Skip to main content

Artificial intelligence for anti-money laundering: a review and extension


This paper surveys the existing academic literature on artificial intelligence (AI) technologies for anti-money laundering (AML). We review the state-of-the-art AI methods for AML and extend the discussion by proposing a framework that utilizes advanced natural language processing and deep-learning techniques to facilitate next-generation AML technologies. Our framework utilizes unstructured external information to assist domain experts, aiming to decrease the workload for the human investigator. We bridge the gap between the current AML methods and state-of-the art AI, highlighting new trends and directions in AI that can be used to develop the AML pipeline into a robust, scalable solution with a reduced false positive rate and high adaptability.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2



  2. We use and it achieves 75.56% in terms of accuracy.


  4. Prediction of five-point scale polarity of a tweet.


  • Barnett, M. L. (2014). Why stakeholders ignore firm misconduct: a cognitive view. Journal of Management, 40(3), 676–702.

    Google Scholar 

  • Bavelas, A. (1950). Communication patterns in task-oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–730.

    Google Scholar 

  • Bernile, G., & Gregg, A. J. (2009). The impact of the options backdating scandal on shareholders. Journal of Accounting and Economics, 47(1–2), 2–26.

    Google Scholar 

  • Chintalapati, S. S., & Jyotsna, G. (2013). Application of data mining techniques for financial accounting fraud detection scheme. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 717–724.

    Google Scholar 

  • Chiu, J. P. C., & Nichols, E. (2016). Named entity recognition with bidirectional LSTM-CNNs. Transactions of the Association for Computational Linguistics, 4, 357–370.

    Google Scholar 

  • Colladon, A. F., & Remondi, E. (2017a). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49–58.

    Article  Google Scholar 

  • Colladon, A. F., & Remondi, E. (2017b). Using social network analysis to prevent money laundering. International Journal of Expert Systems with Applications, 67, 49–58.

    Google Scholar 

  • Deriu, J., Gonzenbach M, Uzdilli F, Lucchi A, De Luca V, and Jaggi M. 2016. Swisscheese at Semeval-2016 task 4: sentiment classification using an ensemble of convolutional neural networks with distant supervision. In Proceedings of the 10th International Workshop on Semantic Evaluation, 1124–8. EPFL-CONF-229234.

  • Drezewski, R., Sepielak, J., & Filipkowski, W. (2015). The application of social network analysis algorithms in a system supporting money laundering detection. Information Scienece, 295, 18–32.

    Google Scholar 

  • Ehsan, U., Harrison, B., Chan, L. & Riedl, M.O. (2018). Rationalization: a neural machine translation approach to generating natural language explanations. Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society (AIES’18), New Orleans, LA, USA, 2–3 February 2018, 81–87.

  • Gallo, P. A., & Juckes, C. C. (2005). Threshold transaction disclosures: access on demand through latent disclosure rather than reporting. Journal of Money Laundering Control, 8, 328–334.

    Google Scholar 

  • Gao, S., & Xu, D. (2007). Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Systems with Applications, 36, 1493–1504.

    Google Scholar 

  • Gao, Z., & Ye, M. (2007). A framework for data mining-based anti-money laundering research. Journal of Money Laundering Control, 10(2), 170–179.

    Google Scholar 

  • Gao, S., & Xu, D. (2010). Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains. Proceedings of the 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 2010, 1–10.

  • Gao, S., Xu, D., Wang, H., & Wang, Y. (2006). Intelligent Anti-money Laundering System. Proceedings of the IEEE International Conference on Service Operations and Logistics and Informatics, Shanghai, Peoples Republic of China, 21–23 June 2006, 851–856.

  • Goldberg, H.G., & Wong, R.W.H. (1998). Restructuring transactional data for link analysis in the FinCEN AI System. AAAI Technical Report, FS-98-01, 38–46.

    Google Scholar 

  • Gombiro, C., & Jantjies, M. (2015). A conceptual framework for detecting financial crime in mobile money transactions. Journal of Governance and Regulation, 4(4, continued 6),727–734.

    Google Scholar 

  • Goodman, B., & Flaxman, S. (2016). European union regulations on algorithmic decision-making and a ‘right to explanation. arXiv:1606.08813

  • Griffin, J.M, & Shams, A. (2018). Is Bitcoin Really Un-Tethered? Working paper. Available at SSRN:

  • Gunning, D. (2017). Explainable artificial intelligence (Xai), DARPA/I2O. Retrieved from

  • Han, J., Barman, U., Hayes, J., Du, J., Burgin, E., Wan, D. (2018). NextGen AML: distributed deep learning based language technologies to augment anti money laundering investigation. Proceedings of the ACL 2018, System Demonstrations, Melbourne, Australia, July 2018, 37–42.

  • Hand, D.J., & Weston, D.J. (2008). Statistical techniques for fraud detection, prevention, and assessment. In F. Fogelman-Soulie, D. Perrotta, J. Piskorski, & R. Steinberger (Eds.) Mining massive data sets for security (pp. 257–270), Amsterdam: IOS Press.

    Google Scholar 

  • Hanneman, R.A, & Riddle, M. (2005). Introduction to social network methods.  Riverside, CA:  University of California, Riverside.

    Google Scholar 

  • Helmy, T. H. E., Abd-ElMegied, M. Z., Sobh, T. S., & Badran, K. M. S. (2014). Design of a monitor for detecting money laundering and terrorist financing. International Journal of Computer Networks and Applications, 1(1), 15–25.

    Google Scholar 

  • Hendrickx, I., Kim, S.N., Kozareva, Z., Nakov, P., Séaghdha, D.O., Padó, S., Pennacchiotti, M., Romano, L., & Szpakowicz, S. (2010). Semeval-2010 Task 8: multi-way classification of semantic relations between pairs of nominals. Proceedings of the 5th International Workshop on Semantic Evaluation, ACL 2010, Uppsala, Sweden, 15–16 July 2010, 33–38.

  • Huff, R. M. (2014). Money laundering. The Encyclopedia of Criminology and Criminal Justice. New York: Wiley.

    Google Scholar 

  • Irish Examiner. (2016). Retrieved from

  • Johnson, W. C., Xie, W., & Yi, S. (2014). Corporate fraud and the value of reputations in the product market. Journal of Corporate Finance, 25, 16–39.

    Google Scholar 

  • Jorisch, A. (2009). Tainted Money: Are We Losing the War on Money Laundering and Terrorism Financing? Arlington: Red Cell Intelligence Group.

    Google Scholar 

  • Kamarinou, D., Millard, C., Singh, J. (2016). Machine learning with personal data: Profiling, decisions and the EU General Data Protection Regulation. Working paper. Available at

  • Kannan, S., & Somasundaram, K. (2017). Autoregressive-based outlier algorithm to detect money laundering activities. Journal of Money Laundering Control, 20(2), 190–202.

    Google Scholar 

  • Karpoff, J. M., Lee, D. S., & Martin, G. S. (2008). The cost to firms of cooking the books. Journal of Financial and Quantitative Analysis, 43(3), 581–611.

    Google Scholar 

  • Khan, N., & Haider, S. (2013). A Bayesian approach for suspicious financial activity reporting. International Journal of Computers and Applications, 35, 181–187.

    Google Scholar 

  • Kim, Y. (2014). Convolutional neural networks for sentence classification. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, 25–29 October 2014, 1746–1751.

  • Kingdon, J. (2004). AI fights money laundering. IEEE Intelligent Systems, 19, 87–89.

    Google Scholar 

  • Kolhatkar, J.S., Fatnani, S.S., Yao, Y., & Matsumoto, K. (2014). Multi-channel data driven, real-time anti-money laundering system for electronic payment cards. U.S. Patent No. US 8,751,399 B2. Available at:

  • Kumar, D., Wong, A., & Taylor, G.W. (2017). Explaining the unexplained: a class-enhanced attentive response (CLEAR) approach to understanding deep neural networks.

  • Kuner, C., Svantesson, D. J. B., Cate, F. H., Lynskey, O., & Millard, C. (2017). Machine learning with personal data: is data protection law smart enough to meet the challenge? International Data Privacy Law, 7(1), 1–2.

    Google Scholar 

  • Lai, K. (2018). Blockchain as AML tool: a work in progress. International Financial Law Review.

  • Lample, G., Ballesteros, M., Subramanian, S., Kawakami, K., & Dyer, C. (2016). Neural architectures for named entity recognition.

  • Larik, A. S., & Haider, S. (2010). Clustering based anomalous transaction reporting. Procedia Computer Science, 3, 606–610.

    Google Scholar 

  • Le-Khac, N.-A., Kechadi, T. (2010). Application of data mining for anti-money laundering detection: A case study. Proceedings of 2010 IEEE International Conference on Data Mining Workshops, Sydney, Australia, December 2010, 577–584.

  • Le-Khac, N.-A., Markos, S., Kechadi, M.-T. (2009). Towards a new data mining-based approach for anti-money laundering in an international investment bank. In International Conference on Digital Forensics and Cyber Crime.

  • LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436.

    Google Scholar 

  • Lin, Y., Shen, S., Liu, Z., Luan, H., Sun, M. (2016). Neural relation extraction with selective attention over instances. Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Berlin, Germany, August 2016, 2125–2133.

  • Liu, X., Zhang, P., & Zeng, D. (2008). Sequence matching for suspicious activity detection in anti-money laundering. In Intelligence and Security Informatics Workshops.

  • Lopez-Rojas, E.A., & Axelsson, S. (2012a). Money laundering detection using synthetic data. Proceedings of the 27th Annual Workshop of the Swedish Artificial Intelligence Society (SAIS), Örebro, Sweden, 14–15 May 2012, 33–40.

  • Lopez-Rojas, E.A., & Axelsson, S. (2012b). Multi agent based simulation (MABS) of financial transactions for anti money laundering (AML). Proceedings of the 17th Nordic Conference on Secure IT System, Karlskrona, Sweden, October 31 – November 2, 2012, 25–32.

  • Lucia, D.P., Donato, M. (2009). The risk-based approach in the new european anti-money laundering legislation: a law and economics view. Review of Law & Economics, 5(2), 931–52.

  • Luo, G., Huang, X., Lin, C.Y., & Nie, Z. (2015). Joint entity recognition and disambiguation. Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), Lisbon, Portugal, September 2015, 879–888.

  • Lv, L.-T., Ji, N., & Zhang, J.L. (2008). A RBF neural network model for anti-money laundering.  Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, China, 30–31 August 2008, 209–215.

  • Martin, B. (2017, January 31). Deutsche Bank Hit with £500m Money Laundering Fines. The Telegraph. Retrieved from

  • Mei, D., Ye, Y., & Gao, Z. (2014). Literature review of international anti-money laundering research: a scientometrical perspective. Open Journal of Social Sciences, 2, 111–120.

    Google Scholar 

  • Moustafa, T. H., El-Megeid, M. Z. A., Sobh, T. S., & Shafea, K. M. (2015). Anti money laundering using a two-phase system. Journal of Money Laundering Control, 18(3), 304–329.

    Google Scholar 

  • Murphy, D. L., Shrieves, R. E., & Tibbs, S. L. (2009). Understanding the penalties associated with corporate misconduct: an empirical examination of earnings and risk. Journal of Financial and Quantitative Analysis, 44(1), 55–83.

    Google Scholar 

  • Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The applications of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decision Support Systems, 50, 559–569.

    Google Scholar 

  • Owen, S., Anil, R., Dunning, T., & Friedman, E. (2011). Mahout in Action. Greenwich: Manning Publications Co.

    Google Scholar 

  • Pang, B., & Lee, L. (2008). Opinion mining and sentiment analysis. Foundations and Trends® in Information Retrieval, 2(1–2), 1–135.

    Google Scholar 

  • Parkman, T. (2012). Mastering Anti-Money Laundering and Counter-Terrorist Financing: A Compliance Guide for Practitioners. Harlow, England: Pearson.

    Google Scholar 

  • Paula, E.L, Ladeira, M., Carvalho, R.N., & Marzagão, T. (2016). Deep learning anomaly detection as support fraud investigation in Brazilian exports and anti-money laundering. Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA, 18–20 Dec. 2016, 954–960.

  • Pramanik, M. I., Lau, R. Y. K., Yue, W. T., Ye, Y., & Li, C. (2017). Big data analytics for security and criminal investigations”. WIREs Data Mining Knowledge Discovery, 7, e1208.

