{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:01:36Z","timestamp":1773824496280,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811679926","type":"print"},{"value":"9789811679933","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7993-3_11","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T17:18:47Z","timestamp":1638465527000},"page":"147-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Attention-Based Graph Neural Network for Identifying Illicit Bitcoin Addresses"],"prefix":"10.1007","author":[{"given":"Hao","family":"Tian","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"11_CR1","unstructured":"Nakamoto, Satoshi: Bitcoin: A peer-to-peer electronic cash system. Technical report, Manubot (2019)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData congress), pp. 557\u2013564. IEEE (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-26096-9_30","volume-title":"Security Protocols XXIII","author":"ST Ali","year":"2015","unstructured":"Ali, S.T.: Bitcoin: perils of an unregulated global P2P currency (Transcript of Discussion). In: Christianson, B., \u0160venda, P., Maty\u00e1\u0161, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2015. LNCS, vol. 9379, pp. 294\u2013306. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26096-9_30"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bohr, J., Bashir, M.: Who uses bitcoin? an exploration of the bitcoin community. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 94\u2013101. IEEE (2014)","DOI":"10.1109\/PST.2014.6890928"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doup\u00e9, A., Ahn, G.J.: Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"402","DOI":"10.25046\/aj040250","volume":"4","author":"Z Samsudeen","year":"2019","unstructured":"Samsudeen, Z., Perera, D., Fernando, M.: Behavioral analysis of bitcoin users on illegal transactions. Adv. Sci. Technol. Eng. Syst. J 4, 402\u2013412 (2019)","journal-title":"Adv. Sci. Technol. Eng. Syst. J"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Monamo, P., Marivate, V., Twala, B.: Unsupervised learning for robust bitcoin fraud detection. In: 2016 Information Security for South Africa (ISSA), pp. 129\u2013134. IEEE (2016)","DOI":"10.1109\/ISSA.2016.7802939"},{"issue":"447","key":"11_CR9","first-page":"956","volume":"94","author":"L\u00c1 Garc\u00eda-Escudero","year":"1999","unstructured":"Garc\u00eda-Escudero, L.\u00c1., Gordaliza, A.: Robustness properties of k means and trimmed k means. J. Am. Stat. Assoc. 94(447), 956\u2013969 (1999)","journal-title":"J. Am. Stat. Assoc."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Lin, Y.J., Wu, P.W., Hsu, C.H., Tu, I.P., Liao, S.W.: An evaluation of bitcoin address classification based on transaction history summarization. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 302\u2013310. IEEE (2019)","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"11_CR11","unstructured":"Pham, T., Lee, S.: Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75\u201384. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"11_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-15-9213-3_8","volume-title":"Blockchain and Trustworthy Systems","author":"Y Li","year":"2020","unstructured":"Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99\u2013111. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9213-3_8"},{"key":"11_CR14","unstructured":"Kalodner, H., et al. Blocksci: design and applications of a blockchain analysis platform. In: 29th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 20), pp. 2721\u20132738 (2020)"},{"issue":"2009","key":"11_CR15","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1609\/icwsm.v3i1.13937","volume":"8","author":"M Bastian","year":"2009","unstructured":"Bastian, M., Heymann, S., Jacomy, M., et al.: Gephi: an open source software for exploring and manipulating networks. Icwsm 8(2009), 361\u2013362 (2009)","journal-title":"Icwsm"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Maesschalck, R.D., Jouan-Rimbaud, D., Massart, D.L.: The mahalanobis distance. Chemometr. Intell. Lab. Syst. 50(1), 1\u201318 (2000)","DOI":"10.1016\/S0169-7439(99)00047-7"},{"key":"11_CR18","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J., Platt, J.: Support vector method for novelty detection. Adv. Neural Inf. Process. Syst. 12, 582\u2013588 (1999)"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"74835","DOI":"10.1109\/ACCESS.2019.2921087","volume":"7","author":"K Toyoda","year":"2019","unstructured":"Toyoda, K., Mathiopoulos, P.T., Ohtsuki, T.: A novel methodology for hyip operators\u2019 bitcoin addresses identification. IEEE Access 7, 74835\u201374848 (2019)","journal-title":"IEEE Access"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"11_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997)","journal-title":"J. Comput. Syst. Sci."},{"key":"11_CR22","unstructured":"Ke, G., et al.: Lightgbm: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, pp. 3146\u20133154 (2017)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Abeywickrama, T., Cheema, M.A., Taniar, D.: K-nearest neighbors on road networks: a journey in experimentation and in-memory implementation. arXiv preprint arXiv:1601.01549 (2016)","DOI":"10.14778\/2904121.2904125"},{"issue":"1","key":"11_CR24","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"11_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"1","key":"11_CR26","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/S0893-6080(98)00116-6","volume":"12","author":"N Qian","year":"1999","unstructured":"Qian, N.: On the momentum term in gradient descent learning algorithms. Neural Netw. 12(1), 145\u2013151 (1999)","journal-title":"Neural Netw."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Multi-class bitcoin-enabled service identification based on transaction history summarization. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1153\u20131160. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00208"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Jourdan, M., Blandin, S., Wynter, L., Deshpande, P.: Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 55\u201362. IEEE (2018)","DOI":"10.1109\/ICDMW.2018.00016"},{"issue":"2004","key":"11_CR29","first-page":"41","volume":"2","author":"S Haykin","year":"2004","unstructured":"Haykin, S., Network, N.: A comprehensive foundation. Neural Netw. 2(2004), 41 (2004)","journal-title":"Neural Netw."},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7993-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:40:33Z","timestamp":1673912433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7993-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811679926","9789811679933"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7993-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}