Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection
暂无分享,去创建一个
[1] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..
[2] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[3] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[4] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[5] Neil Wilson,et al. Decentralised firewall for malware detection , 2017, 2017 International Conference on Advances in Computing, Communication and Control (ICAC3).
[6] Paolo Tasca,et al. Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.
[7] Anastas Mishev,et al. Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.
[8] Ravikiran Vatrapu,et al. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[9] P. Takis Mathiopoulos,et al. Identification of High Yielding Investment Programs in Bitcoin via Transactions Pattern Analysis , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[10] Radu State,et al. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[11] Ross King,et al. Neural network and blockchain based technique for cyber threat intelligence and situational awareness , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[12] Laura Wynter,et al. Characterizing Entities in the Bitcoin Blockchain , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).
[13] George Suciu,et al. Android Malware Detection and Crypto-Mining Recognition Methodology with Machine Learning , 2018, 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC).
[14] Massimo Bartoletti,et al. Data Mining for Detecting Bitcoin Ponzi Schemes , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[15] Tsuyoshi Idé,et al. Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).
[16] Qixu Liu,et al. A Novel Approach for Detecting Browser-Based Silent Miner , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[17] Shelton Peiris,et al. A new look at Cryptocurrencies , 2018 .
[18] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[19] Marko Hölbl,et al. EduCTX: A Blockchain-Based Higher Education Credit Platform , 2017, IEEE Access.
[20] Zibin Zheng,et al. Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology , 2018, WWW.
[21] Wouter Joosen,et al. Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study , 2018, Applied Sciences.
[22] Zièd Choukair,et al. Anomaly Detection Model Over Blockchain Electronic Transactions , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[23] Vladimír Veselý,et al. How to detect cryptocurrency miners? By traffic forensics! , 2019, Digit. Investig..
[24] Yuping Zhang,et al. Quorum Chain-Based Malware Detection in Android Smart Devices , 2019, FNSS.
[25] James Won-Ki Hong,et al. Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods , 2019, BlockSys.
[26] Yang Lu,et al. The blockchain: State-of-the-art and research challenges , 2019, J. Ind. Inf. Integr..
[27] Qifeng Chen,et al. Decentralized Autonomous Video Copyright Protection , 2019, Advances in Intelligent Systems and Computing.
[28] Cuicui Kang,et al. Ethereum Behavior Analysis with NetFlow Data , 2019, 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[29] Fran Casino,et al. A systematic literature review of blockchain-based applications: Current status, classification and open issues , 2019, Telematics Informatics.
[30] Wenyong Wang,et al. A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features , 2019, IEEE Access.
[31] Jarek Nabrzyski,et al. Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data , 2019, 2019 International Conference on Information and Communication Technology Convergence (ICTC).
[32] Raafat George Saadé,et al. Blockchain Applications - Usage in Different Domains , 2019, IEEE Access.
[33] Shlomi Linoy,et al. Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution , 2019, 2019 15th International Conference on Network and Service Management (CNSM).
[34] Faruk Kazi,et al. Blockchain and Anomaly Detection based Monitoring System for Enforcing Wastewater Reuse , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[35] Pere Barlet-Ros,et al. Detecting cryptocurrency miners with NetFlow/IPFIX network measurements , 2019, 2019 IEEE International Symposium on Measurements & Networking (M&N).
[36] Kyungho Lee,et al. A Model for Detecting Cryptocurrency Transactions with Discernible Purpose , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).
[37] Janez Brest,et al. Wrapper-Based Feature Selection Using Self-adaptive Differential Evolution , 2019, SEMCCO/FANCCO.
[38] Kamil Zbikowski,et al. Detecting Fraudulent Accounts on Blockchain: A Supervised Approach , 2019, WISE.
[39] Yingshu Li,et al. Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).
[40] Na Ruan,et al. Ethereum Analysis via Node Clustering , 2019, NSS.
