SlideShare a Scribd company logo
This content is classified as Internal
ML & Graph
algorithms to prevent
financial crime in
digital payments
Alberto Danese, Head of Data
Science
Paolo Testa, Lead Data Scientist
This content is classified as Internal
2
Next
generation
payments
Next to
Customers
This content is classified as Internal
3
End-to-end payment solutions for Financial Institutions, Merchants and Consumers
This content is classified as Internal
4
CAPABILITIES
MANAGING
SERVING
SCALE
>10.500
people
>3.000
Product & Tech
Development
Specialists
~€300mln
Annual Total IT &
Innovation
Spending
~170mln
Cards
~2.2mln
Merchants
#1
Merchant
acquirer
by number of merchants
and transaction value
#1
Card
processor
by number of cards
and transaction
volume
>1k
Top financial
Institutions
~15 bn
ACH trx
>25
Countries
HQ
The Leading PayTech, European by scale, Local by nature
This content is classified as Internal
5
Select * from Nexi where dept like ‘DATA%’
~40 internal people (in
the hub - Data Area)
including 10 in Data
Science Team
5+ spokes within the
business lines
Support Business
Development
Fight Financial
Crime
Evolve Tech and
Develop Special
Projects
90% projects on public
cloud
Product-oriented
mindset with end-to-end
ownership
This content is classified as Internal
6
Work with us!
Check on Linkedin jobs for Nexi Italy, Nexi Group and Nexi Digital
Currently, you may be interested in:
• Junior Data Scientist – Fraud Intelligence Specialist (Nexi Italy)
• Data Engineer (Nexi Digital)
This content is classified as Internal
7
ML & Graph algorithms to prevent
financial crime in digital payments
This content is classified as Internal
8
INFINITECH
PROJECT
ML & GRAPH
APPLICATION
FINANCIAL CRIME IN
DIGITAL PAYMENTS
Agenda - ML & Graph algorithms to prevent financial crime in digital payments
01
What are the main
challenges related
fo financial crime?
What is Anti-
money laundering
(AML)?
02
How can ML and
Graph help AML
ot optimize and
improove their
daily activity?
03
What is the
Infinitech Project
and you can
access to it?
This content is classified as Internal
9
Financial crime challenges
• Financial crime is one of the main challenges that
banks, and financial institutions must face,
leading to :
• Financial penalties
• Reputational Damage
• Lose customer trust
• While security measure are more and more advanced,
fraudsters and organized crime keep on evolving as well
• Two types of criminal activity:
• Payments Fraud → the cardholder is victim of
fraudulent organization.
• Money Laundering → the cardholder is involved in
criminal activity, using payments tools.
In 2020 global banks were hit with $10.4bn in fines for
money-laundering violations, an increase of more than
80% on 2019
This content is classified as Internal
10
Anti-Money Laundering (AML)
• Money Laundering happens when individuals
attempt to hide profit gained from criminal
means
• Money can be originated by gambling, drug
trafficking, and other illegal activities
• Nexi AML aim is to put risk procedures to
recognize and stop criminal activities using
Nexi products (cards or POS).
Money laundering in digital payments AML Transaction Monitoring workflow
1. Suspicious payments
transaction Alert is
generated
2. The AML investigators
analyze the data related
to the alert
3. The investigator evaluates
whether to notify to
central authority (Bank of
Italy informative financial
unit)
the suspicious case
This content is classified as Internal
11
Anti-Money Laundering Challenges
“Human in the Loop” is a must
We can’t fully automize and
optimize the transaction
monitoring, since evaluation
of AML investigator is a
requirement.
But we can optimize the
volume of alerts, that is, the
suspicious transactions to
analyze
# of analysis of
payments
transactions
time & cost
effectiveness
FP – FN trade off
FP
Risk of sanctions
due to missed notification
You can’t analyze
each single transactions
FN FP FN
This content is classified as Internal
12
INFINITECH
PROJECT
ML & GRAPH
APPLICATION
FINANCIAL CRIME IN
DIGITAL PAYMENTS
Agenda - ML & Graph algorithms to prevent financial crime in digital payments
01
What are the main
challenges related
fo financial crime?
What is Anti-
money laundering
(AML)?
02
How can ML and
Graph help AML
ot optimize and
improove their
daily activity?
03
What is the
Infinitech Project
and you can
access to it?
This content is classified as Internal
13
Level 0 – rule base approach
Data
Lake
Amazon
S3
SQL-based
Anomaly
Engine
Amazon
Athena
Reporting
Layer
Microsoft
PowerBI
SELECT user_id
FROM transactions
WHERE
metric_1 > THR1
and metric_2 > THR2
PROS
Simplicity:
each alert is triggered by an SQL
Explainability :
a SQL is rule shared with AML
CONS
Scale:
high transact. volume, +300 rules,
generating large amount of alerts,
leading to high False Positive rate
Group:
relational dbs are not the best
solutions for network modelling
Highlights
Architecture
This content is classified as Internal
14
Level 01 - Supervised ML
The first approach is to train a ML
model to classify anomalous cases
based on notification pattern (target)
Thanks to this, we avoid to set manually
+500 rules; we just metrics of those
rule as features in the ML model.
The output of the model will be
probability score of a customer to be
notified due to suspicious transactions
AML investigators can focus only on
tuning only 1 threshold (the prob.
Score) and can be used as rank metric
User id Feature 01 Feature 02 … Feature P Target
373429 12.000 € 23% 1 1
598492 1.000 € 10% 0 0
… … … .. .. ..
598492 160.000 € 37% 1 0
Level 01 Description
This content is classified as Internal
15
Level 01 – Deep dive
Data
Lake
Amazon
S3
process
AML
Feature
Store
prepare
train
test
score
datasets
Amazon
SageMaker
train
Score
&
SHAP ML score
Back-end
Front-end
report
Pipeline
Orchestration
AWS
Step
Functions
SERVERLESS & FULLY MANAGED STACK
Amazon
Glue
Model
Registry
Experiment
Registry
1
2
3
Serverless & Fully Managed ML
architecture
AML FS is part of Nexi FS.
Great_expectations and TDD
guarantees us data quality
4
Data Centric AI
SageMaker transaparently store
train jobs artifacts and
experiemnts in dedicated registry
This content is classified as Internal
16
Level 01 – Highlights
ML score
Shap values ordered features
Top 10000 risk
Notified
This content is classified as Internal
17
Level 01 – Highlights
• The output is a probability score;
1 threshold to fine tune the results
• SHAP values guarantees explainability
PROS
CONS
• The score is associated to a single
independent user, NOT in a
Network
• The ML model learn only from
notification of AML investigators.
This content is classified as Internal
18
send
money
Level 02 – Graph rule based approach
