{"id":"https://openalex.org/W4417284296","doi":"https://doi.org/10.1109/access.2025.3642572","title":"Intent-Aware Multi-Source Hybrid Attention for Financial Fraud Detection and Capital Flow Prediction","display_name":"Intent-Aware Multi-Source Hybrid Attention for Financial Fraud Detection and Capital Flow Prediction","publication_year":2025,"publication_date":"2025-12-12","ids":{"openalex":"https://openalex.org/W4417284296","doi":"https://doi.org/10.1109/access.2025.3642572"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3642572","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642572","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3642572","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022773821","display_name":"Yuhan Wang","orcid":"https://orcid.org/0009-0006-7772-8704"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yuhan Wang","raw_affiliation_strings":["UNSW Business School (E12), UNSW Sydney, Kensington, NSW, Australia","UNSW Business School (E12), UNSW Sydney, Cnr Union Rd &#x0026; College Rd, Kensington, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"UNSW Business School (E12), UNSW Sydney, Kensington, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"UNSW Business School (E12), UNSW Sydney, Cnr Union Rd &#x0026; College Rd, Kensington, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072667934","display_name":"Wenhao Kang","orcid":"https://orcid.org/0009-0000-2786-2637"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenhao Kang","raw_affiliation_strings":["Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022773821"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22210561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"1041","last_page":"1063"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.3822000026702881,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.3822000026702881,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11653","display_name":"Financial Distress and Bankruptcy Prediction","score":0.2721000015735626,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.10209999978542328,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.5881999731063843},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5830000042915344},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5270000100135803},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4909999966621399},{"id":"https://openalex.org/keywords/transaction-data","display_name":"Transaction data","score":0.4068000018596649},{"id":"https://openalex.org/keywords/financial-transaction","display_name":"Financial transaction","score":0.3684000074863434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8008999824523926},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5830000042915344},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5270000100135803},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4909999966621399},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4691999852657318},{"id":"https://openalex.org/C127722929","wikidata":"https://www.wikidata.org/wiki/Q7833714","display_name":"Transaction data","level":3,"score":0.4068000018596649},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39590001106262207},{"id":"https://openalex.org/C164516710","wikidata":"https://www.wikidata.org/wiki/Q1166072","display_name":"Financial transaction","level":3,"score":0.3684000074863434},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3384999930858612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3257000148296356},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.2962999939918518},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2624000012874603}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3642572","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642572","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3642572","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642572","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1902237438","https://openalex.org/W1994440344","https://openalex.org/W2085766370","https://openalex.org/W2088402748","https://openalex.org/W2142894327","https://openalex.org/W2172852798","https://openalex.org/W2217007515","https://openalex.org/W2296719434","https://openalex.org/W2438521089","https://openalex.org/W2463618975","https://openalex.org/W2606176882","https://openalex.org/W2625602624","https://openalex.org/W2740755977","https://openalex.org/W2773049109","https://openalex.org/W2887263516","https://openalex.org/W2894098246","https://openalex.org/W2897938066","https://openalex.org/W2913083325","https://openalex.org/W2913340405","https://openalex.org/W2949734902","https://openalex.org/W3040735650","https://openalex.org/W3042367695","https://openalex.org/W3082648102","https://openalex.org/W3102359135","https://openalex.org/W3122071924","https://openalex.org/W3195137260","https://openalex.org/W4212991495","https://openalex.org/W4226492624","https://openalex.org/W4319970149","https://openalex.org/W4385245566","https://openalex.org/W4396521123","https://openalex.org/W4396699844","https://openalex.org/W4400524829","https://openalex.org/W4401415216","https://openalex.org/W4402193259","https://openalex.org/W4404390753"],"related_works":[],"abstract_inverted_index":{"Financial":[0],"fraud":[1,53,270],"detection":[2,54],"and":[3,14,31,55,76,96,111,119,130,133,144,155,172,186,217,225,247],"capital":[4,56,252],"flow":[5,57,253],"prediction":[6],"are":[7,240],"critical":[8],"for":[9,51,151],"payment":[10],"security,":[11],"anti\u2013money":[12],"laundering,":[13],"regulatory":[15],"oversight.":[16],"These":[17],"tasks":[18],"remain":[19],"challenging":[20],"due":[21],"to":[22,139,229],"asymmetric":[23,72],"behaviors":[24],"between":[25,74,142],"transacting":[26],"parties,":[27],"heterogeneous":[28],"transaction":[29,88,124,145,181,278],"contexts,":[30],"the":[32,93,117,191,209,230,234,238],"absence":[33],"of":[34,98,190,223],"unified":[35],"intent":[36,109,143],"modeling.":[37],"To":[38,168],"address":[39],"these":[40],"issues,":[41],"we":[42,174],"propose":[43],"IMHA":[44,66,83,101,200,212,255],"(<italic":[45],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[46],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Intent-aware":[47],"Multi-source":[48],"Hybrid":[49],"Attention</i>)":[50],"financial":[52],"prediction.":[58],"Unlike":[59],"prior":[60],"multi-task":[61],"or":[62],"hybrid":[63,136,166],"attention":[64,137],"methods,":[65],"explicitly":[67],"models":[68],"user":[69],"intent,":[70],"capturing":[71],"interactions":[73,141],"sender":[75,118],"receiver":[77,120],"accounts.":[78],"This":[79],"intent-aware":[80,153],"mechanism":[81,138],"distinguishes":[82],"by":[84,159],"not":[85],"only":[86],"leveraging":[87],"metadata":[89,114,125],"but":[90],"also":[91,266],"incorporating":[92],"underlying":[94],"behavior":[95],"context":[97],"each":[99],"party.":[100],"incorporates":[102],"three":[103],"semantically":[104],"distinct":[105],"sources:":[106],"(1)":[107],"high-level":[108],"profiles":[110,154],"historical":[112],"behavioral":[113],"from":[115],"both":[116,152],"accounts;":[121],"(2)":[122],"current":[123],"including":[126],"device,":[127],"identity,":[128],"location,":[129],"risk":[131,271],"flags;":[132],"(3)":[134],"a":[135,160,178,214,257],"model":[140,170],"behavior.":[146],"We":[147],"design":[148],"dedicated":[149],"encoders":[150],"transaction-level":[156],"features,":[157],"followed":[158],"cross-account":[161,269],"interaction":[162],"module":[163],"based":[164],"on":[165],"attention.":[167],"support":[169],"training":[171],"evaluation,":[173],"construct":[175],"two":[176],"datasets:":[177],"60,000-sample":[179],"synthetic":[180,235],"dataset":[182],"generated":[183],"using":[184],"GPT-4o,":[185],"an":[187],"enhanced":[188],"version":[189],"IEEE-CIS":[192,210],"Fraud":[193],"Detection":[194],"dataset.":[195],"Experimental":[196],"results":[197],"show":[198],"that":[199],"achieves":[201,213],"significant":[202],"improvements":[203,222,239],"over":[204],"state-of-the-art":[205],"baseline":[206],"methods.":[207],"On":[208,233],"dataset,":[211,237],"0.978":[215],"AUROC":[216,246],"0.862":[218],"F1-score,":[219],"representing":[220],"relative":[221],"+3.59%":[224],"+7.86%":[226],"respectively":[227],"compared":[228],"best":[231],"baseline.":[232],"GPT-4o":[236],"even":[241],"more":[242],"substantial":[243],"with":[244],"+4.43%":[245],"+10.06%":[248],"F1-score":[249],"gains.":[250],"For":[251],"prediction,":[254],"demonstrates":[256],"12.67%":[258],"improvement":[259],"in":[260],"classification":[261],"accuracy.":[262],"The":[263],"proposed":[264],"framework":[265],"provides":[267],"interpretable":[268],"representation,":[272],"demonstrating":[273],"strong":[274],"generalization":[275],"across":[276],"different":[277],"structures.":[279]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
