<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Finding NeMo: Fishing in banking networks using network motifs</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Xavier</forename><surname>Fontes</surname></persName>
							<email>xavier.fontes@feedzai.com</email>
						</author>
						<author>
							<persName><forename type="first">David</forename><surname>Aparício</surname></persName>
							<email>david.aparicio@feedzai.com</email>
						</author>
						<author>
							<persName><forename type="first">Maria</forename><forename type="middle">Inês</forename><surname>Silva</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Beatriz</forename><surname>Malveiro</surname></persName>
							<email>beatriz.malveiro@feedzai.com</email>
						</author>
						<author>
							<persName><forename type="first">João</forename><forename type="middle">Tiago</forename><surname>Ascensão</surname></persName>
							<email>joao.ascensao@feedzai.com</email>
						</author>
						<author>
							<persName><forename type="first">Pedro</forename><surname>Bizarro</surname></persName>
							<email>pedro.bizarro@feedzai.com</email>
						</author>
						<author>
							<affiliation key="aff0">
								<address>
									<settlement>Feedzai Porto</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<address>
									<settlement>Feedzai Porto</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<address>
									<settlement>Feedzai, Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<address>
									<settlement>Feedzai, Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<address>
									<settlement>Feedzai, Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff5">
								<address>
									<settlement>Feedzai, Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Finding NeMo: Fishing in banking networks using network motifs</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">74DFC10871F5812A0E554D39C16F2C4C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T08:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Banking fraud causes billion-dollar losses for banks worldwide. In fraud detection, graphs help understand complex transaction patterns and discovering new fraud schemes. This work explores graph patterns in a real-world transaction dataset by extracting and analyzing its network motifs. Since banking graphs are heterogeneous, we focus on heterogeneous network motifs. Additionally, we propose a novel network randomization process that generates valid banking graphs. From our exploratory analysis, we conclude that network motifs extract insightful and interpretable patterns.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">INTRODUCTION</head><p>Payment information theft renders online transactions susceptible to fraud. Once detected, fraud entails a reimbursement from the cardholder's bank, leading to monetary costs to financial institutions and customer friction.</p><p>Fraud detection thus requires a deep understanding of the underlying fraud patterns, and graphs offer an intuitive way to visualize these patterns. One can further leverage graph mining in transaction data to understand fraud schemes in a wide range of applications. Hajdu and Krész <ref type="bibr" target="#b0">[1]</ref> developed a methodology to identify cycles in transaction networks as a means to detect fraudulent expenses. Micale et al. <ref type="bibr" target="#b1">[2]</ref> retrieved the most frequent patterns in a relationship network of people involved in the Panama papers to identify the most relevant money laundering structures.</p><p>In this work, we build networks from a real-world banking dataset of card purchases and apply a widely used graph mining tool -heterogeneous network motifs <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b9">10]</ref>. Analyzing recurring patterns in real banking networks sets a foundation for understanding how fraud materializes in transaction data. From there, one can extract insights about how legitimate and fraudulent transactions "behave" and aid both fraud detection systems and fraud analysts.</p><p>To the best of our knowledge, this work is the first to find and explore heterogeneous network motifs in a real-world banking setting. Notably, we have two main contributions from this work:</p><p>• We propose a randomization process (i.e., a null model) adequate to banking datasets, a vital component for the definition of network motifs used to provide the baseline frequencies of each subgraph (detailed in Section 2.2.1). • We extract network motifs from graphs built from card transaction data and review them thoroughly. We include an analysis of how the motif significance evolves as more random networks are used (detailed in Section 3).</p><p>The remainder of this paper is organized as follows. Section 2 presents our method and discusses the key components necessary for our analysis. We describe the data and present results in Section 3. Usage scenarios are proposed in Section 4. We put forward our main takeaways and offer directions for future work in Section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">METHOD</head><p>In this section we present our methodological choices. First, we discuss how we build networks from banking datasets (Section 2.1). Then, we introduce heterogeneous network motifs and describe how to compute and identify these motifs in banking datasets, with a special focus on the null model and the measure of motif significance. (Section 2.2)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Graph representation</head><p>Banking datasets usually consist of transactions between entities, such as people, merchants, and businesses. They can include different types of transactions such as card payments or bank transfers.