0.8 0.3
Org.
0.4
user 01 user 02
user 05
user 03
send
money
. . .
user N
send
money
0.93
0.2
user 06
0.3
• Network anomalies are hard to model and to check
with relational database
• Graph databases, like Neo4j, are the best choice when
your analytical focus is link between peers, that is a
network.
• Thanks to graph data structure several anomaly
detection rules can be built to fight groups of
suspicious transactions or users.
MATCH
(u:User)-[:send_money*]->(v:User)
WHERE
u.score > 0.8 and v.score > 0.8
Level 02 Description
This content is classified as Internal
19
Level 02 – Graph rule based approach
Data
Lake
ingest
AML
Feature
Store
Amazon
S3
Amazon
Glue
EC2
load
Graph
anomalies
Back-end
has
account
Front-end
query
process
DATA MODEL
1
Neo4j CE on EC2 (not managed)
2
Neo4J Spark connector
3
MATCH
(u:User)-[:send_money*]->(v:User)
WHERE
u.score > 0.8 and v.score > 0.8
This content is classified as Internal
20
Level 02 – Graph rule based approach
• Now network anomaly scenarios are
now addressed
• Graph model are easy to explain and
straightforward in rule settings.
PROS
CONS
• We lose the scale factor given by
automation of ML model.
It’s a manual rule based apporach
made with Cypher queries,
instead of SQL
This content is classified as Internal
21
Level 03 – ML and Graph
USER
ML
SCORE
RANK
user 03 0.93 1
user 01 0.8 2
user 05 0.4 3
user 02 0.3 4
user 04 0.2 5
ML anomaly only consider single
users.
If a user within a network with
high risk, then we want to spread
this information to this user.
USER
ML
SCORE
NEW
RANK
ML
RANK
user 03 0.93 1 1
user 01 0.8 2 2
user 02 0.3 3 (+1) 4
user 04 0.2 4 (+1) 5
user 05 0.4 5 (-2) 3
What we need is an algorithm
that spread ML score information
to within a given network
topology to adjust score and find
group of anomalous case.
Level 03 Description
This content is classified as Internal
22
Page Rank (PR) is an iterative
algorithm originally used by
Google to rank web pages (nodes)
according to the quality and
quantity of links (edges) pointing to
the pages.
Personalized Page Rank
𝑥′ = (1 − α) 𝑃′𝑥 + α ν
𝑥 = importance rank
ν = intrinsic centrality
P = adjacency matrix
We use ML score as intrinsic
centrality (v) to spread anomaly
information within the network,
with the aim to find groups of
suspicious individuals.
personalized PR
page-rank
This content is classified as Internal
23
Level 03 – Architecture & Contribution
Data
Lake
AML
Feature
Store
ML
anoamly
Score
ingest
PPR
Back-end
load
Front-end
Apply
PPR
1
Level01 ML anomaly score is
loaded into
Graph db as node attribute
2
Customized PPR is applied
as a Cypher function over
the graph database
3
PowerBI report
show PPR score
This content is classified as Internal
24
Level 03 - Highlights
• Scale factor is addressed, since PPR
run is operationalized.
• The PPR rank combines the best of
Level 01 (ML) and Level 02 (graph
algorithms) approaches
• As for Level 02, graph and PPR is
highly interpretable and
explainable
PPR RANK ML RANK ML SCORE
3 4859 0.93
3 neighbors
This content is classified as Internal
25
Summary
Level 0 – SQL rule based approach
Level 1 – Supervised ML
Level 2 – Graph rule based approach
Level 3 – ML and Graph based approach
INFINITECH
INFINITECH
This content is classified as Internal
26
INFINITECH PROJECT
Flagship initiative in Digital Finance
within ICT Horizon 2020 Programme
Project deliverables:
• Marketplace of
AI/IoT/Blockchain/Cybersecurity
technologies (algorithms, real-time
analytics, blockchain based data
sharing)
• Testbeds and sandbox for fintech
players to test and deploy their own
solutions
• Regulatory tools to helps company
to facilitate compliance to
regulations
This content is classified as Internal
27
INFINITECH PILOTS
Nexi Payments is one among 15
organizations, commercial banks,
central banks, startup, insurance
firms, who joined Infinitech
project as pilot.
Fintech/Insuretech application
fields:
• Financial crime
• Cybersecurity
• Personalized products
Technologies:
• #AI
• #BigData
• #IoT
• #Blockchain
This content is classified as Internal
28
INFINITECH OUTPUT
https://pilot16.infinitech-h2020.eu/ https://gitlab.infinitech-h2020.eu/pilot16/
aml-graph-payments-anomaly-detection
Two are outputs in the Infinitech
Testbed/Sandbox:
1. PILOT DEMO WEB-APP
Web app to show algorithms ( both
anomaly detection and PPR) with
third part or synthetic generated
data
2. ANOMALY ENGINE w/ JUPYTER
Git repository with docker
containers to use pilot graph
algorithms on third-part data in a
Jupyter notebook environment
This content is classified as Internal
29
1. PILOT DEMO WEB-APP
https://pilot16.infinitech-h2020.eu/
Web app to show algorithms ( both anomaly detection and PPR) with third part or synthetic generated data
This content is classified as Internal
30
2. ANOMALY ENGINE w/ JUPYYER
Git repository with docker containers to use pilot graph algorithms on third-part data in a Jupyter notebook
environment
https://gitlab.infinitech-h2020.eu/pilot16/aml-graph-payments-anomaly-detection
This content is classified as Internal
31
Pubblications and Contributions
This content is classified as Internal
32
Wrap up and special thanks
What did we learn along the way?
• Rule based approaches are still
present and widely adopted in 2023:
that’s fine! But ML is a sound
approach when dealing with hundreds
of rules
• Human in the loop is key: optimizing
the work of an analyst may be even
better than a fully automated
approach (in some scenarios)
• Network is a natural representation
for some phenomena, like digital
payments: a good data scientist should
be able to find the best combination
of ML & graph data science
• EU projects are a great opportunity!
This content is classified as Internal
33
Wrap up and special thanks
It’s been a team-work with multiple people
giving support in a way of another!
Thank you to:
• Fabio Dezi, Luca Latella and Luca Rinaldi –
and the always supporting DST
• Alfredo Fomitchenko and Vittorio Giatti
• Laura Arditti, Alberto De Lazzari and the
LARUS team
• Infinitech organization and GFT
SPECIAL THANK YOU TO…
What did we learn along the way?
• Rule based approaches are still
present and widely adopted in 2023:
that’s fine! But ML is a sound
approach when dealing with hundreds
of rules
• Human in the loop is key: optimizing
the work of an analyst may be even
better than a fully automated
approach (in some scenarios)
• Network is a natural representation
for some phenomena, like digital
payments: a good data scientist should
be able to find the best combination
of ML & graph data science
• EU projects are a great opportunity!
This content is classified as Internal
34
ANY QUESTION?
This content is classified as Internal

