A New Bitcoin Address Association Method Using a Two-Level Learner Model
暂无分享,去创建一个
Yulei Wu | Jingguo Ge | Zhongjiang Yao | Tengyu Liu | Bowei Dai | Liangxiong Li | Jifei Wen | Hongbin Shi | Yulei Wu | Bo Dai | Jingguo Ge | Hongbin Shi | Liangxiong Li | Zhongjiang Yao | Tengyu Liu | Jifei Wen
[1] Agus Widodo,et al. Revenue Prediction Using Artificial Neural Network , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[2] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[3] Souradyuti Paul,et al. A New Approach to Deanonymization of Unreachable Bitcoin Nodes , 2018, IACR Cryptol. ePrint Arch..
[4] Günter Müller,et al. Economic Analysis of Cryptocurrency Backed Money Laundering , 2015, ECIS.
[5] Adam Doupé,et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[6] Tie-Yan Liu,et al. LightGBM: A Highly Efficient Gradient Boosting Decision Tree , 2017, NIPS.
[7] Zibin Zheng,et al. Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[8] Meng Yang,et al. Large-Margin Softmax Loss for Convolutional Neural Networks , 2016, ICML.
[9] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[10] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[11] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[12] Massimo Bartoletti,et al. Data Mining for Detecting Bitcoin Ponzi Schemes , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[13] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[14] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[15] Jonas David Nick,et al. Data-Driven De-Anonymization in Bitcoin , 2015 .
[16] Wei Shao,et al. Identifying Bitcoin Users Using Deep Neural Network , 2018, ICA3PP.
[17] Adi Shamir,et al. How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? , 2014, Financial Cryptography Workshops.
[18] Jacob Benesty,et al. Pearson Correlation Coefficient , 2009 .
[19] H. B. Barlow,et al. Unsupervised Learning , 1989, Neural Computation.
[20] Jianping Yu,et al. Research on Anonymization and De-anonymization in the Bitcoin System , 2015, ArXiv.
[21] Maxim Panov,et al. Automatic Bitcoin Address Clustering , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[22] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[23] Sylvain Arlot,et al. A survey of cross-validation procedures for model selection , 2009, 0907.4728.
[24] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[25] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.