</p><p>From a banking dataset, we can build two graph representations, namely (a) entity graphs and (b) transaction graphs, as illustrated in Figure <ref type="figure" target="#fig_1">1</ref>.   Consider, for example, the entity graph in Figure <ref type="figure" target="#fig_1">1</ref> (a). There, we represent C1 and M1 as two connected nodes of different types, i.e., {𝐶1, 𝑀1} ∈ 𝑉 , (𝐶1, 𝑀1) ∈ 𝐸, and 𝜙 (𝐶1) ≠ 𝜙 (𝑀1), where 𝜙 (𝑢) is the type of node 𝑢. Since we connect all 𝑘 entities in a transaction, they form a 𝑘-node clique in the graph. When the same two entities are parties to multiple transactions (e.g., a person makes several purchases at a retail store), we aggregate the transaction information into a single edge (𝑢, 𝑣) ∈ 𝐸.</p><p>Therefore, an entity graph is undirected and heterogeneous. The node label 𝜙 (𝑢) corresponds to the entity's type (i.e., client, card, merchant, or terminal). The edge label 𝜇 (𝑢, 𝑣) is binary, indicating whether there is at least one fraudulent transaction involving the two entities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.2">Transaction graph.</head><p>In a transaction graph, 𝐺 = (𝑉 , 𝐸), nodes 𝑉 represent individual transactions, and edges 𝐸 connect transactions that share entities.</p><p>In the transaction graph from Figure <ref type="figure" target="#fig_1">1</ref> (b), transactions T1 and T2 are represented as two nodes connected by an edge indicating that the same client made both, i.e., {𝑇 1,𝑇 2} ∈ 𝑉 and (𝑇 1,𝑇 2) ∈ 𝐸. Since connecting all transactions with common entities would result in very dense graphs, we only connect transactions that occurred within a time window, e.g., transactions made by a client in less than 24 hours. Moreover, we use edge direction to encode the temporal sequence of transactions, with edges connecting older transactions to more recent ones, i.e., if (𝑢, 𝑣) ∈ 𝐸, then 𝑣 is more recent than 𝑢. If two transactions occur in the same timestamp, we add a bidirectional edge between the two nodes, i.e., {(𝑢, 𝑣), (𝑣, 𝑢)} ∈ 𝐸.</p><p>Thus, a transaction graph is directed and heterogeneous. The node label is binary (the transaction is fraudulent or legitimate), i.e., 𝜙 (𝑥) ∈ {𝑓 𝑟𝑎𝑢𝑑, 𝑙𝑒𝑔𝑖𝑡 }. The edge label is one of 2 𝑘 − 1 possible labels, all the combinations of sharing one or more of 𝑘 different entities, i..e, 𝜇 (𝑢, 𝑣) ∈ 𝑀, |𝑀 | = 2 𝑘 − 1. In Figure <ref type="figure" target="#fig_1">1</ref>, 𝑘 = 2, hence there are 3 possible labels for edges, 𝑀 = 3.</p><p>Transaction can be used to investigate patterns between transactions. Additionally, machine learning classification models can benefit from receiving topological information (including centrality measures or node embeddings) extracted from transaction graphs <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Heterogeneous network motifs</head><p>A network motif is a subgraph that appears more frequently than expected. The concept of appearing more frequently than expected commonly relies on building a large set of randomized networks R 𝐺 that are similar to the original network <ref type="bibr" target="#b3">[4]</ref>. In the literature, authors typically use either 100 or 1000 randomized networks <ref type="bibr" target="#b8">[9]</ref>.</p><p>Suppose the frequency of a given subgraph 𝑚 𝑖 in the original network is, according to some significance measure (Section 2.2.2), much higher than the (average) frequency on similar randomized networks, i.e., 𝑓 𝑟𝑒𝑞(𝑚 𝑖 , 𝐺) &gt;&gt; 𝑎𝑣𝑒𝑟𝑎𝑔𝑒_𝑓 𝑟𝑒𝑞(𝑚 𝑖 , R 𝐺 ). In that case, subgraph 𝑚 𝑖 is a network motif. Similarly, if the subgraph's frequency is much lower than the (average) frequency on similar randomized networks, that subgraph is an anti-motif. In this work, we are interested in both motifs and anti-motifs.</p><p>Motif discovery involves computing the frequency of a given set of subgraphs and entails subgraph counting <ref type="bibr" target="#b5">[6]</ref>. Subgraph counting receives as input a graph G and a list of non-isomorphic subgraph types (e.g., all possible unique subgraphs with four nodes). Then, it outputs the frequencies of each subgraph type in G, e.g., the frequencies of 4-node cliques, 4-node chains, or 4-node stars.</p><p>In this work, we use g-tries for subgraph counting since they are a general framework able to count subgraphs of arbitrary size in heterogenous graphs <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Other approaches are faster for counting  specific subgraphs, but, as far as we know, g-tries are the only method that support directed and heterogenous graphs <ref type="bibr" target="#b5">[6]</ref>.</p><p>Since our graphs are heterogeneous, we need network motifs that consider node and edge heterogeneity. Concretely, we need to extract heterogeneous motifs and anti-motifs.</p><p>As an illustrative example, consider a 3-node clique where nodes and edges are homogeneous (Figure <ref type="figure" target="#fig_4">2 (a)</ref>) and the following heterogeneous graph settings: (i) if nodes can be of two different types, there are four possible 3-node cliques (Figure <ref type="figure" target="#fig_4">2 (b)</ref>), (ii) if edges can be of two different types, there are four possible 3-node cliques (Figure <ref type="figure" target="#fig_4">2 (c)</ref>). Thus, in our work, disregarding node or edge labels undermines the necessary differentiation of topological structures. Heterogeneous motif discovery is more informative than traditional homogeneous motif discovery and more complex to extract and analyze.</p><p>In banking fraud analysis, heterogeneous network motifs are more helpful than homogeneous motifs. For instance, knowing that "clients connected to many different cards are more likely to be fraudulent" is arguably more informative than just knowing that "dense subgraphs can be indicative of fraud".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.1">Network randomization.</head><p>Computing the expected frequency of a given subgraph requires randomizing the original network so that randomized networks are similar to the original. However, defining network similarity is non-trivial and task-dependent. In practice, the following two approaches are common:</p><p>• Initialize the randomized graph as a copy of the original graph and iteratively swap random pairs of edges <ref type="bibr" target="#b8">[9]</ref>. This method preserves vertices' in-and out-degrees. • Initialize the randomized graph with the same nodes as the original graph and incrementally add edges with probabilities based on each nodes' degree in the original graph <ref type="bibr" target="#b3">[4]</ref>. This method provides an approximation of the vertices' inand out-degrees. However, these strategies are unsuitable to the banking fraud domain as they fundamentally change the semantic structure of banking graphs. For instance, in an entity graph, entities of the same type are never directly connected by an edge. However, adding or removing edges indiscriminately (while preserving each node's degree) will eventually lead to connecting nodes of the same type and thus compromise the validity of the randomized network. Since these strategies do not take node and edge labels into account, we need to follow a different approach for network randomization.</p><p>Instead of randomizing the original graph directly, we apply a randomization procedure directly on the tabular data and then build the randomized networks from the randomized tabular data. Thus, the randomization procedure works as follows:</p><p>(1) Shuffle all the fraud labels. This step maintains the fraud rate of the original dataset but randomizes its attribution to different transactions. This network randomization strategy guarantees semantically valid banking networks with a random topology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.2">Motif significance measures.</head><p>After doing subgraph counting on both the original network and the randomized networks, we use a motif significance measure to evaluate which subgraphs are overand under-represented. Several measures have been proposed <ref type="bibr" target="#b10">[11]</ref>, but here we focus on two of the most well-established: the z-score and the ratio.</p><p>The z-score of a subgraph, 𝑧 𝑖 , is computed as follows:</p><formula xml:id="formula_0">𝑧 𝑖 = 𝑓 𝑜 𝑖 − 𝜇 𝑅 𝑖 𝜎 𝑅 𝑖<label>(1)</label></formula><p>Where,</p><p>• 𝑓 𝑜 𝑖 is the frequency of subgraph 𝑖 in the original network. • 𝜇 𝑅 𝑖 and 𝜎 𝑅 𝑖 are the mean and standard deviation of the frequencies of subgraph 𝑖 in the randomized networks, respectively.</p><p>We compute the ratio of a subgraph, 𝑟 𝑖 , as follows:</p><formula xml:id="formula_1">𝑟 𝑖 = 𝑓 𝑜 𝑖 𝜇 𝑅 𝑖 (2)</formula><p>Our goal is to find the subgraphs with the highest z-scores/ratio (i.e., the motifs) and subgraphs with the lowest z-scores/ratio (i.e., the anti-motifs).</p><p>In our experiments (Section 3), we show the ratio of the subgraphs since it is more interpretable than the z-score: if 𝑟 𝑖 = 100, the subgraph appears 100 times more often in the original network than in the randomized networks. We complement our analysis by reporting 𝑓 𝑜 𝑖 , 𝜇 𝑅 𝑖 , and 𝜎 𝑅 𝑖 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">RESULTS</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Data overview</head><p>Table <ref type="table" target="#tab_1">1</ref> outlines the parameters used to generate the entity graph and the transaction graph and provides summary statistics on the two graphs.</p><p>In the entity graph, we consider four node types (i.e., client, merchant, terminal, and card) and two edge types (i.e., fraudulent or legitimate).</p><p>In the transaction graph, we consider two node types (i.e., fraudulent and legitimate) and three edge types (i.e., only client, only merchant, or both client and merchant). The rationale for choosing these two entities lies in the close relationship between clients and cards and, similarly, merchants and terminals. In other words, since most clients use few cards and most merchants have few terminals, we simplify the graph by dropping the card and terminal entities.</p><p>Additionally, we found it necessary to constrain the considered time window due to computational constraints on subgraph counting.</p><p>Both graphs have hundreds of thousands of edges and many different connected components. The fraud rate in the entity graph is the number of fraudulent edges, while, in the transaction graph, the fraud rate is the number of fraudulent nodes. As a result, the fraud rates differ depending on the graph type.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Motif analysis</head><p>In this subsection, we start with the entity graph results and then show the results of the transaction graph.</p><p>We analyze which subgraphs are motifs and anti-motifs based on the ratio (Equation <ref type="formula">2</ref>): we consider subgraphs that have a considerably higher ratio than the others to be motifs, and subgraphs with the lowest ratios to be anti-motifs.</p><p>We focus on subgraphs of size three due to the higher computational cost of larger subgraphs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1">Entity graph.</head><p>From Figure <ref type="figure" target="#fig_5">3</ref> we can see that, for most cases, the ratio of all subgraphs stabilizes relatively quickly at ≈ 40 random networks. We observe that a few subgraphs have significantly higher ratio than the others (𝑟 𝑖 &gt; 100). Moreover, a few subgraphs  have significantly lower ratio than the others (𝑟 𝑖 ≈ 0.01). We consider the first to be the motifs, and the last to be the anti-motifs, shown in Figure <ref type="figure" target="#fig_6">4</ref> (a) and Figure <ref type="figure" target="#fig_6">4</ref> (b), respectively.</p><p>From Figure <ref type="figure" target="#fig_6">4</ref> we notice that none of the subgraphs is a 3-node clique. This result might seem counter-intuitive as all transactions form a 4-node clique. A possible explanation is that some merchants are hub nodes and thus induce chain-like subgraphs. Another general observation is that all edges in the motifs are fraudulent, which is not true for the anti-motifs. Domain knowledge indicates that fraudulent transactions tend to be closely connected.</p><p>The first three motifs from Figure <ref type="figure" target="#fig_6">4</ref> (a) have a client at its center, connected to either (i) two terminals, (ii) one terminal and a merchant, or (iii) two merchants. Subgraphs (i) and (iii) tell us that the client made two fraudulent transactions at different merchants and terminals, respectively. These two subgraphs are motifs because fraud is sometimes recurring for fraudulent clients, and this information is lost in the randomized networks since they reshuffle fraud labels. Subgraph (ii) tells us a similar story but notice that, since the merchant and the terminal are not connected, the merchant and the terminal are from different transactions. The last three motifs are equivalent to the first three but with the card at the center of the subgraph. Since clients can use multiple cards, the original network counts are lower for subgraphs with the card at the center of the chain than the counts of the subgraphs with the client at the center of the chain. We also note that, in practice, it might be interesting to investigate all cards used by the client.</p><p>The first three anti-motifs from Figure <ref type="figure" target="#fig_6">4</ref> (b) have a merchant at its center. All three anti-motifs convey the same information: merchants typically either have only legitimate transactions or only fraud transactions, i.e., fraud tends to cluster around the same risky merchants. In the randomized networks, since we randomly swap edges, these relations are lost. Finally, the last anti-motif tells us that it is not common for clients to use multiple cards in legitimate transactions. Indeed, clients that use multiple cards are typically associated with fraudulent activity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2">Transaction graph.</head><p>Figure <ref type="figure" target="#fig_7">5</ref> shows the evolution of the ratio for each 3-node subgraph in the transaction graph. After 80 random networks, the ratios seem to stabilize, and we can clearly distinguish five subgraphs that stand out, namely, the top-4 subgraphs and the bottom-1 subgraph. These subgraphs are presented in Figure <ref type="figure" target="#fig_9">6</ref>.</p><p>The common feature in the four motifs is at least two transactions that share the same client and merchant. We may lose this pattern during the randomization since we swap merchants and clients independently. However, it is still interesting to observe a significant number of patterns where the same client makes two or three transactions in the same merchant in less than six hours. Three of the four top motifs are a 3-node clique, which happens when three transactions that share a merchant or client occur within the same six-hour window. Once again, the randomization of the entities breaks such patterns.</p><p>It is important to note that some motifs contain transactions processed in the same timestamp (represented with bi-directional edges). This pattern can happen in the same merchant when the merchant is processing transactions in a batch or has multiple terminals.</p><p>The only anti-motif is a sequence of three transactions in the same merchant, where the middle transaction is fraudulent, and the other two are legitimate. This pattern is less frequent in the original network than in the randomized networks since fraud transactions typically occur together in reality, and the randomized networks break this pattern.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">USAGE SCENARIOS</head><p>The motif analysis can be a tool to characterize banking datasets. Beyond summary statistics, the list of motifs and anti-motifs surfaces underlying fraud patterns.</p><p>Fraud experts, who may not be knowledgeable in data science or statistics, often use graph visualization for data exploration. Motif analysis serves as a visual summary characterization of a dataset for fraud detection.</p><p>As an illustrative example, let us consider a fraud expert at a bank. Their role entails designing new rules to prevent fraud and reviewing unlabelled transactions. The expert can review the characteristic patterns surfaced by motif analysis to tailor the fraud detection system in place. Over time, fraudsters design new schemes to evade detection. Periodic analysis of motifs surfaces upcoming fraud schemes and overall behavioral trends.   When reviewing an unlabelled transaction, the expert can compare the respective subgraph with known motifs. This context can give insight into which pattern, fraudulent or legitimate, might occur.</p><p>On the other hand, by extracting the most relevant transaction patterns and uncovering new fraud schemes, motif analysis can complement common fraud detection systems. These insights can be used to improve both machine learning models and rule-based systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">CONCLUSIONS</head><p>We explore motifs and anti-motifs in the context of banking fraud using two graph representations, namely entity graphs and transaction graphs. We propose a novel randomization method that operates directly on tabular data. This way, we overcome the limitations of current network randomization methods in the context of banking fraud.</p><p>Moreover, we extract heterogeneous network motifs that convey more information than traditional network motifs and find they offer interpretable results. Insights extracted from motif analysis can be used to aid fraud analyst investigate specific cases and improve fraud detection systems by uncovering new fraud schemes.</p><p>As future work, one can investigate whether different banking datasets have similar motifs (and anti-motifs) and if those patterns are different in merchant datasets. This research would follow the findings by Milo et al. <ref type="bibr" target="#b2">[3]</ref> where they report that networks with similar contexts have similar subgraph patterns. One can also extend the analysis to larger motif sizes, different temporal windows, and the inclusion of transaction amounts or fraud labels as graph properties.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>2. 1 . 1</head><label>11</label><figDesc>Entity graph. In an entity graph, 𝐺 = (𝑉 , 𝐸), nodes 𝑉 represent entities, such as merchants or clients, and edges 𝐸 connect entities with at least one shared transaction. This way of representing banking datasets is helpful to highlight suspicious entity behavior.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Example of (a) an entity graph and (b) a transaction graph.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Different 3-node cliques. In our case, we use both heterogeneous nodes and edges.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>( 2 )</head><label>2</label><figDesc>Iterate over each entity type and, for each entity type, we randomly chose 𝜌 * 𝑚 pairs of values to be swapped. Here, 𝜌 ∈ [0, 1] controls how much we want to randomize the original network, and 𝑚 is the number of transactions.(3) Build the resulting graph from the randomized data, as described in Sections 2.1.1 and 2.1.2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Entity graph's ratio evolution, highlighting the top-6 motifs in dark blue and the top-4 anti-motifs in light blue.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Entity graph motifs and anti-motifs. For each subgraph 𝑖, we show its ratio 𝑟 𝑖 (first line) and 𝑓 𝑜 𝑖 / 𝜇 𝑅 𝑖 ±𝜎 𝑅 𝑖 (second line).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Transaction graph's ratio evolution, highlighting the top-4 motifs in dark blue and the top-1 anti-motif in light blue.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Transaction graph motifs and anti-motifs. For each subgraph 𝑖, we show its ratio 𝑟 𝑖 (fist line) and 𝑓 𝑜 𝑖 / 𝜇 𝑅 𝑖 ± 𝜎 𝑅 𝑖</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 :</head><label>1</label><figDesc>Parameters used for graph generation and general statistics (NA means Not Applicable).</figDesc><table><row><cell></cell><cell>entity graph</cell><cell>transaction graph</cell></row><row><cell>period</cell><cell>2 days, 5 hours</cell><cell>1 day, 21 hours</cell></row><row><cell>lookback period</cell><cell>NA</cell><cell>6 hours</cell></row><row><cell>random networks</cell><cell></cell><cell>100</cell></row><row><cell>𝜌</cell><cell></cell><cell>0.8</cell></row><row><cell>nodes</cell><cell>51,428</cell><cell>20,209</cell></row><row><cell>edges</cell><cell>104,833</cell><cell>214,054</cell></row><row><cell>node types</cell><cell>4</cell><cell>2</cell></row><row><cell>edge types</cell><cell>2</cell><cell>3</cell></row><row><cell>conn. components</cell><cell>5,796</cell><cell>9,877</cell></row><row><cell>fraud rate</cell><cell>1:1000</cell><cell>1:500</cell></row></table></figure>
		</body>
		<back>

			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Finding NeMo: Fishing in banking networks using network motifs. In the 2nd Workshop on Search, Exploration, and Analysis in Heterogeneous Datastores (SEA Data 2021).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Temporal network analytics for fraud detection in the banking sector</title>
		<author>
			<persName><forename type="first">László</forename><surname>Hajdu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Miklós</forename><surname>Krész</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ADBIS, TPDL and EDA 2020 Common Workshops</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="145" to="157" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Fast methods for finding significant motifs on labelled multirelational networks</title>