[41] Mohsen Joneidi,et al. AI-Enabled Blockchain: An Outlier-Aware Consensus Protocol for Blockchain-Based IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[42] Yu Wang,et al. Machine Learning Model for Smart Contracts Security Analysis , 2019, 2019 17th International Conference on Privacy, Security and Trust (PST).
[43] Muhammad Abulaish,et al. A MuItilayer Perceptron Architecture for Detecting Deceptive Cryptocurrencies in Coin Market Capitalization Data , 2019, 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI).
[44] Nikita Borisov,et al. Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild , 2019, WWW.
[45] Chao Liang,et al. Intrusion Detection System for Internet of Things based on a Machine Learning approach , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
[46] Jiannong Cao,et al. Data Management in Supply Chain Using Blockchain: Challenges and a Case Study , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).
[47] Hye-Young Paik,et al. Analysis of Data Management in Blockchain-Based Systems: From Architecture to Governance , 2019, IEEE Access.
[48] Tomoaki Ohtsuki,et al. A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification , 2019, IEEE Access.
[49] Mikel Galar,et al. Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns , 2019 .
[50] Shih-Wei Liao,et al. An Evaluation of Bitcoin Address Classification based on Transaction History Summarization , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[51] Nawari O. Nawari,et al. Blockchain and the built environment: Potentials and limitations , 2019, Journal of Building Engineering.
[52] B. B. Zaidan,et al. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions , 2019, Comput. Stand. Interfaces.
[53] Tomoaki Ohtsuki,et al. Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[54] Tanja Hagemann,et al. Cryptocurrency Pump and Dump Schemes: Quantification and Detection , 2019, 2019 International Conference on Data Mining Workshops (ICDMW).
[55] Zibin Zheng,et al. Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum , 2019, IEEE Access.
[56] Venkata Sai Krishna Avinash Nukala. Website Cryptojacking Detection Using Machine Learning : IEEE CNS 20 Poster , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[57] Muhammad Asaad Cheema,et al. Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things , 2020, 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[58] Mohamed Ikbal Nacer,et al. Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain , 2020, Proceedings of the 2020 5th International Conference on Machine Learning Technologies.
[59] Chunhua Su,et al. Am I eclipsed? A smart detector of eclipse attacks for Ethereum , 2020, Comput. Secur..
[60] Dinh C. Nguyen,et al. Blockchain for 5G and Beyond Networks: A State of the Art Survey , 2019, J. Netw. Comput. Appl..
[61] Guiling Wang,et al. Blockchain-driven anomaly detection framework on edge intelligence , 2020, CCF Trans. Netw..
[62] D. Boughaci,et al. Enhancing the security of financial transactions in Blockchain by using machine learning techniques: towards a sophisticated security tool for banking and finance , 2020, 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH).
[63] Pronaya Bhattacharya,et al. KaRuNa: A Blockchain-Based Sentiment Analysis Framework for Fraud Cryptocurrency Schemes , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).
[64] Damiano Di Francesco Maesa,et al. Blockchain 3.0 applications survey , 2020, J. Parallel Distributed Comput..
[65] Romaric Ludinard,et al. Detecting Illicit Entities in Bitcoin using Supervised Learning of Ensemble Decision Trees , 2020, Proceedings of the 2020 10th International Conference on Information Communication and Management.
[66] Jin Yang,et al. Spam transaction attack detection model based on GRU and WGAN-div , 2020, Comput. Commun..
[67] Ibrahim Bounhas,et al. A Hybrid Approach for Fake News Detection in Twitter Based on User Features and Graph Embedding , 2020, ICDCIT.
[68] Guangyuan Liu,et al. Classification and Sharing Method of Malware Based on Threat Intelligence , 2020, 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[69] Hakim Ghazzai,et al. A Secure AI-Driven Architecture for Automated Insurance Systems: Fraud Detection and Risk Measurement , 2020, IEEE Access.
