{"id":895,"date":"2020-09-28T10:42:44","date_gmt":"2020-09-28T08:42:44","guid":{"rendered":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/"},"modified":"2020-09-28T10:42:44","modified_gmt":"2020-09-28T08:42:44","slug":"phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/","title":{"rendered":"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p>Please click on this <a href=\"https:\/\/unilu.webex.com\/unilu\/onstage\/g.php?MTID=e7144feb867f6a516063769d80d767742\" target=\"_self\" title=\"\" rel=\"noopener\">link<\/a> to both register and connect on the day of the event.\u00a0<\/p><p><\/p><p><strong>Members of the defense committee<\/strong>:<\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">A-Prof. Dr Rapha\u00ebl Frank, University of Luxembourg, Chairman<\/li><li class=\"ulux-list-item\">A-Prof. Dr Djamila Aouada, University of Luxembourg, Deputy Chairman<\/li><li class=\"ulux-list-item\">A-Prof. Dr Radu State, University of Luxembourg, Supervisor<\/li><li class=\"ulux-list-item\">Prof. Dr Diego Fernandez Slezak, University of Buenos Aires, Argentina, Member<\/li><li class=\"ulux-list-item\">Dr Christian Hammerschmidt, Delft University of Technology, Netherlands, Member<\/li><\/ul><p>Financial services must monitor their transactions in order to prevent being used for money laundering and to combat the financing of terrorism.<\/p><p>Originally, organizations in charge of fraud regulation were only concerned about financial institutions such as banks, but nowadays the Fintech industry, online businesses, or platforms involving virtual assets can also be affected by similar criminal schemes.<\/p><p>Regardless of the differences between the aforementioned entities, malicious activities affecting them share many common patterns.<\/p><p>The goal of this dissertation is first, to compile and compare existing studies involving machine learning solutions for the detection and analysis of suspicious transactions; second, to synthesize methodologies from the previous goal for tackling different use cases in an organized manner; and third, to assess the applicability of deep generative models for enhancing existing solutions.<\/p><p>In the first part of the thesis, we propose an unsupervised methodology for the detection of suspicious transactions applied to two case studies: one related to transactions from a money remittance network, and the other related to a novel payment network based on distributed ledger technologies.<\/p><p>Anomaly detection algorithms are applied to rank user accounts based on recency, frequency and monetary features.\u00a0The results are manually validated by domain experts, confirming known scenarios and finding unexpected new cases.<\/p><p>In the second part, an analogous analysis is carried out employing supervised methods, along with a case study where Ethereum smart contracts are classified into honeypots and non-honeypots.<\/p><p>Features are taken from the source code, the transaction data, and characterization of the flow of funds.\u00a0The proposed classification models proved to generalize well to unseen honeypot instances and techniques and allowed us to characterize previously unknown techniques.<\/p><p>In the third part, we analyze the challenges that tabular data brings into the domain of deep generative models, a special type of data used to represent financial transactions in the previous two parts.\u00a0Furthermore, we propose a new model architecture by adapting state-of-the-art methods to output multiple variables from distributions of mixed types.\u00a0Additionally, we extend the evaluation metrics used in the literature to the multi-output setting and we show empirically that our approach outperforms the existing methods.<\/p><p>Finally, in the last part, we extend the work from the third part by applying the presented models to enhance classifications tasks from the second part, which commonly contain a severe class imbalance.\u00a0The multi-input architecture is introduced to expand models alongside with our previously proposed multi-output architecture.\u00a0We compare three techniques to sample from deep generative models defining a clear and fair large-scale experimental protocol and include interesting tools for visual analysis.<\/p><p>\u00a0We showed that general machine learning detection and visualization techniques can be very helpful to address the many challenges of the fraud detection domain.\u00a0In particular, deep generative models can add value to the classification task given the imbalance nature of the fraudulent class, in exchange for implementation and time complexity.\u00a0Future and promising applications for deep generative models include missing data imputation and sharing synthetic data or data generators preserving privacy constraints.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Please click on this link to both register and connect on the day of the event.\u00a0<\/p>\n","protected":false},"author":0,"featured_media":896,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2020-10-08 14:00:00","event_end_date":"2020-10-08 15:00:00","event_speaker_name":"Ramiro Daniel Camino","event_speaker_link":"","event_is_online":false,"event_location":"","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis - SnT - Universit\u00e9 du Luxembourg I Uni.lu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis\" \/>\n<meta property=\"og:description\" content=\"Please click on this link to both register and connect on the day of the event.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/\",\"name\":\"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis - SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg\",\"datePublished\":\"2020-09-28T08:42:44+00:00\",\"dateModified\":\"2020-09-28T08:42:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis - SnT - Universit\u00e9 du Luxembourg I Uni.lu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis","og_description":"Please click on this link to both register and connect on the day of the event.\u00a0","og_url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/","og_site_name":"SnT FR","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/","url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/","name":"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis - SnT - Universit\u00e9 du Luxembourg I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg","datePublished":"2020-09-28T08:42:44+00:00","dateModified":"2020-09-28T08:42:44+00:00","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2020\/09\/phd_defense_machine_learning_techniques_for_suspicious_transaction_detection_and_analysis.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-machine-learning-techniques-for-suspicious-transaction-detection-and-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/snt-fr\/events\/"},{"@type":"ListItem","position":4,"name":"PhD Defense: Machine Learning Techniques for Suspicious Transaction Detection and Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/895"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/comments?post=895"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/896"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=895"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-topic?post=895"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-type?post=895"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}