    Google Scholar 

  • Rajput, Q., Khan, N. S., Larik, A., & Haider, S. (2014). Ontology based expert-system for suspicious transactions detection”. Computer and Information Science, 7, 103.

    Google Scholar 

  • Raza, S., & Haider, S. (2010). Suspicious activity reporting using dynamic bayesian networks. Procedia Computer Science, 3, 987–991.

    Google Scholar 

  • Rohit, K. D., & Patel, D. B. (2015). Review on detection of suspicious transaction in anti-money laundering using data mining framework. Journal for Innovative Research in Science and Technology, 1, 129–133.

    Google Scholar 

  • Senator, T. E., Goldberg, H. G., Wooton, J., Cottini, M. A., Khan, A. F. U., Klinger, C. D., et al. (1995). The financial crimes enforcement network Ai System (Fais) identifying potential money laundering from reports of large cash transactions. AI Magazine, 16, 21.

    Google Scholar 

  • Sharma, A., & Panigrahi, P. K. (2012). A review of financial accounting fraud detection based on data mining techniques. International Journal of Computer Applications, 39(1), 37–47.

    Google Scholar 

  • Sudjianto, A., Nair, S., Yuan, M., Zhang, A., Kern, D., & Cela-Diaz, F. (2010). Statistical methods for fighting financial crimes”. Technometrics, 52, 5–19.

    Google Scholar 

  • Tang, D., Wei, F., Yang, N., Zhou, M., Liu, T., Qin, B. (2014). Learning sentiment-specific word embedding for twitter sentiment classification. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, Baltimore, Maryland, USA, June 23–25 2014, 1555–1565.

  • Tang, J., & Yin, J. (2005). Developing an intelligent data discriminating system of anti-money laundering based on SVM. Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 Aug. 2005, 3453–3457.

  • Thompson, M., & Perez, E. (2017, July 1). BNP Paribas to Pay Nearly $9 Billion Penalty. CNN Business. Retrieved from

  • Titcomb, J. (2014, Aug 9). Standard chartered pays $300m over money laundering failures. The Telegraph. Retrieved from

  • Unger, B., & Van Waarden, F. (2009). How to dodge drowning in data? Rule- and risk-based anti money laundering policies compared. Review of Law and Economics, 52, 953–985.

    Google Scholar 

  • Viswanatha, A., & Wolf, B. (201). HSBC to pay $1.9 Billion U.S. Fine in Money-Laundering Case. Reuters. Retrieved from

  • Wang, S.-N., & Yang, J.-G. (2007). A money laundering risk evaluation method based on decision tree. Proceedings of 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, China, 19-22 August 2007, 283–286.

  • Weber, M., Chen, J., Suzumura, T., Pareja, A., Ma, T., Kanezashi, H., Kaler, T., Leiserson, C.E., & Schardl, T.B. (2018). Scalable graph learning for anti-money laundering: a first look. arXiv:1812.00076.

  • White, T. (2009). Hadoop: The Definitive Guide (1st ed.). Newton: O’Reilly Media Inc.

    Google Scholar 

  • Yu, T., Sengul, M., & Lester, R. H. (2008). Misery loves company: the spread of negative impacts resulting from an organizational crisis. Academy of Management Review, 33(2), 452–472.

    Google Scholar 

  • Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I. (2010). Spark: cluster computing with working sets. Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts, USA, June 2010, 1–7.

  • Zengan, G. (2009). Application of cluster-based local outlier factor algorithm in anti-money laundering. Proceedings of 2009 International Conference on Management and Service Science, Wuhan, China, 20–22 September 2009, 1–4.

  • Zhang, Z., Yu, P.S., & Salerno, J.J. (2003). Applying data mining in investigating money laundering crimes. Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24–27, 2003, 747–752.

Download references


This work was partially supported by Enterprise Ireland (grant number IP20170626). We would like to thank Accenture Applied Intelligence, Fraud and Risk Analytics and Technology Labs teams for inspiring conversations and support.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Sha Liu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Han, J., Huang, Y., Liu, S. et al. Artificial intelligence for anti-money laundering: a review and extension. Digit Finance 2, 211–239 (2020).

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Anti-money-laundering
  • Artificial intelligence
  • Natural language processing
  • Deep learning

JEl Classification

  • G21
  • G23
  • C44
  • C45