Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

Blockchain and Data Mining are not simply buzzwords, but rather concepts that are playing an important role in the modern Information Technology (IT) revolution. Blockchain has recently been popularized by the rise of cryptocurrencies, while data mining has already been present in IT for many decades. Data stored in a blockchain can also be considered to be big data, whereas data mining methods can be applied to extract knowledge hidden in the blockchain. In a nutshell, this paper presents the interplay of these two research areas. In this paper, we surveyed approaches for the data mining of blockchain data, yet show several real-world applications. Special attention was paid to anomaly detection and fraud detection, which were identified as the most prolific applications of applying data mining methods on blockchain data. The paper concludes with challenges for future investigations of this research area.

[1]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[2]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[3]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[4]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[5]  Neil Wilson,et al.  Decentralised firewall for malware detection , 2017, 2017 International Conference on Advances in Computing, Communication and Control (ICAC3).

[6]  Paolo Tasca,et al.  Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.

[7]  Anastas Mishev,et al.  Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.

[8]  Ravikiran Vatrapu,et al.  A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[9]  P. Takis Mathiopoulos,et al.  Identification of High Yielding Investment Programs in Bitcoin via Transactions Pattern Analysis , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[10]  Radu State,et al.  Finding Suspicious Activities in Financial Transactions and Distributed Ledgers , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[11]  Ross King,et al.  Neural network and blockchain based technique for cyber threat intelligence and situational awareness , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).

[12]  Laura Wynter,et al.  Characterizing Entities in the Bitcoin Blockchain , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[13]  George Suciu,et al.  Android Malware Detection and Crypto-Mining Recognition Methodology with Machine Learning , 2018, 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC).

[14]  Massimo Bartoletti,et al.  Data Mining for Detecting Bitcoin Ponzi Schemes , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[15]  Tsuyoshi Idé,et al.  Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[16]  Qixu Liu,et al.  A Novel Approach for Detecting Browser-Based Silent Miner , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[17]  Shelton Peiris,et al.  A new look at Cryptocurrencies , 2018 .

[18]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[19]  Marko Hölbl,et al.  EduCTX: A Blockchain-Based Higher Education Credit Platform , 2017, IEEE Access.

[20]  Zibin Zheng,et al.  Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology , 2018, WWW.

[21]  Wouter Joosen,et al.  Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study , 2018, Applied Sciences.

[22]  Zièd Choukair,et al.  Anomaly Detection Model Over Blockchain Electronic Transactions , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[23]  Vladimír Veselý,et al.  How to detect cryptocurrency miners? By traffic forensics! , 2019, Digit. Investig..

[24]  Yuping Zhang,et al.  Quorum Chain-Based Malware Detection in Android Smart Devices , 2019, FNSS.

[25]  James Won-Ki Hong,et al.  Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods , 2019, BlockSys.

[26]  Yang Lu,et al.  The blockchain: State-of-the-art and research challenges , 2019, J. Ind. Inf. Integr..

[27]  Qifeng Chen,et al.  Decentralized Autonomous Video Copyright Protection , 2019, Advances in Intelligent Systems and Computing.

[28]  Cuicui Kang,et al.  Ethereum Behavior Analysis with NetFlow Data , 2019, 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[29]  Fran Casino,et al.  A systematic literature review of blockchain-based applications: Current status, classification and open issues , 2019, Telematics Informatics.

[30]  Wenyong Wang,et al.  A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features , 2019, IEEE Access.

[31]  Jarek Nabrzyski,et al.  Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data , 2019, 2019 International Conference on Information and Communication Technology Convergence (ICTC).

[32]  Raafat George Saadé,et al.  Blockchain Applications - Usage in Different Domains , 2019, IEEE Access.

[33]  Shlomi Linoy,et al.  Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution , 2019, 2019 15th International Conference on Network and Service Management (CNSM).

[34]  Faruk Kazi,et al.  Blockchain and Anomaly Detection based Monitoring System for Enforcing Wastewater Reuse , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[35]  Pere Barlet-Ros,et al.  Detecting cryptocurrency miners with NetFlow/IPFIX network measurements , 2019, 2019 IEEE International Symposium on Measurements & Networking (M&N).