More Related Content

What's hot

Bangladesh Bank Foreign Exchange Heist
Bangladesh Bank Foreign Exchange HeistBangladesh Bank Foreign Exchange Heist
Bangladesh Bank Foreign Exchange Heist
AinulHasan4
 
Real-Time Anomaly Detection and Root Cause Analysis
Real-Time Anomaly Detection and Root Cause AnalysisReal-Time Anomaly Detection and Root Cause Analysis
Real-Time Anomaly Detection and Root Cause Analysis
Yotascale
 
Data mining and analysis of customer churn dataset
Data mining and analysis of customer churn datasetData mining and analysis of customer churn dataset
Data mining and analysis of customer churn dataset
Rohan Choksi
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
Yolanta Beresna
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
Harry McLaren
 
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
Neo4j
 
The Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat IntelligenceThe Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect
 
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
Seeling Cheung
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE - ATT&CKcon
 
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
Databricks
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
David Sweigert
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
T212
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
Alejandro Correa Bahnsen, PhD
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Text mining
Text miningText mining
Text mining
Koshy Geoji
 
End-to-End Machine Learning Project
End-to-End Machine Learning ProjectEnd-to-End Machine Learning Project
End-to-End Machine Learning Project
Eng Teong Cheah
 
Web Scraping and Data Extraction Service
Web Scraping and Data Extraction ServiceWeb Scraping and Data Extraction Service
Web Scraping and Data Extraction Service
PromptCloud
 
