{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:19:05Z","timestamp":1743049145932,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031182822"},{"type":"electronic","value":"9783031182839"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_36","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"705-724","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Empirical Study of\u00a0Two Bitcoin Artifacts Through Deep Learning"],"prefix":"10.1007","author":[{"given":"Richard","family":"Tindell","sequence":"first","affiliation":[]},{"given":"Alex","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Sprague","sequence":"additional","affiliation":[]},{"given":"Xunhua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"36_CR1","unstructured":"Abadi, M.: TensorFlow: a system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201916), pp. 265\u2013283 (2016)"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Abuhamad, M., AbuHmed, T., Mohaisen, A., Nyang, D.: Large-scale and language-oblivious code authorship identification. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918), pp. 101\u2013114 (2018)","DOI":"10.1145\/3243734.3243738"},{"key":"36_CR3","unstructured":"Back, A.: Hashcash - a denial of service counter-measure (2002). http:\/\/www.hashcash.org\/papers\/hashcash.pdf"},{"key":"36_CR4","unstructured":"bit(bit@ungeared.com). The strange story of Satoshi Nakamoto\u2019s spelling choices, 31 Dec 2020. https:\/\/ungeared.com\/the-strange-story-of-satoshi-nakamotos-spelling-choices-part-1\/"},{"key":"36_CR5","unstructured":"bit(bit@ungeared.com). Satoshi Nakamoto\u2019s spelling paradox solved: everything was by design, 11 Jan 2021. https:\/\/ungeared.com\/satoshi-nakamotos-spelling-paradox-solved-everything-was-by-design\/"},{"key":"36_CR6","unstructured":"bit(bit@ungeared.com). Authorship dispute resolution method applied to uncover Satoshi Nakamoto, 18 Jan 2021. https:\/\/ungeared.com\/authorship-dispute-resolution-method-applied-to-uncover-satoshi-nakamoto\/"},{"key":"36_CR7","unstructured":"Caliskan-Islam, A., et al.: De-anonymizing programmers via code stylometry. In: Proceedings of the 24th USENIX Security Symposium, pp. 255\u2013270(August), pp. 12\u201314, 2015. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/caliskan-islam"},{"key":"36_CR8","unstructured":"Certicom Research. Sec 2: Recommended elliptic curve domain parameters version 2.0. Standards for Efficient Cryptography, 27 Jan 2010. http:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"36_CR9","unstructured":"Chollet, F.: Deep Learning with Python. Manning (2017). ISBN 9781617294433"},{"key":"36_CR10","unstructured":"Chon, M.: Stylometric analysis: Satoshi Nakamoto, 26 Dec 2017. https:\/\/towardsdatascience.com\/stylometric-analysis-satoshi-nakamoto-294926cdf995"},{"key":"36_CR11","unstructured":"Dai, W.: b-money (1998). http:\/\/www.weidai.com\/bmoney.txt"},{"key":"36_CR12","unstructured":"Finney, H.: Digital cash & privacy, 19 Aug 1993. http:\/\/fennetic.net\/irc\/finney.org\/ hal\/dig_cash_priv.html"},{"key":"36_CR13","unstructured":"Finney, H.: Detecting double spending, 15 Oct 1993. https:\/\/nakamotoinstitute.org\/detecting-double-spending\/"},{"key":"36_CR14","unstructured":"Finney, H.: PGP web of trust misconceptions, 30 Mar 1994. http:\/\/fennetic.net\/irc\/finney.org\/hal\/web_of_trust.html"},{"key":"36_CR15","unstructured":"Finney, H.: RPOW - reusable proofs of work, 15 Aug 2004. https:\/\/cryptome.org\/rpow.htm"},{"key":"36_CR16","unstructured":"Finney, H.: Dying outside, 4th Oct 2009. https:\/\/www.lesswrong.com\/posts\/bshZiaLefDejvPKuS\/dying-outside"},{"key":"36_CR17","unstructured":"Finney, H.: Bitcoin and me, 19 March 2013. https:\/\/bitcointalk.org\/index.php?topic=155054.0"},{"key":"36_CR18","unstructured":"Geng, C., Huang, S.J., Chen, S.: Recent advances in open set recognition: a survey. In: IEEE transactions on pattern analysis and machine intelligence, Mar 18 (2020)"},{"key":"36_CR19","unstructured":"Goodman, L.: The face behind bitcoin. Newsweek, 6 March 2014. http:\/\/www.newsweek.com\/2014\/03\/14\/face-behind-bitcoin-247957.html"},{"key":"36_CR20","unstructured":"Google. Google code jam. https:\/\/codingcompetitions.withgoogle.com\/codejam"},{"key":"36_CR21","unstructured":"Google. TensorFlow: an end-to-end open source machine learning platform. https:\/\/www.tensorflow.org\/"},{"key":"36_CR22","unstructured":"Gray, A., Sallis, P., MacDonell, S.: IDENTIFIED (integrated dictionary-based extraction of non-language dependent token information for forensic identification, examination, and discrimination): a dictionary-based system for extracting source code metrics for software forensics. In Proceedings of the 1998 International Conference Software Engineering: Education and Practice, 29 Jan 1998"},{"key":"36_CR23","unstructured":"Grey, S.: Satoshi Nakamoto is (probably) Nick Szabo, 1 Dec 2013. https:\/\/likeinamirror.wordpress.com\/2013\/12\/01\/satoshi-nakamoto-is-probably-nick-szabo\/"},{"key":"36_CR24","unstructured":"Hubbs, C.: Can machine learning unmask Satoshi Nakamoto? Sept 2017. https:\/\/www.datahubbs.com\/can-machine-learning-unmask-satoshi-nakamoto\/"},{"key":"36_CR25","unstructured":"Kaminsky, D.: Validating Satoshi (or not), 2 May 2016. https:\/\/dankaminsky.com\/2016\/05\/02\/validating-satoshi-or-not\/"},{"key":"36_CR26","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436\u2013444 (2015)","journal-title":"Nature"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Robert, A., Matthews, J., Thomas, V., Merriam, N.: Neural omputation in stylometry I: an application to the works of shakespeare and fletcher. Literary and Linguistic Computing, 8 (4), 203\u2013209 (1993)","DOI":"10.1093\/llc\/8.4.203"},{"issue":"1","key":"36_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/llc\/9.1.1","volume":"9","author":"V Thomas","year":"1994","unstructured":"Thomas, V., Merriam, N., Robert, A., Matthews, J.: Neural computation in stylometry II: An application to the works of shakespeare and marlowe merriam. Literary Linguist. Comput. 9(1), 1\u20136 (1994)","journal-title":"Literary Linguist. Comput."},{"key":"36_CR29","unstructured":"michael@bitstein.org. The complete Satoshi. https:\/\/satoshi.nakamotoinstitute.org\/"},{"key":"36_CR30","doi-asserted-by":"publisher","unstructured":"Mosteller, F., Wallace D.L.: Applied Bayesian and classical inference: the case of the federalist papers. Springer, New York (1984). https:\/\/doi.org\/10.1007\/978-1-4612-5256-6","DOI":"10.1007\/978-1-4612-5256-6"},{"key":"#cr-split#-36_CR31.1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. First released to the cryptography mailing list on October 31, 2008 at https:\/\/www.metzdowd.com\/pipermail\/cryptography\/2008-October\/014810.html"},{"key":"#cr-split#-36_CR31.2","unstructured":"however, the commonly seen PDF file carries a creation timestamp of March 24, 2009, (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"36_CR32","unstructured":"Nakamoto, S.: I am not Dorian Nakamoto, 7 March 2014. http:\/\/p2pfoundation.ning.com\/forum\/topics\/bitcoin-open-source?commentId=2003008"},{"key":"36_CR33","unstructured":"National Institute of Standards and Technology. Secure hash standard (SHS). FIPS PUB 180\u20134, March 2012. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf"},{"key":"36_CR34","unstructured":"National Institute of Standards and Technology. Digital signature standard (DSS). FIPS PUB 186\u20134 July 2013. http:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf"},{"issue":"5","key":"36_CR35","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1145\/78607.78611","volume":"33","author":"PW Oman","year":"1990","unstructured":"Oman, P.W., Cook, C.R.: Typographic style is more than cosmetic. Commun. ACM 33(5), 506\u2013519 (1990)","journal-title":"Commun. ACM"},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014). http:\/\/www.aclweb.org\/anthology\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"36_CR37","unstructured":"Protos. Finney \u2019most likely\u2019 bitcoin\u2019s Nakamoto, say researchers, 18 Jan 2021. https:\/\/protos.com\/bitcoin-creator-satoshi-nakamoto-candidates-analysis-hal-finney\/"},{"key":"36_CR38","unstructured":"Quiring, E., Maier, A., Rieck, K.: Misleading authorship attribution of source code using adversarial learning. In: Proceedings of the 28th USENIX Security Symposium, August 14\u201316 2019. https:\/\/www.usenix.org\/system\/files\/sec19-quiring.pdf"},{"key":"36_CR39","unstructured":"Ramesh, V., Watson, J.L.: Shakespeare and Satoshi - de-anonymizing writing using BiLSTMs with attention, 31 Dec 2018. https:\/\/web.stanford.edu\/class\/archive\/cs\/cs224n\/cs224n.1184\/reports\/6858026.pdf"},{"key":"36_CR40","unstructured":"The Economist. Craig Wright reveals himself as Satoshi Nakamoto. The Economist, 2nd May 2016. https:\/\/www.economist.com\/briefing\/2016\/05\/02\/craig-wright-reveals-himself-as-satoshi-nakamoto"},{"key":"36_CR41","unstructured":"The U.S. Copyright Office. Questions about certain bitcoin registrations, 22 May 2019. https:\/\/www.copyright.gov\/press-media-info\/press-updates.html"},{"key":"36_CR42","unstructured":"Watson, T.: A fascinating discovery uncovers Satoshi Nakamoto\u2019s identity, 26 May 2021. https:\/\/zycrypto.com\/exclusive-a-fascinating-discovery-uncovers-satoshi-nakamotos-identity\/"},{"key":"36_CR43","unstructured":"Wright, C.: Jean-Paul Sartre, signing and significance, 02 May 2016. https:\/\/craigwright.net\/blog\/math\/jean-paul-sartre-signing-and-significance\/"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:29:13Z","timestamp":1666384153000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}