Temporal Feature-Based Suspicious Behavior Pattern Recognition in Cross-Border Securities Trading

Main Article Content

Dongchen Yuan
Sisi Meng

Abstract

Cross-border securities trading has experienced unprecedented growth, accompanied by increasingly sophisticated financial crime patterns that pose significant challenges to traditional detection systems. This paper presents a novel temporal feature-based approach for identifying suspicious behavior patterns in international securities markets. The proposed methodology integrates advanced time-series analysis with machine learning algorithms to extract meaningful temporal characteristics from multi-jurisdictional trading data. Our framework addresses the limitations of existing rule-based anti-money laundering systems by incorporating cultural and regional trading pattern variations. The experimental validation demonstrates superior performance compared to conventional approaches, achieving 94.7% accuracy in detecting suspicious cross-border trading behaviors while reducing false positive rates by 68%. The research contributes to enhanced financial market surveillance capabilities and provides regulatory authorities with more effective tools for combating international financial crime. Our temporal feature extraction methodology successfully identifies previously undetectable patterns in cross-border trading sequences, offering significant improvements in both detection precision and computational efficiency for real-world deployment scenarios.

Article Details

Section

Articles

How to Cite

Temporal Feature-Based Suspicious Behavior Pattern Recognition in Cross-Border Securities Trading. (2025). Journal of Sustainability, Policy, and Practice, 1(2), 1-18. http://schoalrx.com/index.php/jspp/article/view/8

References

1. P. Xia, Z. Ni, H. Xiao, X. Zhu, and P. Peng, "A novel spatiotemporal prediction approach based on graph convolution neural networks and long short-term memory for money laundering fraud," Arab. J. Sci. Eng., vol. 47, no. 2, pp. 1921-1937, 2022, doi: 10.1007/s13369-021-06116-2.

2. G. Rao, Z. Wang, and J. Liang, "Reinforcement Learning for Pattern Recognition in Cross-Border Financial Transaction Anomalies: A Behavioral Economics Approach to AML," Appl. Comput. Eng., vol. 142, pp. 116-127, 2025.

3. K. Sigetova, L. Uzikova, T. Dotsenko, and A. Boyko, "Recent trends in the financial crime of the world," Financ. Credit Act.: Probl. Theory Pract., vol. 5, no. 46, 2022.

4. Q. Yu, Z. Xu, and Z. Ke, "Deep learning for cross-border transaction anomaly detection in anti-money laundering systems," in Proc. 2024 6th Int. Conf. Machine Learn., Big Data Business Intell. (MLBDBI), Nov. 2024, pp. 244-248, doi: 10.1109/MLBDBI63974.2024.10823769.

5. J. Nicholls, A. Kuppa, and N. A. Le-Khac, "Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape," IEEE Access, vol. 9, pp. 163965-163986, 2021, doi: 10.1109/ACCESS.2021.3134076.

6. S. Ghimire, "Timetrail: Unveiling financial fraud patterns through temporal correlation analysis," arXiv preprint arXiv:2308.14215, 2023.

7. M. Wang and L. Zhu, "Linguistic analysis of verb tense usage patterns in computer science paper abstracts," Academia Nexus J., vol. 3, no. 3, 2024.

8. M. Yang, Z. Chen, M. Zhou, X. Liang, and Z. Bai, "The impact of COVID-19 on crime: A spatial temporal analysis in Chicago," ISPRS Int. J. Geo-Inf., vol. 10, no. 3, p. 152, 2021, doi: 10.3390/ijgi10030152.

9. L. Xia, C. Huang, Y. Xu, P. Dai, L. Bo, X. Zhang, and T. Chen, "Spatial-temporal sequential hypergraph network for crime prediction with dynamic multiplex relation learning," arXiv preprint arXiv:2201.02435, 2022, doi: 10.24963/ijcai.2021/225.

10. W. Liu, K. Qian, and S. Zhou, "Algorithmic bias identification and mitigation strategies in machine learning-based credit risk assessment for small and medium enterprises," Ann. Appl. Sci., vol. 5, no. 1, 2024.

11. T. Mo, P. Li, and Z. Jiang, "Comparative analysis of large language models' performance in identifying different types of code defects during automated code review," Ann. Appl. Sci., vol. 5, no. 1, 2024.