		<author>
			<persName><forename type="first">Giovanni</forename><surname>Micale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alfredo</forename><surname>Pulvirenti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alfredo</forename><surname>Ferro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rosalba</forename><surname>Giugno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dennis</forename><surname>Shasha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Complex Networks</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="817" to="837" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Superfamilies of evolved and designed networks</title>
		<author>
			<persName><forename type="first">Ron</forename><surname>Milo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shalev</forename><surname>Itzkovitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nadav</forename><surname>Kashtan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Reuven</forename><surname>Levitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shai</forename><surname>Shen-Orr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Inbal</forename><surname>Ayzenshtat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michal</forename><surname>Sheffer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Uri</forename><surname>Alon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">303</biblScope>
			<biblScope unit="page" from="1538" to="1542" />
			<date type="published" when="2004">2004. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Network Motifs: Simple Building Blocks of Complex Networks</title>
		<author>
			<persName><forename type="first">Ron</forename><surname>Milo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shai</forename><surname>Shen-Orr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shalev</forename><surname>Itzkovitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dmitri</forename><surname>Kashtan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Uri</forename><surname>Chklovskii</surname></persName>
		</author>
		<author>
			<persName><surname>Alon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">298</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="824" to="827" />
			<date type="published" when="2002">2002. 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">Catarina</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">João</forename><surname>Torres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><forename type="middle">Inês</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Aparício</surname></persName>
		</author>
		<author>
			<persName><forename type="first">João</forename><surname>Tiago Ascensão</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Bizarro</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2102.05373[cs.LG</idno>
		<title level="m">GuiltyWalker: Distance to illicit nodes in the Bitcoin network</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">A survey on subgraph counting: concepts, algorithms and applications to network motifs and graphlets</title>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Paredes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Miguel</forename><forename type="middle">Ep</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Aparicio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Silva</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1910.13011</idno>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Discovering colored network motifs</title>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Silva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Complex Networks V. Springer</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="107" to="118" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">G-Tries: a data structure for storing and finding subgraphs</title>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Silva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Mining and Knowledge Discovery</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="337" to="377" />
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Strategies for network motifs discovery</title>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcus</forename><surname>Kaiser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth IEEE International Conference on e-Science. IEEE</title>
				<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="80" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Heterogeneous network motifs</title>
		<author>
			<persName><forename type="first">Ryan</forename><forename type="middle">A</forename><surname>Rossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nesreen</forename><forename type="middle">K</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Aldo</forename><surname>Carranza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Arbour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anup</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sungchul</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eunyee</forename><surname>Koh</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1901.10026</idno>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Survey of Measures for Network Motifs</title>
		<author>
			<persName><forename type="first">F</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="106576" to="106587" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