[70] Jianming Zhu,et al. Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract , 2020, BlockSys.
[71] Guy-Vincent Jourdan,et al. An Automatic Detection and Analysis of the Bitcoin Generator Scam , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[72] Ying Wang,et al. Construction of Audit Internal Control Intelligent System Based on Blockchain and Cloud Storage , 2020, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184).
[73] L. Chaari,et al. Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks , 2020, 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE).
[74] Keli Zhang,et al. Blockchain-based anomaly detection of electricity consumption in smart grids , 2020, Pattern Recognit. Lett..
[75] Helio N. Cunha Neto,et al. MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking , 2020, Ann. des Télécommunications.
[76] Mauro Conti,et al. Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel , 2020, IEEE Transactions on Information Forensics and Security.
[77] A. Rachedi,et al. Toward a Machine Learning and Software Defined Network Approaches to Manage Miners’ Reputation in Blockchain , 2020, Journal of Network and Systems Management.
[78] Abdullah M. Iliyasu,et al. A Secure Federated Learning Framework for 5G Networks , 2020, IEEE Wireless Communications.
[79] Nitesh Kumar,et al. Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning , 2020, CSCML.
[80] Massimo Guarascio,et al. Deep Autoencoder Ensembles for Anomaly Detection on Blockchain , 2020, ISMIS.
[81] Pan Zhou,et al. GuardHealth: Blockchain empowered secure data management and Graph Convolutional Network enabled anomaly detection in smart healthcare , 2020, J. Parallel Distributed Comput..
[82] A. Aman,et al. IoMT amid COVID-19 pandemic: Application, architecture, technology, and security , 2020, Journal of Network and Computer Applications.
[83] Hadis Karimipour,et al. Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis , 2020, Journal of Grid Computing.
[84] Shiping Chen,et al. Ponzi Contracts Detection Based on Improved Convolutional Neural Network , 2020, 2020 IEEE International Conference on Services Computing (SCC).
[85] A. Khatoon. A Blockchain-Based Smart Contract System for Healthcare Management , 2020, Electronics.
[86] Gautam Srivastava,et al. Cryptocurrency malware hunting: A deep Recurrent Neural Network approach , 2020, Appl. Soft Comput..
[87] Mohamed Ikbal Nacer,et al. Comparative Analysis Using Supervised Learning Methods for Anti-Money Laundering in Bitcoin , 2020, Proceedings of the 2020 5th International Conference on Machine Learning Technologies.
[88] Madihah Mohd Saudi,et al. Crytojacking Classification based on Machine Learning Algorithm , 2020, ICC 2020.
[89] Konstantinos Demertzis,et al. Anomaly detection via blockchained deep learning smart contracts in industry 4.0 , 2020, Neural Computing and Applications.
[90] Zihao Yuan,et al. Phishing Detection on Ethereum via Learning Representation of Transaction Subgraphs , 2020, BlockSys.
[91] Ali Dorri,et al. Securing Manufacturing Using Blockchain , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
[92] Guang Sun,et al. A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain , 2020, Computers, Materials & Continua.
[93] Lang Li,et al. Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification Algorithm , 2020, CSoNet.
[94] Marcos Leandro Hoffmann Souza,et al. A survey on decision-making based on system reliability in the context of Industry 4.0 , 2020 .
[95] Ken Miyachi,et al. Combating Health Care Fraud and Abuse: Conceptualization and Prototyping Study of a Blockchain Antifraud Framework , 2020, Journal of medical Internet research.
[96] Yih-Chun Hu,et al. Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning , 2020, Human-centric Computing and Information Sciences.
[97] Lei Pan,et al. Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network , 2020, NSS.
[98] Zibin Zheng,et al. Honeypot Contract Risk Warning on Ethereum Smart Contracts , 2020, 2020 IEEE International Conference on Joint Cloud Computing.
[99] Mohamed Amine Ferrag,et al. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.