12. S. Xu, "Intelligent optimization algorithm for chain restaurant spatial layout based on generative adversarial networks," J. Ind. Eng. Appl. Sci., vol. 3, no. 3, pp. 32-41, 2025, doi: 10.70393/6a69656173.333031.

13. M. Sun, "AI-driven precision recruitment framework: Integrating NLP screening, advertisement targeting, and personalized engagement for ethical technical talent acquisition," Artif. Intell. Mach. Learn. Rev., vol. 4, no. 4, pp. 15-28, 2023.

14. Y. Wang and X. Wang, "FedPrivRec: A privacy-preserving federated learning framework for real-time e-commerce recom-mendation systems," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 63-77, 2023, doi: 10.69987/JACS.2023.30506.

15. Z. Feng, C. Ni, and S. Zhou, "Option-implied information for forward-looking market risk assessment: Evidence from com-modity derivatives markets," Spectr. Res., vol. 5, no. 1, 2025.

16. Z. Feng, D. Yuan, and D. Zhang, "Textual analysis of earnings calls for predictive risk assessment: Evidence from banking sector," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 90-104, 2023.

17. Z. Feng, D. Zhang, and Y. Wang, "Intraday liquidity patterns and their implications for market risk assessment: Evidence from global equity markets," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 4, pp. 83-98, 2024.

18. X. Luo, "Cross-cultural adaptation framework for enhancing large language model outputs in multilingual contexts," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 48-62, 2023, doi: 10.69987/JACS.2023.30505.

19. C. Cheng, L. Zhu, and X. Wang, "Knowledge-enhanced attentive recommendation: A graph neural network approach for context-aware user preference modeling," Ann. Appl. Sci., vol. 5, no. 1, 2024.

20. H. Lian, T. Mo, and C. Zhang, "Intelligent data lifecycle management in cloud storage: An AI-driven approach to optimize cost and performance," Academia Nexus J., vol. 3, no. 3, 2024.

21. A. Kang, Z. Li, and S. Meng, "AI-enhanced risk identification and intelligence sharing framework for anti-money laundering in cross-border income swap transactions," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 34-47, 2023, doi: 10.69987/JACS.2023.30504.

22. Z. Wang and Z. Chu, "Research on intelligent keyframe in-betweening technology for character animation based on generative adversarial networks," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 78-89, 2023, doi: 10.69987/JACS.2023.30507.

23. W. Liu, G. Rao, and H. Lian, "Anomaly pattern recognition and risk control in high-frequency trading using reinforcement learning," J. Comput. Innov. Appl., vol. 1, no. 2, pp. 47-58, 2023.

24. H. Lian, P. Li, and G. Wang, "Dynamic resource orchestration for cloud applications through AI-driven workload prediction and analysis," Artif. Intell. Mach. Learn. Rev., vol. 4, no. 4, pp. 1-14, 2023.

25. M. R. Eatherton, B. W. Schafer, J. F. Hajjar, W. S. Easterling, R. E. Avellaneda Ramirez, G. Wei, et al., "Considering ductility in the design of bare deck and concrete on metal deck diaphragms," in Proc. 17th World Conf. Earthquake Eng., Sendai, Japan.

26. G. Wei, I. Koutromanos, T. M. Murray, and M. R. Eatherton, "Investigating partial tension field action in gable frame panel zones," J. Constr. Steel Res., vol. 162, p. 105746, 2019, doi: 10.1016/j.jcsr.2019.105746.

27. G. Wei, I. Koutromanos, T. M. Murray, and M. R. Eatherton, "Computational study of tension field action in gable frame panel zones," 2018.

28. H. Foroughi, G. Wei, S. Torabian, M. R. Eatherton, and B. W. Schafer, "Seismic Demands on Steel Diaphragms for 3D Archetype Buildings with Concentric Braced Frames," in Proc. 12th Canadian Conf on Earthquake Engineering, Quebec City, Canada, Jun.17-20, 2019.

29. G. Wei, B. Schafer, M. Seek, and M. Eatherton, "Lateral bracing of beams provided by standing seam roof system: concepts and case study," 2020.

30. H. Foroughi, G. Wei, S. Torabian, M. R. Eatherton, and B. W. Schafer, "Seismic response predictions from 3D steel braced frame building simulations," in Proc. Annu. Stability Conf., Struct. Stability Res. Council, Atlanta, GA, USA, Apr. 2020.

