname>da Cunha</surname></string-name>, <string-name><given-names>MF</given-names> <surname>de Souza Júnior</surname></string-name>, <string-name><given-names>JC</given-names> <surname>Marques</surname></string-name>, <string-name><given-names>TM</given-names> <surname>de Classe</surname></string-name>, <string-name><given-names>RD</given-names> <surname>Araújo</surname></string-name>, eds.), <fpage>252</fpage>–<lpage>259</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_033">
<mixed-citation publication-type="other"> <string-name><surname>Tailor</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Opolka</surname> <given-names>FL</given-names></string-name>, <string-name><surname>Liò</surname> <given-names>P</given-names></string-name>, <string-name><surname>Lane</surname> <given-names>ND</given-names></string-name> (<year>2022</year>). Do we need anisotropic graph neural networks? arXiv preprint: <uri>https://arxiv.org/abs/2104.01481</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_034">
<mixed-citation publication-type="journal"> <string-name><surname>Thornberry</surname> <given-names>WMM</given-names></string-name> (<year>2021</year>). <article-title>National defense authorization act for fiscal year 2021</article-title>. <source><italic>Public Law</italic></source>, <volume>116</volume>: <fpage>283</fpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_035">
<mixed-citation publication-type="other"> <string-name><surname>Velickovic</surname> <given-names>P</given-names></string-name>, <string-name><surname>Cucurull</surname> <given-names>G</given-names></string-name>, <string-name><surname>Casanova</surname> <given-names>A</given-names></string-name>, <string-name><surname>Romero</surname> <given-names>A</given-names></string-name>, <string-name><surname>Liò</surname> <given-names>P</given-names></string-name>, <string-name><surname>Bengio</surname> <given-names>Y</given-names></string-name> (<year>2017</year>). Graph attention networks. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1710.10903</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_036">
<mixed-citation publication-type="chapter"> <string-name><surname>Watanabe</surname> <given-names>S</given-names></string-name>, <string-name><surname>Bansal</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hutter</surname> <given-names>F</given-names></string-name> (<year>2023</year>). <chapter-title>Ped-anova: Efficiently quantifying hyperparameter importance in arbitrary subspaces</chapter-title>. In: <source><italic>Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI ’23</italic></source> (<string-name><given-names>E</given-names> <surname>Elkind</surname></string-name>, ed.), <fpage>4389</fpage>–<lpage>4396</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_037">
<mixed-citation publication-type="other"> <string-name><surname>Weber</surname> <given-names>M</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Suzumura</surname> <given-names>T</given-names></string-name>, <string-name><surname>Pareja</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>T</given-names></string-name>, <string-name><surname>Kanezashi</surname> <given-names>H</given-names></string-name>, et al. (<year>2018</year>). Scalable graph learning for anti-money laundering: A first look. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1812.00076</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_038">
<mixed-citation publication-type="other"> <string-name><surname>Weber</surname> <given-names>M</given-names></string-name>, <string-name><surname>Domeniconi</surname> <given-names>G</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Weidele</surname> <given-names>DKI</given-names></string-name>, <string-name><surname>Bellei</surname> <given-names>C</given-names></string-name>, <string-name><surname>Robinson</surname> <given-names>T</given-names></string-name>, et al. (<year>2019</year>). Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1908.02591</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_039">
<mixed-citation publication-type="journal"> <string-name><surname>Wu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>F</given-names></string-name>, <string-name><surname>Long</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>PS</given-names></string-name> (<year>2021</year>). <article-title>A comprehensive survey on graph neural networks</article-title>. <source><italic>IEEE Transactions on Neural Networks and Learning Systems</italic></source>, <volume>32</volume>: <fpage>4</fpage>–<lpage>24</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TNNLS.2020.2978386" xlink:type="simple">https://doi.org/10.1109/TNNLS.2020.2978386</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_040">
<mixed-citation publication-type="other"> <string-name><surname>Xu</surname> <given-names>K</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name>, <string-name><surname>Jegelka</surname> <given-names>S</given-names></string-name> (<year>2018</year>). How powerful are graph neural networks? <italic>CoRR</italic>. arXiv preprint: <uri>https://arxiv.org/abs/1810.00826</uri>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_041">
<mixed-citation publication-type="journal"> <string-name><surname>Yang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Han</surname> <given-names>J</given-names></string-name> (<year>2020</year>). <article-title>Heterogeneous network representation learning: A unified framework with survey and benchmark</article-title>. <source><italic>IEEE Transactions on Knowledge and Data Engineering</italic></source>, <volume>34</volume>: <fpage>4854</fpage>–<lpage>4873</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TKDE.2020.3045924" xlink:type="simple">https://doi.org/10.1109/TKDE.2020.3045924</ext-link></mixed-citation>
</ref>
<ref id="j_jds1190_ref_042">
<mixed-citation publication-type="chapter"> <string-name><surname>Yang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>D</given-names></string-name> (<year>2020</year>). <chapter-title>NENN: Incorporate node and edge features in graph neural networks</chapter-title>. In: <source><italic>Proceedings of the 12th Asian Conference on Machine Learning, ACML 2020, 18–20 November 2020, Bangkok, Thailand</italic></source> (<string-name><given-names>SJ</given-names> <surname>Pan</surname></string-name>, <string-name><given-names>M</given-names> <surname>Sugiyama</surname></string-name>, eds.), volume <volume>129</volume> of <series><italic>Proceedings of Machine Learning Research, PMLR</italic></series>, <fpage>593</fpage>–<lpage>608</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_043">
<mixed-citation publication-type="journal"> <string-name><surname>Ying</surname> <given-names>C</given-names></string-name>, <string-name><surname>Cai</surname> <given-names>T</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ke</surname> <given-names>G</given-names></string-name>, <string-name><surname>He</surname> <given-names>D</given-names></string-name>, <etal>et al.</etal> (<year>2021</year>). <article-title>Do transformers really perform badly for graph representation?</article-title> <source><italic>Advances in Neural Information Processing Systems</italic></source>, <volume>34</volume>: <fpage>28877</fpage>–<lpage>28888</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_044">
<mixed-citation publication-type="chapter"> <string-name><surname>You</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ying</surname> <given-names>R</given-names></string-name>, <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name> (<year>2020</year>). <chapter-title>Design space for graph neural networks</chapter-title>. In: <source><italic>Proceedings of the 34th International Conference on Neural Information Processing Systems, NIPS ’20</italic></source> (<string-name><given-names>H</given-names> <surname>Larochelle</surname></string-name>, <string-name><given-names>M</given-names> <surname>Ranzato</surname></string-name>, <string-name><given-names>R</given-names> <surname>Hadsell</surname></string-name>, <string-name><given-names>M-F</given-names> <surname>Balcan</surname></string-name>, <string-name><given-names>H-T</given-names> <surname>Lin</surname></string-name>, eds.), <fpage>17009</fpage>–<lpage>17021</lpage>. <publisher-name>Curran Associates Inc.</publisher-name>, <publisher-loc>Red Hook, NY, USA</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1190_ref_045">
<mixed-citation publication-type="other"> <string-name><surname>Zhao</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mostafa</surname> <given-names>H</given-names></string-name>, <string-name><surname>Galkin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bronstein</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Tang</surname> <given-names>J</given-names></string-name> (<year>2024</year>). Graphany: A foundation model for node classification on any graph. arXiv preprint: <uri>https://arxiv.org/abs/2405.20445</uri>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