[100] D. Byman. Understanding, and Misunderstanding, State Sponsorship of Terrorism , 2020, Studies in Conflict & Terrorism.
[101] Muhamed Turkanović,et al. A Brief Review of Database Solutions Used within Blockchain Platforms , 2020, BLOCKCHAIN.
[102] Anomaly Detection on Time-series Logs for Industrial Network , 2020, 2020 3rd International Conference on Smart BlockChain (SmartBlock).
[103] Janusz Kacprzyk,et al. Agri-food 4.0: A survey of the supply chains and technologies for the future agriculture , 2020, Comput. Ind..
[104] Frank Jiang,et al. A New Social User Anomaly Behavior Detection System Based on Blockchain and Smart Contract , 2020, 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC).
[105] Benjamin Turnbull,et al. A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks , 2020, IEEE Transactions on Industrial Informatics.
[106] Alberto Mozo,et al. Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning , 2020, IEEE Access.
[107] George Azzopardi,et al. Detection of illicit accounts over the Ethereum blockchain , 2020, Expert Syst. Appl..
[108] Guiling Wang,et al. Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing , 2020, ML4CS.
[109] Shaojing Fu,et al. Expose Your Mask: Smart Ponzi Schemes Detection on Blockchain , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).
[110] Olga Gadyatskaya,et al. Dissecting Android Cryptocurrency Miners , 2019, CODASPY.
[111] Zheng Yan,et al. Privacy preservation in permissionless blockchain: A survey , 2020, Digit. Commun. Networks.
[112] Ahmad Taher Azar,et al. Machine Learning with Blockchain for Secure E-voting System , 2020, 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH).
[113] LiuYang,et al. Phishing Scams Detection in Ethereum Transaction Network , 2020 .
[114] Shamik Sengupta,et al. BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City , 2020, 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[115] Rachit Agarwal,et al. Detecting malicious accounts in permissionless blockchains using temporal graph properties , 2020, Applied Network Science.
[116] Zhichao Lian,et al. A Blockchain-Enabled Multiple Object Tracking for Unmanned System With Deep Hash Appearance Feature , 2021, IEEE Access.
[117] Gautam Srivastava,et al. SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles , 2021, Comput. Networks.
[118] Shaojing Fu,et al. Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain , 2021, Inf. Process. Manag..
[119] Gautam Srivastava,et al. SS-ITS: secure scalable intelligent transportation systems , 2021, The Journal of Supercomputing.
[120] Wenjia Li,et al. AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology , 2021, IEEE Internet of Things Journal.
[121] Gautam Srivastava,et al. Privacy reinforcement learning for faults detection in the smart grid , 2021, Ad Hoc Networks.
[122] Alex Borges Vieira,et al. Fighting Under-price DoS Attack in Ethereum with Machine Learning Techniques , 2021, SIGMETRICS Perform. Evaluation Rev..
[123] K. Y. Abeywardhana,et al. Credit Card Fraud Prevention Using Blockchain , 2021, 2021 6th International Conference for Convergence in Technology (I2CT).
[124] Geguang Pu,et al. Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing , 2021, IEEE Transactions on Vehicular Technology.
[125] Zibin Zheng,et al. Analysis of Cryptocurrency Transactions from a Network Perspective: An Overview , 2020, J. Netw. Comput. Appl..
[126] Muhammad Alshurideh,et al. Combating Against Potentially Harmful Mobile Apps , 2021, AICV.
[127] Deepak Kumar Sharma,et al. Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions , 2020, Trans. Emerg. Telecommun. Technol..
[128] O. Ouchetto,et al. A Taxonomic Review of the Use of IoT and Blockchain in Healthcare Applications , 2021 .
[129] Limao Zhang,et al. Roles of artificial intelligence in construction engineering and management: A critical review and future trends , 2021 .
[130] B. D. Deebak,et al. Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements , 2021, J. Inf. Secur. Appl..