Clickstream Data Warehouse - Turning clicks into customers
Clickstream Data Warehouse - Turning clicks into customersClickstream Data Warehouse - Turning clicks into customers
Clickstream Data Warehouse - Turning clicks into customers
Albert Hui
 

What's hot (20)

Bangladesh Bank Foreign Exchange Heist
Bangladesh Bank Foreign Exchange HeistBangladesh Bank Foreign Exchange Heist
Bangladesh Bank Foreign Exchange Heist
 
Real-Time Anomaly Detection and Root Cause Analysis
Real-Time Anomaly Detection and Root Cause AnalysisReal-Time Anomaly Detection and Root Cause Analysis
Real-Time Anomaly Detection and Root Cause Analysis
 
Data mining and analysis of customer churn dataset
Data mining and analysis of customer churn datasetData mining and analysis of customer churn dataset
Data mining and analysis of customer churn dataset
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
 
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
Banking Circle: Money Laundering Beware: A Modern Approach to AML with Machin...
 
The Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat IntelligenceThe Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat Intelligence
 
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
Citizens Bank: Data Lake Implementation – Selecting BigInsights ViON Spark/Ha...
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
 
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
AI as a Service, Build Shared AI Service Platforms Based on Deep Learning Tec...
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Text mining
Text miningText mining
Text mining
 
End-to-End Machine Learning Project
End-to-End Machine Learning ProjectEnd-to-End Machine Learning Project
End-to-End Machine Learning Project
 
Web Scraping and Data Extraction Service
Web Scraping and Data Extraction ServiceWeb Scraping and Data Extraction Service
Web Scraping and Data Extraction Service
 
Clickstream Data Warehouse - Turning clicks into customers
Clickstream Data Warehouse - Turning clicks into customersClickstream Data Warehouse - Turning clicks into customers
Clickstream Data Warehouse - Turning clicks into customers
 

Similar to ML & Graph algorithms to prevent financial crime in digital payments

An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET Journal
 
A Review of deep learning techniques in detection of anomaly incredit card tr...
A Review of deep learning techniques in detection of anomaly incredit card tr...A Review of deep learning techniques in detection of anomaly incredit card tr...
A Review of deep learning techniques in detection of anomaly incredit card tr...
IRJET Journal
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
IRJET Journal
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
yatintaneja6
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j
 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud Detection
IRJET Journal
 
Credit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptxCredit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptx
sanjivaniahire31
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
Neo4j
 
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
DataScienceConferenc1
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Boston Institute of Analytics
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
Neo4j
 
Customer_Churn_prediction.pptx
Customer_Churn_prediction.pptxCustomer_Churn_prediction.pptx
Customer_Churn_prediction.pptx
Aniket Patil
 
Customer_Churn_prediction.pptx
Customer_Churn_prediction.pptxCustomer_Churn_prediction.pptx
Customer_Churn_prediction.pptx
patilaniket2418
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
Predicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using ClassificationPredicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using Classification
Vishva Abeyrathne
 
Report 190804110930
Report 190804110930Report 190804110930
Report 190804110930
udara12345
 

Similar to ML & Graph algorithms to prevent financial crime in digital payments (20)

An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
A Review of deep learning techniques in detection of anomaly incredit card tr...
A Review of deep learning techniques in detection of anomaly incredit card tr...A Review of deep learning techniques in detection of anomaly incredit card tr...
A Review of deep learning techniques in detection of anomaly incredit card tr...
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud Detection
 
Credit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptxCredit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptx
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
[DSC Europe 22] Anti-Money Laundering ML Modeling approach - Gizem Akar
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Customer_Churn_prediction.pptx
Customer_Churn_prediction.pptxCustomer_Churn_prediction.pptx
Customer_Churn_prediction.pptx
 
Customer_Churn_prediction.pptx
Customer_Churn_prediction.pptxCustomer_Churn_prediction.pptx
Customer_Churn_prediction.pptx
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Predicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using ClassificationPredicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using Classification
 
Report 190804110930
Report 190804110930Report 190804110930
Report 190804110930
 

More from Data Science Milan

How to use the Economic Complexity Index to guide innovation plans
How to use the Economic Complexity Index to guide innovation plansHow to use the Economic Complexity Index to guide innovation plans
How to use the Economic Complexity Index to guide innovation plans
Data Science Milan
 
Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning Methods
Data Science Milan
 
"You don't need a bigger boat": serverless MLOps for reasonable companies
"You don't need a bigger boat": serverless MLOps for reasonable companies"You don't need a bigger boat": serverless MLOps for reasonable companies
"You don't need a bigger boat": serverless MLOps for reasonable companies
Data Science Milan
 
Question generation using Natural Language Processing by QuestGen.AI
Question generation using Natural Language Processing by QuestGen.AIQuestion generation using Natural Language Processing by QuestGen.AI
Question generation using Natural Language Processing by QuestGen.AI
Data Science Milan
 
Speed up data preparation for ML pipelines on AWS
Speed up data preparation for ML pipelines on AWSSpeed up data preparation for ML pipelines on AWS
Speed up data preparation for ML pipelines on AWS
Data Science Milan
 