[36]  Kyungho Lee,et al.  A Model for Detecting Cryptocurrency Transactions with Discernible Purpose , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).

[37]  Janez Brest,et al.  Wrapper-Based Feature Selection Using Self-adaptive Differential Evolution , 2019, SEMCCO/FANCCO.

[38]  Kamil Zbikowski,et al.  Detecting Fraudulent Accounts on Blockchain: A Supervised Approach , 2019, WISE.

[39]  Yingshu Li,et al.  Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[40]  Na Ruan,et al.  Ethereum Analysis via Node Clustering , 2019, NSS.

[41]  Mohsen Joneidi,et al.  AI-Enabled Blockchain: An Outlier-Aware Consensus Protocol for Blockchain-Based IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[42]  Yu Wang,et al.  Machine Learning Model for Smart Contracts Security Analysis , 2019, 2019 17th International Conference on Privacy, Security and Trust (PST).

[43]  Muhammad Abulaish,et al.  A MuItilayer Perceptron Architecture for Detecting Deceptive Cryptocurrencies in Coin Market Capitalization Data , 2019, 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI).

[44]  Nikita Borisov,et al.  Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild , 2019, WWW.

[45]  Chao Liang,et al.  Intrusion Detection System for Internet of Things based on a Machine Learning approach , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).

[46]  Jiannong Cao,et al.  Data Management in Supply Chain Using Blockchain: Challenges and a Case Study , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).

[47]  Hye-Young Paik,et al.  Analysis of Data Management in Blockchain-Based Systems: From Architecture to Governance , 2019, IEEE Access.

[48]  Tomoaki Ohtsuki,et al.  A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification , 2019, IEEE Access.

[49]  Mikel Galar,et al.  Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns , 2019 .

[50]  Shih-Wei Liao,et al.  An Evaluation of Bitcoin Address Classification based on Transaction History Summarization , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[51]  Nawari O. Nawari,et al.  Blockchain and the built environment: Potentials and limitations , 2019, Journal of Building Engineering.

[52]  B. B. Zaidan,et al.  Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions , 2019, Comput. Stand. Interfaces.

[53]  Tomoaki Ohtsuki,et al.  Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[54]  Tanja Hagemann,et al.  Cryptocurrency Pump and Dump Schemes: Quantification and Detection , 2019, 2019 International Conference on Data Mining Workshops (ICDMW).

[55]  Zibin Zheng,et al.  Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum , 2019, IEEE Access.

[56]  Venkata Sai Krishna Avinash Nukala Website Cryptojacking Detection Using Machine Learning : IEEE CNS 20 Poster , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[57]  Muhammad Asaad Cheema,et al.  Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things , 2020, 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[58]  Mohamed Ikbal Nacer,et al.  Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain , 2020, Proceedings of the 2020 5th International Conference on Machine Learning Technologies.

[59]  Chunhua Su,et al.  Am I eclipsed? A smart detector of eclipse attacks for Ethereum , 2020, Comput. Secur..

[60]  Dinh C. Nguyen,et al.  Blockchain for 5G and Beyond Networks: A State of the Art Survey , 2019, J. Netw. Comput. Appl..

[61]  Guiling Wang,et al.  Blockchain-driven anomaly detection framework on edge intelligence , 2020, CCF Trans. Netw..

[62]  D. Boughaci,et al.  Enhancing the security of financial transactions in Blockchain by using machine learning techniques: towards a sophisticated security tool for banking and finance , 2020, 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH).

[63]  Pronaya Bhattacharya,et al.  KaRuNa: A Blockchain-Based Sentiment Analysis Framework for Fraud Cryptocurrency Schemes , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).

[64]  Damiano Di Francesco Maesa,et al.  Blockchain 3.0 applications survey , 2020, J. Parallel Distributed Comput..

[65]  Romaric Ludinard,et al.  Detecting Illicit Entities in Bitcoin using Supervised Learning of Ensemble Decision Trees , 2020, Proceedings of the 2020 10th International Conference on Information Communication and Management.

[66]  Jin Yang,et al.  Spam transaction attack detection model based on GRU and WGAN-div , 2020, Comput. Commun..