31. G. Wei, H. Foroughi, S. Torabian, M. R. Eatherton, and B. W. Schafer, "Seismic design of diaphragms for steel buildings con-sidering diaphragm inelasticity," J. Struct. Eng., vol. 149, no. 7, p. 04023077, 2023, doi: 10.1061/JSENDH.STENG-11832.

32. S. Wu, Y. Li, M. Wang, D. Zhang, Y. Zhou, and Z. Wu, "More is better: Enhancing open-domain dialogue generation via mul-ti-source heterogeneous knowledge," in Proc. 2021 Conf. Empirical Methods Nat. Lang. Process., Nov. 2021, pp. 2286-2300, doi: 10.18653/v1/2021.emnlp-main.175.

33. S. Wu, M. Wang, Y. Li, D. Zhang, and Z. Wu, "Improving the applicability of knowledge-enhanced dialogue generation systems by using heterogeneous knowledge from multiple sources," in Proc. 15th ACM Int. Conf. Web Search Data Min., Feb. 2022, pp. 1149-1157, doi:10.1145/3488560.3498393.

34. S. Wu, M. Wang, D. Zhang, Y. Zhou, Y. Li, and Z. Wu, "Knowledge-aware dialogue generation via hierarchical infobox ac-cessing and infobox-dialogue interaction graph network," in IJCAI, Aug. 2021, pp. 3964-3970.

35. M. Wang, P. Xue, Y. Li, and Z. Wu, "Distilling the documents for relation extraction by topic segmentation," in Document Anal. Recogn.–ICDAR 2021: 16th Int. Conf., Lausanne, Switzerland, Sep. 5–10, 2021, Proc., Part I, vol. 16, pp. 517-531, Springer, 2021, doi: 10.1007/978-3-030-86549-8_33.

36. L. Zhu, H. Yang, and Z. Yan, "Extracting temporal information from online health communities," in Proc. 2nd Int. Conf. Crowd Sci. Eng., Jul. 2017, pp. 50-55, doi: 10.1145/3126973.3126975.

37. L. Zhu, H. Yang, and Z. Yan, "Mining medical related temporal information from patients' self-description," Int. J. Crowd Sci., vol. 1, no. 2, pp. 110-120, 2017, doi: 10.1108/IJCS-08-2017-0018.

38. D. Zhang and X. Jiang, "Cognitive collaboration: Understanding human-AI complementarity in supply chain decision pro-cesses," Spectr. Res., vol. 4, no. 1, 2024.

39. Z. Zhang and L. Zhu, "Intelligent detection and defense against adversarial content evasion: A multi-dimensional feature fu-sion approach for security compliance," Spectr. Res., vol. 4, no. 1, 2024.

40. J. Wu, H. Wang, K. Qian, and E. Feng, "Optimizing latency-sensitive AI applications through edge-cloud collaboration," J. Adv. Comput. Syst., vol. 3, no. 3, pp. 19-33, 2023, doi: 10.69987/JACS.2023.30303.

41. Y. Li, X. Jiang, and Y. Wang, "TRAM-FIN: A transformer-based real-time assessment model for financial risk detection in multinational corporate statements," J. Adv. Comput. Syst., vol. 3, no. 9, pp. 54-67, 2023.

42. D. Yuan and D. Zhang, "APAC-sensitive anomaly detection: Culturally-aware AI models for enhanced AML in US securities trading," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 108-121, 2025.

43. Z. Cheng, "DeepTriage: A real-time AI decision support system for emergency resource allocation in mass casualty incidents," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 170-182, 2025.

44. C. Zhu, J. Xin, and T. K. Trinh, "Data quality challenges and governance frameworks for AI implementation in supply chain management," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 28-43, 2025.

45. G. Wei, X. Wang, and Z. Chu, "Fine-grained action analysis for automated skill assessment and feedback in instructional vid-eos," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 96-107, 2025.

46. C. Jiang, H. Wang, and K. Qian, "AI-enhanced cultural resonance framework for player experience optimization in AAA games localization," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 75-87, 2025.

47. C. Ju and G. Rao, "Analyzing foreign investment patterns in the US semiconductor value chain using AI-enabled analytics: A framework for economic security," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 60-74, 2025.

48. C. Ni, J. Wu, and H. Wang, "Energy-aware edge computing optimization for real-time anomaly detection in IoT networks," Appl. Comput. Eng., vol. 139, pp. 42-53, 2025, doi: 10.54254/2755-2721/2025.22280.