Serverless machine learning architectures at Helixa
Serverless machine learning architectures at HelixaServerless machine learning architectures at Helixa
Serverless machine learning architectures at Helixa
Data Science Milan
 
MLOps with a Feature Store: Filling the Gap in ML Infrastructure
MLOps with a Feature Store: Filling the Gap in ML InfrastructureMLOps with a Feature Store: Filling the Gap in ML Infrastructure
MLOps with a Feature Store: Filling the Gap in ML Infrastructure
Data Science Milan
 
Reinforcement Learning Overview | Marco Del Pra
Reinforcement Learning Overview | Marco Del PraReinforcement Learning Overview | Marco Del Pra
Reinforcement Learning Overview | Marco Del Pra
Data Science Milan
 
Time Series Classification with Deep Learning | Marco Del Pra
Time Series Classification with Deep Learning | Marco Del PraTime Series Classification with Deep Learning | Marco Del Pra
Time Series Classification with Deep Learning | Marco Del Pra
Data Science Milan
 
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AI
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AILudwig: A code-free deep learning toolbox | Piero Molino, Uber AI
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AI
Data Science Milan
 
Audience projection of target consumers over multiple domains a ner and baye...
Audience projection of target consumers over multiple domains  a ner and baye...Audience projection of target consumers over multiple domains  a ner and baye...
Audience projection of target consumers over multiple domains a ner and baye...
Data Science Milan
 
Weak supervised learning - Kristina Khvatova
Weak supervised learning - Kristina KhvatovaWeak supervised learning - Kristina Khvatova
Weak supervised learning - Kristina Khvatova
Data Science Milan
 
GANs beyond nice pictures: real value of data generation, Alex Honchar
GANs beyond nice pictures: real value of data generation, Alex HoncharGANs beyond nice pictures: real value of data generation, Alex Honchar
GANs beyond nice pictures: real value of data generation, Alex Honchar
Data Science Milan
 
Continual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
Continual/Lifelong Learning with Deep Architectures, Vincenzo LomonacoContinual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
Continual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
Data Science Milan
 
3D Point Cloud analysis using Deep Learning
3D Point Cloud analysis using Deep Learning3D Point Cloud analysis using Deep Learning
3D Point Cloud analysis using Deep Learning
Data Science Milan
 
Deep time-to-failure: predicting failures, churns and customer lifetime with ...
Deep time-to-failure: predicting failures, churns and customer lifetime with ...Deep time-to-failure: predicting failures, churns and customer lifetime with ...
Deep time-to-failure: predicting failures, churns and customer lifetime with ...
Data Science Milan
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
Data Science Milan
 
Pricing Optimization: Close-out, Online and Renewal strategies, Data Reply
Pricing Optimization: Close-out, Online and Renewal strategies, Data ReplyPricing Optimization: Close-out, Online and Renewal strategies, Data Reply
Pricing Optimization: Close-out, Online and Renewal strategies, Data Reply
Data Science Milan
 
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig..."How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
Data Science Milan
 
A view of graph data usage by Cerved
A view of graph data usage by CervedA view of graph data usage by Cerved
A view of graph data usage by Cerved
Data Science Milan
 

More from Data Science Milan (20)

How to use the Economic Complexity Index to guide innovation plans
How to use the Economic Complexity Index to guide innovation plansHow to use the Economic Complexity Index to guide innovation plans
How to use the Economic Complexity Index to guide innovation plans
 
Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning Methods
 
"You don't need a bigger boat": serverless MLOps for reasonable companies
"You don't need a bigger boat": serverless MLOps for reasonable companies"You don't need a bigger boat": serverless MLOps for reasonable companies
"You don't need a bigger boat": serverless MLOps for reasonable companies
 
Question generation using Natural Language Processing by QuestGen.AI
Question generation using Natural Language Processing by QuestGen.AIQuestion generation using Natural Language Processing by QuestGen.AI
Question generation using Natural Language Processing by QuestGen.AI
 
Speed up data preparation for ML pipelines on AWS
Speed up data preparation for ML pipelines on AWSSpeed up data preparation for ML pipelines on AWS
Speed up data preparation for ML pipelines on AWS
 
Serverless machine learning architectures at Helixa
Serverless machine learning architectures at HelixaServerless machine learning architectures at Helixa
Serverless machine learning architectures at Helixa
 
MLOps with a Feature Store: Filling the Gap in ML Infrastructure
MLOps with a Feature Store: Filling the Gap in ML InfrastructureMLOps with a Feature Store: Filling the Gap in ML Infrastructure
MLOps with a Feature Store: Filling the Gap in ML Infrastructure
 
Reinforcement Learning Overview | Marco Del Pra
Reinforcement Learning Overview | Marco Del PraReinforcement Learning Overview | Marco Del Pra
Reinforcement Learning Overview | Marco Del Pra
 
Time Series Classification with Deep Learning | Marco Del Pra
Time Series Classification with Deep Learning | Marco Del PraTime Series Classification with Deep Learning | Marco Del Pra
Time Series Classification with Deep Learning | Marco Del Pra
 
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AI
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AILudwig: A code-free deep learning toolbox | Piero Molino, Uber AI
Ludwig: A code-free deep learning toolbox | Piero Molino, Uber AI
 
Audience projection of target consumers over multiple domains a ner and baye...
Audience projection of target consumers over multiple domains  a ner and baye...Audience projection of target consumers over multiple domains  a ner and baye...
Audience projection of target consumers over multiple domains a ner and baye...
 