[67]  Ibrahim Bounhas,et al.  A Hybrid Approach for Fake News Detection in Twitter Based on User Features and Graph Embedding , 2020, ICDCIT.

[68]  Guangyuan Liu,et al.  Classification and Sharing Method of Malware Based on Threat Intelligence , 2020, 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[69]  Hakim Ghazzai,et al.  A Secure AI-Driven Architecture for Automated Insurance Systems: Fraud Detection and Risk Measurement , 2020, IEEE Access.

[70]  Jianming Zhu,et al.  Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract , 2020, BlockSys.

[71]  Guy-Vincent Jourdan,et al.  An Automatic Detection and Analysis of the Bitcoin Generator Scam , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[72]  Ying Wang,et al.  Construction of Audit Internal Control Intelligent System Based on Blockchain and Cloud Storage , 2020, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184).

[73]  L. Chaari,et al.  Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks , 2020, 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE).

[74]  Keli Zhang,et al.  Blockchain-based anomaly detection of electricity consumption in smart grids , 2020, Pattern Recognit. Lett..

[75]  Helio N. Cunha Neto,et al.  MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking , 2020, Ann. des Télécommunications.

[76]  Mauro Conti,et al.  Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel , 2020, IEEE Transactions on Information Forensics and Security.

[77]  A. Rachedi,et al.  Toward a Machine Learning and Software Defined Network Approaches to Manage Miners’ Reputation in Blockchain , 2020, Journal of Network and Systems Management.

[78]  Abdullah M. Iliyasu,et al.  A Secure Federated Learning Framework for 5G Networks , 2020, IEEE Wireless Communications.

[79]  Nitesh Kumar,et al.  Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning , 2020, CSCML.

[80]  Massimo Guarascio,et al.  Deep Autoencoder Ensembles for Anomaly Detection on Blockchain , 2020, ISMIS.

[81]  Pan Zhou,et al.  GuardHealth: Blockchain empowered secure data management and Graph Convolutional Network enabled anomaly detection in smart healthcare , 2020, J. Parallel Distributed Comput..

[82]  A. Aman,et al.  IoMT amid COVID-19 pandemic: Application, architecture, technology, and security , 2020, Journal of Network and Computer Applications.

[83]  Hadis Karimipour,et al.  Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis , 2020, Journal of Grid Computing.

[84]  Shiping Chen,et al.  Ponzi Contracts Detection Based on Improved Convolutional Neural Network , 2020, 2020 IEEE International Conference on Services Computing (SCC).

[85]  A. Khatoon A Blockchain-Based Smart Contract System for Healthcare Management , 2020, Electronics.

[86]  Gautam Srivastava,et al.  Cryptocurrency malware hunting: A deep Recurrent Neural Network approach , 2020, Appl. Soft Comput..

[87]  Mohamed Ikbal Nacer,et al.  Comparative Analysis Using Supervised Learning Methods for Anti-Money Laundering in Bitcoin , 2020, Proceedings of the 2020 5th International Conference on Machine Learning Technologies.

[88]  Madihah Mohd Saudi,et al.  Crytojacking Classification based on Machine Learning Algorithm , 2020, ICC 2020.

[89]  Konstantinos Demertzis,et al.  Anomaly detection via blockchained deep learning smart contracts in industry 4.0 , 2020, Neural Computing and Applications.

[90]  Zihao Yuan,et al.  Phishing Detection on Ethereum via Learning Representation of Transaction Subgraphs , 2020, BlockSys.

[91]  Ali Dorri,et al.  Securing Manufacturing Using Blockchain , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).

[92]  Guang Sun,et al.  A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain , 2020, Computers, Materials & Continua.

[93]  Lang Li,et al.  Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification Algorithm , 2020, CSoNet.

[94]  Marcos Leandro Hoffmann Souza,et al.  A survey on decision-making based on system reliability in the context of Industry 4.0 , 2020 .

[95]  Ken Miyachi,et al.  Combating Health Care Fraud and Abuse: Conceptualization and Prototyping Study of a Blockchain Antifraud Framework , 2020, Journal of medical Internet research.

[96]  Yih-Chun Hu,et al.  Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning , 2020, Human-centric Computing and Information Sciences.

