By Topic

Research on Suspicious Financial Transactions Recognition Based on Privacy-Preserving of Classification Algorithm

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chunhua Ju ; Coll. of Comput. Sci. & Inf. Eng., Zhejiang Gongshang Univ., Hangzhou ; Lili Zheng

Classification basing on Privacy-preserving is one of the hottest spots in the field of data mining in recent years. This paper studies how to identify suspicious financial transactions under the privacy-preserving of classification algorithm. The research is studied on multi-data that from several parts by using Scalar Product Protocol under the privacy-preserving. The experimental results show that this method is a effective way for financial institutions to improve the efficiency of identify Money-laundering transactions.

Published in:

Education Technology and Computer Science, 2009. ETCS '09. First International Workshop on  (Volume:2 )

Date of Conference:

7-8 March 2009