Weak supervised learning - Kristina Khvatova
Weak supervised learning - Kristina KhvatovaWeak supervised learning - Kristina Khvatova
Weak supervised learning - Kristina Khvatova
 
GANs beyond nice pictures: real value of data generation, Alex Honchar
GANs beyond nice pictures: real value of data generation, Alex HoncharGANs beyond nice pictures: real value of data generation, Alex Honchar
GANs beyond nice pictures: real value of data generation, Alex Honchar
 
Continual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
Continual/Lifelong Learning with Deep Architectures, Vincenzo LomonacoContinual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
Continual/Lifelong Learning with Deep Architectures, Vincenzo Lomonaco
 
3D Point Cloud analysis using Deep Learning
3D Point Cloud analysis using Deep Learning3D Point Cloud analysis using Deep Learning
3D Point Cloud analysis using Deep Learning
 
Deep time-to-failure: predicting failures, churns and customer lifetime with ...
Deep time-to-failure: predicting failures, churns and customer lifetime with ...Deep time-to-failure: predicting failures, churns and customer lifetime with ...
Deep time-to-failure: predicting failures, churns and customer lifetime with ...
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
 
Pricing Optimization: Close-out, Online and Renewal strategies, Data Reply
Pricing Optimization: Close-out, Online and Renewal strategies, Data ReplyPricing Optimization: Close-out, Online and Renewal strategies, Data Reply
Pricing Optimization: Close-out, Online and Renewal strategies, Data Reply
 
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig..."How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
"How Pirelli uses Domino and Plotly for Smart Manufacturing" by Alberto Arrig...
 
A view of graph data usage by Cerved
A view of graph data usage by CervedA view of graph data usage by Cerved
A view of graph data usage by Cerved
 

Recently uploaded

一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 

Recently uploaded (20)