[97]  Lei Pan,et al.  Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network , 2020, NSS.

[98]  Zibin Zheng,et al.  Honeypot Contract Risk Warning on Ethereum Smart Contracts , 2020, 2020 IEEE International Conference on Joint Cloud Computing.

[99]  Mohamed Amine Ferrag,et al.  DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.

[100]  D. Byman Understanding, and Misunderstanding, State Sponsorship of Terrorism , 2020, Studies in Conflict & Terrorism.

[101]  Muhamed Turkanović,et al.  A Brief Review of Database Solutions Used within Blockchain Platforms , 2020, BLOCKCHAIN.

[102]  Anomaly Detection on Time-series Logs for Industrial Network , 2020, 2020 3rd International Conference on Smart BlockChain (SmartBlock).

[103]  Janusz Kacprzyk,et al.  Agri-food 4.0: A survey of the supply chains and technologies for the future agriculture , 2020, Comput. Ind..

[104]  Frank Jiang,et al.  A New Social User Anomaly Behavior Detection System Based on Blockchain and Smart Contract , 2020, 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC).

[105]  Benjamin Turnbull,et al.  A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks , 2020, IEEE Transactions on Industrial Informatics.

[106]  Alberto Mozo,et al.  Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning , 2020, IEEE Access.

[107]  George Azzopardi,et al.  Detection of illicit accounts over the Ethereum blockchain , 2020, Expert Syst. Appl..

[108]  Guiling Wang,et al.  Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing , 2020, ML4CS.

[109]  Shaojing Fu,et al.  Expose Your Mask: Smart Ponzi Schemes Detection on Blockchain , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).

[110]  Olga Gadyatskaya,et al.  Dissecting Android Cryptocurrency Miners , 2019, CODASPY.

[111]  Zheng Yan,et al.  Privacy preservation in permissionless blockchain: A survey , 2020, Digit. Commun. Networks.

[112]  Ahmad Taher Azar,et al.  Machine Learning with Blockchain for Secure E-voting System , 2020, 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH).

[113]  LiuYang,et al.  Phishing Scams Detection in Ethereum Transaction Network , 2020 .

[114]  Shamik Sengupta,et al.  BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City , 2020, 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[115]  Rachit Agarwal,et al.  Detecting malicious accounts in permissionless blockchains using temporal graph properties , 2020, Applied Network Science.

[116]  Zhichao Lian,et al.  A Blockchain-Enabled Multiple Object Tracking for Unmanned System With Deep Hash Appearance Feature , 2021, IEEE Access.

[117]  Gautam Srivastava,et al.  SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles , 2021, Comput. Networks.

[118]  Shaojing Fu,et al.  Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain , 2021, Inf. Process. Manag..

[119]  Gautam Srivastava,et al.  SS-ITS: secure scalable intelligent transportation systems , 2021, The Journal of Supercomputing.

[120]  Wenjia Li,et al.  AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology , 2021, IEEE Internet of Things Journal.

[121]  Gautam Srivastava,et al.  Privacy reinforcement learning for faults detection in the smart grid , 2021, Ad Hoc Networks.

[122]  Alex Borges Vieira,et al.  Fighting Under-price DoS Attack in Ethereum with Machine Learning Techniques , 2021, SIGMETRICS Perform. Evaluation Rev..

[123]  K. Y. Abeywardhana,et al.  Credit Card Fraud Prevention Using Blockchain , 2021, 2021 6th International Conference for Convergence in Technology (I2CT).

[124]  Geguang Pu,et al.  Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing , 2021, IEEE Transactions on Vehicular Technology.

[125]  Zibin Zheng,et al.  Analysis of Cryptocurrency Transactions from a Network Perspective: An Overview , 2020, J. Netw. Comput. Appl..

[126]  Muhammad Alshurideh,et al.  Combating Against Potentially Harmful Mobile Apps , 2021, AICV.

[127]  Deepak Kumar Sharma,et al.  Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions , 2020, Trans. Emerg. Telecommun. Technol..

[128]  O. Ouchetto,et al.  A Taxonomic Review of the Use of IoT and Blockchain in Healthcare Applications , 2021 .

[129]  Limao Zhang,et al.  Roles of artificial intelligence in construction engineering and management: A critical review and future trends , 2021 .

[130]  B. D. Deebak,et al.  Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements , 2021, J. Inf. Secur. Appl..

[131]  Naoto Yanai,et al.  Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts , 2021, BSCI.

[132]  Roberto Di Pietro,et al.  Cryptomining makes noise: Detecting cryptojacking via Machine Learning , 2021, Comput. Commun..

[133]  Sha Fu,et al.  Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec , 2021, IEEE Access.

[134]  Madhuparna Bhowmik,et al.  Comparative Study of Machine Learning Algorithms for Fraud Detection in Blockchain , 2021, 2021 5th International Conference on Computing Methodologies and Communication (ICCMC).

[135]  Mingdong Tang,et al.  Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems , 2021, IEEE Internet of Things Journal.

[136]  S. Venkatesan,et al.  A comprehensive survey on authentication and privacy-preserving schemes in VANETs , 2021, Comput. Sci. Rev..

[137]  Ray Y. Zhong,et al.  Industrial Blockchain: A state-of-the-art Survey , 2021, Robotics Comput. Integr. Manuf..

[138]  Israa T. Aziz,et al.  An Effective Lightweight Intrusion Detection System with Blockchain to Mitigate Attacks in SDN/NFV Enabled Cloud , 2021, 2021 6th International Conference for Convergence in Technology (I2CT).

[139]  Ibrahim Khalil,et al.  ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study , 2021, Inf. Process. Manag..

[140]  David Novillo-Ortiz,et al.  Technological progress in electronic health record system optimization: Systematic review of systematic literature reviews , 2021, Int. J. Medical Informatics.

[141]  Kim-Kwang Raymond Choo,et al.  Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions , 2021, J. Netw. Comput. Appl..

[142]  Quoc-Dung Ngo,et al.  IoT Botnet detection based on the integration of static and dynamic vector features , 2021, 2020 IEEE Eighth International Conference on Communications and Electronics (ICCE).

[143]  Saru Kumari,et al.  Supervised learning model for identifying illegal activities in Bitcoin , 2020, Appl. Intell..

[144]  Evaldas Vaiciukynas,et al.  Towards Blockchain-Based Federated Machine Learning: Smart Contract for Model Inference , 2021, Applied Sciences.

[145]  Tianqing Zhu,et al.  Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things , 2021, Future Gener. Comput. Syst..

[146]  Fred Morstatter,et al.  Identifying and Analyzing Cryptocurrency Manipulations in Social Media , 2021, IEEE Transactions on Computational Social Systems.

[147]  Mahinder Pal Singh Bhatia,et al.  Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications , 2021, Int. J. Digit. Crime Forensics.

[148]  Murat Kantarcioglu,et al.  BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture , 2020, CODASPY.

[149]  Kalpesh Kapoor,et al.  Design and Validation of BlockEval, A Blockchain Simulator , 2021, 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[150]  Ashutosh Bhatia,et al.  Bitcoin Data Analytics: Scalable techniques for transaction clustering and embedding generation , 2021, 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[151]  Mohammad Nauman,et al.  Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models , 2020, Expert Syst. J. Knowl. Eng..

[152]  Sourav Sengupta,et al.  Temporal Analysis of the Entire Ethereum Blockchain Network , 2021, WWW.

[153]  Hangbae Chang,et al.  Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT , 2021, IEEE Access.

[154]  Benjamin Turnbull,et al.  A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.

[155]  Xiaoming Huang,et al.  Transaction-based classification and detection approach for Ethereum smart contract , 2021, Inf. Process. Manag..

[156]  Ruochen Jin,et al.  Blockchain-Based Data Collection With Efficient Anomaly Detection for Estimating Battery State-of-Health , 2021, IEEE Sensors Journal.

[157]  Zibin Zheng,et al.  Transaction-Based Hidden Strategies against General Phishing Detection Framework on Ethereum , 2021, 2021 IEEE International Symposium on Circuits and Systems (ISCAS).

[158]  Praveen Kumar Reddy Maddikunta,et al.  A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions , 2020, Future Gener. Comput. Syst..

[159]  BlockFLA , Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy.