暂无分享,去创建一个
Zibin Zheng | Yan Zhang | Weili Chen | Huawei Huang | Jieli Liu | Jiajing Wu | Zibin Zheng | Weili Chen | Huawei Huang | Jiajing Wu | Jieli Liu | Yan Zhang
[1] P. Holme. Network reachability of real-world contact sequences. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[2] Sarah Meiklejohn,et al. Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.
[3] Zibin Zheng,et al. Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[4] Iyad Rahwan,et al. The Anti-Social System Properties: Bitcoin Network Data Analysis , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[6] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[7] Bo Tang,et al. A Bayesian Classification Approach Using Class-Specific Features for Text Categorization , 2016, IEEE Transactions on Knowledge and Data Engineering.
[8] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[9] Tyler Moore,et al. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.
[10] Jure Leskovec,et al. Motifs in Temporal Networks , 2016, WSDM.
[11] Roberto Tamassia,et al. Bitconeview: visualization of flows in the bitcoin transaction graph , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[12] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[13] Jie Chen,et al. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics , 2019, ArXiv.
[14] Philip S. Yu,et al. Building text classifiers using positive and unlabeled examples , 2003, Third IEEE International Conference on Data Mining.
[15] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[16] Sonia Fahmy,et al. Mind Your Credit: Assessing the Health of the Ripple Credit Network , 2017, WWW.
[17] Stan Matwin,et al. Addressing the Curse of Imbalanced Training Sets: One-Sided Selection , 1997, ICML.
[18] Murat Kantarcioglu,et al. Forecasting Bitcoin Price with Graph Chainlets , 2018, PAKDD.
[19] Zibin Zheng,et al. Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology , 2018, WWW.
[20] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[21] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[22] Zibin Zheng,et al. Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum , 2019, IEEE Access.
[23] Chen Weili,et al. Blockchain Data Analysis: A Review of Status, Trends and Challenges , 2018 .
[24] Jure Leskovec,et al. Higher-order organization of complex networks , 2016, Science.
[25] Jiawei Han,et al. Temporal Motifs in Heterogeneous Information Networks , 2018 .
[26] Davor Svetinovic,et al. Improving Bitcoin Ownership Identification Using Transaction Patterns Analysis , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[27] Fei-Yue Wang,et al. Blockchain and Cryptocurrencies: Model, Techniques, and Applications , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[28] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[29] Christian Doerr,et al. Discovering Bitcoin Mixing Using Anomaly Detection , 2017, CIARP.
[30] Rainer Böhme,et al. Towards Risk Scoring of Bitcoin Transactions , 2014, Financial Cryptography Workshops.
[31] S. Shen-Orr,et al. Network motifs: simple building blocks of complex networks. , 2002, Science.
[32] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[33] Yanqing Zhang,et al. SVMs Modeling for Highly Imbalanced Classification , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[34] Hong Liu,et al. Identifying Illicit Accounts in Large Scale E-payment Networks - A Graph Representation Learning Approach , 2019, ArXiv.
[35] Rolf van Wegberg,et al. Bitcoin money laundering: mixed results?: An explorative study on money laundering of cybercrime proceeds using bitcoin , 2018 .
[36] Simon L. R. Vrhovec,et al. Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does , 2019, CECC.
[37] Chang-Dong Wang,et al. Community Detection Using Attribute Homogenous Motif , 2018, IEEE Access.
[38] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[39] Mark Newman,et al. Networks: An Introduction , 2010 .
[40] Chun-Hsi Huang,et al. Biological network motif detection: principles and practice , 2012, Briefings Bioinform..
[41] Nagiza F. Samatova,et al. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph , 2017, Financial Cryptography Workshops.
[42] Julio Hernandez-Castro,et al. An Analysis of Bitcoin Laundry Services , 2017, NordSec.
[43] Murat Kantarcioglu,et al. ChainNet: Learning on Blockchain Graphs with Topological Features , 2019, 2019 IEEE International Conference on Data Mining (ICDM).
[44] Paolo Tasca,et al. The evolution of the bitcoin economy , 2018 .
[45] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[46] Xiaodong Lin,et al. Understanding Ethereum via Graph Analysis , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.