一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 

ML & Graph algorithms to prevent financial crime in digital payments

  • 1. This content is classified as Internal ML & Graph algorithms to prevent financial crime in digital payments Alberto Danese, Head of Data Science Paolo Testa, Lead Data Scientist
  • 2. This content is classified as Internal 2 Next generation payments Next to Customers
  • 3. This content is classified as Internal 3 End-to-end payment solutions for Financial Institutions, Merchants and Consumers
  • 4. This content is classified as Internal 4 CAPABILITIES MANAGING SERVING SCALE >10.500 people >3.000 Product & Tech Development Specialists ~€300mln Annual Total IT & Innovation Spending ~170mln Cards ~2.2mln Merchants #1 Merchant acquirer by number of merchants and transaction value #1 Card processor by number of cards and transaction volume >1k Top financial Institutions ~15 bn ACH trx >25 Countries HQ The Leading PayTech, European by scale, Local by nature
  • 5. This content is classified as Internal 5 Select * from Nexi where dept like ‘DATA%’ ~40 internal people (in the hub - Data Area) including 10 in Data Science Team 5+ spokes within the business lines Support Business Development Fight Financial Crime Evolve Tech and Develop Special Projects 90% projects on public cloud Product-oriented mindset with end-to-end ownership
  • 6. This content is classified as Internal 6 Work with us! Check on Linkedin jobs for Nexi Italy, Nexi Group and Nexi Digital Currently, you may be interested in: • Junior Data Scientist – Fraud Intelligence Specialist (Nexi Italy) • Data Engineer (Nexi Digital)
  • 7. This content is classified as Internal 7 ML & Graph algorithms to prevent financial crime in digital payments
  • 8. This content is classified as Internal 8 INFINITECH PROJECT ML & GRAPH APPLICATION FINANCIAL CRIME IN DIGITAL PAYMENTS Agenda - ML & Graph algorithms to prevent financial crime in digital payments 01 What are the main challenges related fo financial crime? What is Anti- money laundering (AML)? 02 How can ML and Graph help AML ot optimize and improove their daily activity? 03 What is the Infinitech Project and you can access to it?
  • 9. This content is classified as Internal 9 Financial crime challenges • Financial crime is one of the main challenges that banks, and financial institutions must face, leading to : • Financial penalties • Reputational Damage • Lose customer trust • While security measure are more and more advanced, fraudsters and organized crime keep on evolving as well • Two types of criminal activity: • Payments Fraud → the cardholder is victim of fraudulent organization. • Money Laundering → the cardholder is involved in criminal activity, using payments tools. In 2020 global banks were hit with $10.4bn in fines for money-laundering violations, an increase of more than 80% on 2019
  • 10. This content is classified as Internal 10 Anti-Money Laundering (AML) • Money Laundering happens when individuals attempt to hide profit gained from criminal means • Money can be originated by gambling, drug trafficking, and other illegal activities • Nexi AML aim is to put risk procedures to recognize and stop criminal activities using Nexi products (cards or POS). Money laundering in digital payments AML Transaction Monitoring workflow 1. Suspicious payments transaction Alert is generated 2. The AML investigators analyze the data related to the alert 3. The investigator evaluates whether to notify to central authority (Bank of Italy informative financial unit) the suspicious case
  • 11. This content is classified as Internal 11 Anti-Money Laundering Challenges “Human in the Loop” is a must We can’t fully automize and optimize the transaction monitoring, since evaluation of AML investigator is a requirement. But we can optimize the volume of alerts, that is, the suspicious transactions to analyze # of analysis of payments transactions time & cost effectiveness FP – FN trade off FP Risk of sanctions due to missed notification You can’t analyze each single transactions FN FP FN
  • 12. This content is classified as Internal 12 INFINITECH PROJECT ML & GRAPH APPLICATION FINANCIAL CRIME IN DIGITAL PAYMENTS Agenda - ML & Graph algorithms to prevent financial crime in digital payments 01 What are the main challenges related fo financial crime? What is Anti- money laundering (AML)? 02 How can ML and Graph help AML ot optimize and improove their daily activity? 03 What is the Infinitech Project and you can access to it?
  • 13. This content is classified as Internal 13 Level 0 – rule base approach Data Lake Amazon S3 SQL-based Anomaly Engine Amazon Athena Reporting Layer Microsoft PowerBI SELECT user_id FROM transactions WHERE metric_1 > THR1 and metric_2 > THR2 PROS Simplicity: each alert is triggered by an SQL Explainability : a SQL is rule shared with AML CONS Scale: high transact. volume, +300 rules, generating large amount of alerts, leading to high False Positive rate Group: relational dbs are not the best solutions for network modelling Highlights Architecture
  • 14. This content is classified as Internal 14 Level 01 - Supervised ML The first approach is to train a ML model to classify anomalous cases based on notification pattern (target) Thanks to this, we avoid to set manually +500 rules; we just metrics of those rule as features in the ML model. The output of the model will be probability score of a customer to be notified due to suspicious transactions AML investigators can focus only on tuning only 1 threshold (the prob. Score) and can be used as rank metric User id Feature 01 Feature 02 … Feature P Target 373429 12.000 € 23% 1 1 598492 1.000 € 10% 0 0 … … … .. .. .. 598492 160.000 € 37% 1 0 Level 01 Description
  • 15. This content is classified as Internal 15 Level 01 – Deep dive Data Lake Amazon S3 process AML Feature Store prepare train test score datasets Amazon SageMaker train Score & SHAP ML score Back-end Front-end report Pipeline Orchestration AWS Step Functions SERVERLESS & FULLY MANAGED STACK Amazon Glue Model Registry Experiment Registry 1 2 3 Serverless & Fully Managed ML architecture AML FS is part of Nexi FS. Great_expectations and TDD guarantees us data quality 4 Data Centric AI SageMaker transaparently store train jobs artifacts and experiemnts in dedicated registry
  • 16. This content is classified as Internal 16 Level 01 – Highlights ML score Shap values ordered features Top 10000 risk Notified
  • 17. This content is classified as Internal 17 Level 01 – Highlights • The output is a probability score; 1 threshold to fine tune the results • SHAP values guarantees explainability PROS CONS • The score is associated to a single independent user, NOT in a Network • The ML model learn only from notification of AML investigators.
  • 18. This content is classified as Internal 18 send money Level 02 – Graph rule based approach 0.8 0.3 Org. 0.4 user 01 user 02 user 05 user 03 send money . . . user N send money 0.93 0.2 user 06 0.3 • Network anomalies are hard to model and to check with relational database • Graph databases, like Neo4j, are the best choice when your analytical focus is link between peers, that is a network. • Thanks to graph data structure several anomaly detection rules can be built to fight groups of suspicious transactions or users. MATCH (u:User)-[:send_money*]->(v:User) WHERE u.score > 0.8 and v.score > 0.8 Level 02 Description
  • 19. This content is classified as Internal 19 Level 02 – Graph rule based approach Data Lake ingest AML Feature Store Amazon S3 Amazon Glue EC2 load Graph anomalies Back-end has account Front-end query process DATA MODEL 1 Neo4j CE on EC2 (not managed) 2 Neo4J Spark connector 3 MATCH (u:User)-[:send_money*]->(v:User) WHERE u.score > 0.8 and v.score > 0.8
  • 20. This content is classified as Internal 20 Level 02 – Graph rule based approach • Now network anomaly scenarios are now addressed • Graph model are easy to explain and straightforward in rule settings. PROS CONS • We lose the scale factor given by automation of ML model. It’s a manual rule based apporach made with Cypher queries, instead of SQL
  • 21. This content is classified as Internal 21 Level 03 – ML and Graph USER ML SCORE RANK user 03 0.93 1 user 01 0.8 2 user 05 0.4 3 user 02 0.3 4 user 04 0.2 5 ML anomaly only consider single users. If a user within a network with high risk, then we want to spread this information to this user. USER ML SCORE NEW RANK ML RANK user 03 0.93 1 1 user 01 0.8 2 2 user 02 0.3 3 (+1) 4 user 04 0.2 4 (+1) 5 user 05 0.4 5 (-2) 3 What we need is an algorithm that spread ML score information to within a given network topology to adjust score and find group of anomalous case. Level 03 Description
  • 22. This content is classified as Internal 22 Page Rank (PR) is an iterative algorithm originally used by Google to rank web pages (nodes) according to the quality and quantity of links (edges) pointing to the pages. Personalized Page Rank 𝑥′ = (1 − α) 𝑃′𝑥 + α ν 𝑥 = importance rank ν = intrinsic centrality P = adjacency matrix We use ML score as intrinsic centrality (v) to spread anomaly information within the network, with the aim to find groups of suspicious individuals. personalized PR page-rank
  • 23. This content is classified as Internal 23 Level 03 – Architecture & Contribution Data Lake AML Feature Store ML anoamly Score ingest PPR Back-end load Front-end Apply PPR 1 Level01 ML anomaly score is loaded into Graph db as node attribute 2 Customized PPR is applied as a Cypher function over the graph database 3 PowerBI report show PPR score
  • 24. This content is classified as Internal 24 Level 03 - Highlights • Scale factor is addressed, since PPR run is operationalized. • The PPR rank combines the best of Level 01 (ML) and Level 02 (graph algorithms) approaches • As for Level 02, graph and PPR is highly interpretable and explainable PPR RANK ML RANK ML SCORE 3 4859 0.93 3 neighbors
  • 25. This content is classified as Internal 25 Summary Level 0 – SQL rule based approach Level 1 – Supervised ML Level 2 – Graph rule based approach Level 3 – ML and Graph based approach INFINITECH INFINITECH
  • 26. This content is classified as Internal 26 INFINITECH PROJECT Flagship initiative in Digital Finance within ICT Horizon 2020 Programme Project deliverables: • Marketplace of AI/IoT/Blockchain/Cybersecurity technologies (algorithms, real-time analytics, blockchain based data sharing) • Testbeds and sandbox for fintech players to test and deploy their own solutions • Regulatory tools to helps company to facilitate compliance to regulations
  • 27. This content is classified as Internal 27 INFINITECH PILOTS Nexi Payments is one among 15 organizations, commercial banks, central banks, startup, insurance firms, who joined Infinitech project as pilot. Fintech/Insuretech application fields: • Financial crime • Cybersecurity • Personalized products Technologies: • #AI • #BigData • #IoT • #Blockchain
  • 28. This content is classified as Internal 28 INFINITECH OUTPUT https://pilot16.infinitech-h2020.eu/ https://gitlab.infinitech-h2020.eu/pilot16/ aml-graph-payments-anomaly-detection Two are outputs in the Infinitech Testbed/Sandbox: 1. PILOT DEMO WEB-APP Web app to show algorithms ( both anomaly detection and PPR) with third part or synthetic generated data 2. ANOMALY ENGINE w/ JUPYTER Git repository with docker containers to use pilot graph algorithms on third-part data in a Jupyter notebook environment
  • 29. This content is classified as Internal 29 1. PILOT DEMO WEB-APP https://pilot16.infinitech-h2020.eu/ Web app to show algorithms ( both anomaly detection and PPR) with third part or synthetic generated data
  • 30. This content is classified as Internal 30 2. ANOMALY ENGINE w/ JUPYYER Git repository with docker containers to use pilot graph algorithms on third-part data in a Jupyter notebook environment https://gitlab.infinitech-h2020.eu/pilot16/aml-graph-payments-anomaly-detection
  • 31. This content is classified as Internal 31 Pubblications and Contributions
  • 32. This content is classified as Internal 32 Wrap up and special thanks What did we learn along the way? • Rule based approaches are still present and widely adopted in 2023: that’s fine! But ML is a sound approach when dealing with hundreds of rules • Human in the loop is key: optimizing the work of an analyst may be even better than a fully automated approach (in some scenarios) • Network is a natural representation for some phenomena, like digital payments: a good data scientist should be able to find the best combination of ML & graph data science • EU projects are a great opportunity!
  • 33. This content is classified as Internal 33 Wrap up and special thanks It’s been a team-work with multiple people giving support in a way of another! Thank you to: • Fabio Dezi, Luca Latella and Luca Rinaldi – and the always supporting DST • Alfredo Fomitchenko and Vittorio Giatti • Laura Arditti, Alberto De Lazzari and the LARUS team • Infinitech organization and GFT SPECIAL THANK YOU TO… What did we learn along the way? • Rule based approaches are still present and widely adopted in 2023: that’s fine! But ML is a sound approach when dealing with hundreds of rules • Human in the loop is key: optimizing the work of an analyst may be even better than a fully automated approach (in some scenarios) • Network is a natural representation for some phenomena, like digital payments: a good data scientist should be able to find the best combination of ML & graph data science • EU projects are a great opportunity!
  • 34. This content is classified as Internal 34 ANY QUESTION?
  • 35. This content is classified as Internal