49. T. K. Trinh, G. Jia, C. Cheng, and C. Ni, "Behavioral responses to AI financial advisors: Trust dynamics and decision quality among retail investors," Appl. Comput. Eng., vol. 144, pp. 69-79, 2025, doi: 10.54254/2755-2721/2025.21859.

50. Z. Wu, S. Wang, C. Ni, and J. Wu, "Adaptive traffic signal timing optimization using deep reinforcement learning in urban networks," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 4, pp. 55-68, 2024, doi: 10.69987/AIMLR.2024.50405.

51. C. Ju, X. Jiang, J. Wu, and C. Ni, "AI-driven vulnerability assessment and early warning mechanism for semiconductor supply chain resilience," Ann. Appl. Sci., vol. 5, no. 1, 2024.

52. H. Wang, J. Wu, C. Ni, and K. Qian, "Automated compliance monitoring: A machine learning approach for Digital Services Act adherence in multi-product platforms," Appl. Comput. Eng., vol. 147, pp. 14-25, 2025, doi: 10.54254/2755-2721/2025.22189.

53. J. Wu, C. Ni, H. Wang, and J. Chen, "Graph neural networks for efficient clock tree synthesis optimization in complex SoC designs," Appl. Comput. Eng., vol. 150, pp. 101-111, 2025, doi: 10.54254/2755-2721/2025.22281.

54. C. Ni, K. Qian, J. Wu, and H. Wang, "Contrastive time-series visualization techniques for enhancing AI model interpretability in financial risk assessment," 2025.

55. H. Wang, K. Qian, C. Ni, and J. Wu, "Distributed batch processing architecture for cross-platform abuse detection at scale," Pinnacle Acad. Press Proc. Ser., vol. 2, pp. 12-27, 2025.

56. S. Zhang, T. Mo, and Z. Zhang, "LightPersML: A lightweight machine learning pipeline architecture for real-time personaliza-tion in resource-constrained e-commerce businesses," J. Adv. Comput. Syst., vol. 4, no. 8, pp. 44-56, 2024, doi: 10.69987/JACS.2024.40807.

57. S. Zhang, Z. Feng, and B. Dong, "LAMDA: Low-latency anomaly detection architecture for real-time cross-market financial decision support," Academia Nexus J., vol. 3, no. 2, 2024.

58. S. Zhang, C. Zhu, and J. Xin, "CloudScale: A lightweight AI framework for predictive supply chain risk management in small and medium manufacturing enterprises," Spectr. Res., vol. 4, no. 2, 2024.

59. Z. Fang, H. Zhang, J. He, Z. Qi, and H. Zheng, "Semantic and contextual modeling for malicious comment detection with BERT-BiLSTM," in 2025 4th Int. Symp. Comput. Appl. Inf. Technol. (ISCAIT), Mar. 2025, pp. 1867-1871, IEEE, doi: 10.1109/ISCAIT64916.2025.11010257.

60. D. Sun, J. He, H. Zhang, Z. Qi, H. Zheng, and X. Wang, "A LongFormer-based framework for accurate and efficient medical text summarization," in 2025 8th Int. Conf. Adv. Algorithms Control Eng. (ICAACE), Mar. 2025, pp. 1527-1531, IEEE, doi: 10.1109/ICAACE65325.2025.11019176.

61. H. Zhang, Y. Ma, S. Wang, G. Liu, and B. Zhu, "Graph-based spectral decomposition for parameter coordination in language model fine-tuning," arXiv preprint arXiv:2504.19583, 2025.

62. J. He, G. Liu, B. Zhu, H. Zhang, H. Zheng, and X. Wang, "Context-guided dynamic retrieval for improving generation quality in RAG models," arXiv preprint arXiv:2504.19436, 2025.

63. X. Wang, G. Liu, B. Zhu, J. He, H. Zheng, and H. Zhang, "Pre-trained language models and few-shot learning for medical entity extraction," arXiv preprint arXiv:2504.04385, 2025.

64. H. Zheng, Y. Wang, R. Pan, G. Liu, B. Zhu, and H. Zhang, "Structured gradient guidance for few-shot adaptation in large language models," arXiv preprint arXiv:2506.00726, 2025.

65. X. Luo, "Politeness strategies in conversational AI: A cross-cultural pragmatic analysis of human-AI interactions," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 1-14, 2025.

66. M. Sun, "Research on e-commerce return prediction and influencing factor analysis based on user behavioral characteristics," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 15-28, 2025.

67. Z. Jiang and M. Wang, "Evaluation and analysis of chart reasoning accuracy in multimodal large language models: An em-pirical study on influencing factors," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 43-58, 2025.

68. S. Meng, D. Yuan, and D. Zhang, "Integration strategies and performance impact of PE-backed technology M&A transactions," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 59-75, 2025.

69. H. Kuang, L. Zhu, H. Yin, Z. Zhang, B. Jing, and J. Kuang, "The impact of individual factors on careless responding across different mental disorder screenings: Cross-sectional study," J. Med. Internet Res., vol. 27, p. e70451, 2025.

70. Z. Wu, E. Feng, and Z. Zhang, "Temporal-contextual behavioral analytics for proactive cloud security threat detection," Aca-demia Nexus J., vol. 3, no. 2, 2024.

71. Z. Zhang and Z. Wu, "Context-aware feature selection for user behavior analytics in zero-trust environments," J. Adv. Comput. Syst., vol. 3, no. 5, pp. 21-33, 2023, doi: 10.69987/JACS.2023.30503.

72. K. Xiong, Z. Wu, and X. Jia, "Deepcontainer: A deep learning-based framework for real-time anomaly detection in cloud-native container environments," J. Adv. Comput. Syst., vol. 5, no. 1, pp. 1-17, 2025, doi: 10.69987/JACS.2025.50101.

73. Z. Wu, Z. Feng, and B. Dong, "Optimal feature selection for market risk assessment: A dimensional reduction approach in quantitative finance," J. Comput. Innov. Appl., vol. 2, no. 1, pp. 20-31, 2024.

74. Y. Lei and Z. Wu, "A real-time detection framework for high-risk content on short video platforms based on heterogeneous feature fusion," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 93-106, 2025.

75. Z. Wu, C. Cheng, and C. Zhang, "Cloud-Enabled AI Analytics for Urban Green Space Optimization: Enhancing Microclimate Benefits in High-Density Urban Areas," Pinnacle Acad. Press Proc. Ser., vol. 3, pp. 123-133, 2025.

76. H. Xie and K. Qian, "Research on Low-Light Image Enhancement Algorithm Based on Attention Mechanism," J. Adv. Comput. Syst., vol. 5, no. 5, pp. 1-14, 2025.

77. L. Zhu, "Research on Personalized Advertisement Recommendation Methods Based on Context Awareness," J. Adv. Comput. Syst., vol. 3, no. 10, pp. 39-53, 2023.

78. A. Kang and X. Ma, "AI-Based Pattern Recognition and Characteristic Analysis of Cross-Border Money Laundering Behaviors in Digital Currency Transactions," Pinnacle Acad. Press Proc. Ser., vol. 5, pp. 1-19, 2025.

79. Y. Li, "Application of Artificial Intelligence in Cross-Departmental Budget Execution Monitoring and Deviation Correction for Enterprise Management," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 4, pp. 99-113, 2024.

80. D. Yuan, "Intelligent Cross-Border Payment Compliance Risk Detection Using Multi-Modal Deep Learning: A Framework for Automated Transaction Monitoring," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 2, pp. 25-35, 2024.

81. Q. Zheng and W. Liu, "Domain adaptation analysis of large language models in academic literature abstract generation: A cross-disciplinary evaluation study," J. Adv. Comput. Syst., vol. 4, no. 8, pp. 57-71, 2024.

82. H. Zhang and W. Liu, "A comparative study on large language models' accuracy in cross-lingual professional terminology processing: An evaluation across multiple domains," J. Adv. Comput. Syst., vol. 4, no. 10, pp. 55-68, 2024.

83. X. Wang, Z. Chu, and G. Weng, "Improved no-reference image quality assessment algorithm based on visual perception characteristics," Ann. Appl. Sci., vol. 6, no. 1, 2025.

84. Y. Wang and C. Zhang, "Research on customer purchase intention prediction methods for e-commerce platforms based on user behavior data," J. Adv. Comput. Syst., vol. 3, no. 10, pp. 23-38, 2023.

85. Z. Wu, Z. Zhang, Q. Zhao, and L. Yan, "Privacy-preserving financial transaction pattern recognition: A differential privacy approach," 2025, doi: 10.20944/preprints202504.1583.v1.