[131] Naoto Yanai,et al. Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts , 2021, BSCI.
[132] Roberto Di Pietro,et al. Cryptomining makes noise: Detecting cryptojacking via Machine Learning , 2021, Comput. Commun..
[133] Sha Fu,et al. Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec , 2021, IEEE Access.
[134] Madhuparna Bhowmik,et al. Comparative Study of Machine Learning Algorithms for Fraud Detection in Blockchain , 2021, 2021 5th International Conference on Computing Methodologies and Communication (ICCMC).
[135] Mingdong Tang,et al. Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems , 2021, IEEE Internet of Things Journal.
[136] S. Venkatesan,et al. A comprehensive survey on authentication and privacy-preserving schemes in VANETs , 2021, Comput. Sci. Rev..
[137] Ray Y. Zhong,et al. Industrial Blockchain: A state-of-the-art Survey , 2021, Robotics Comput. Integr. Manuf..
[138] Israa T. Aziz,et al. An Effective Lightweight Intrusion Detection System with Blockchain to Mitigate Attacks in SDN/NFV Enabled Cloud , 2021, 2021 6th International Conference for Convergence in Technology (I2CT).
[139] Ibrahim Khalil,et al. ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study , 2021, Inf. Process. Manag..
[140] David Novillo-Ortiz,et al. Technological progress in electronic health record system optimization: Systematic review of systematic literature reviews , 2021, Int. J. Medical Informatics.
[141] Kim-Kwang Raymond Choo,et al. Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions , 2021, J. Netw. Comput. Appl..
[142] Quoc-Dung Ngo,et al. IoT Botnet detection based on the integration of static and dynamic vector features , 2021, 2020 IEEE Eighth International Conference on Communications and Electronics (ICCE).
[143] Saru Kumari,et al. Supervised learning model for identifying illegal activities in Bitcoin , 2020, Appl. Intell..
[144] Evaldas Vaiciukynas,et al. Towards Blockchain-Based Federated Machine Learning: Smart Contract for Model Inference , 2021, Applied Sciences.
[145] Tianqing Zhu,et al. Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things , 2021, Future Gener. Comput. Syst..
[146] Fred Morstatter,et al. Identifying and Analyzing Cryptocurrency Manipulations in Social Media , 2021, IEEE Transactions on Computational Social Systems.
[147] Mahinder Pal Singh Bhatia,et al. Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications , 2021, Int. J. Digit. Crime Forensics.
[148] Murat Kantarcioglu,et al. BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture , 2020, CODASPY.
[149] Kalpesh Kapoor,et al. Design and Validation of BlockEval, A Blockchain Simulator , 2021, 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).
[150] Ashutosh Bhatia,et al. Bitcoin Data Analytics: Scalable techniques for transaction clustering and embedding generation , 2021, 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).
[151] Mohammad Nauman,et al. Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models , 2020, Expert Syst. J. Knowl. Eng..
[152] Sourav Sengupta,et al. Temporal Analysis of the Entire Ethereum Blockchain Network , 2021, WWW.
[153] Hangbae Chang,et al. Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT , 2021, IEEE Access.
[154] Benjamin Turnbull,et al. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.
[155] Xiaoming Huang,et al. Transaction-based classification and detection approach for Ethereum smart contract , 2021, Inf. Process. Manag..
[156] Ruochen Jin,et al. Blockchain-Based Data Collection With Efficient Anomaly Detection for Estimating Battery State-of-Health , 2021, IEEE Sensors Journal.
[157] Zibin Zheng,et al. Transaction-Based Hidden Strategies against General Phishing Detection Framework on Ethereum , 2021, 2021 IEEE International Symposium on Circuits and Systems (ISCAS).
[158] Praveen Kumar Reddy Maddikunta,et al. A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions , 2020, Future Gener. Comput. Syst..
[159] BlockFLA , Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy.