{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:28Z","timestamp":1772906368798,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811527760","type":"print"},{"value":"9789811527777","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_42","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"520-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods"],"prefix":"10.1007","author":[{"given":"Chaehyeon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sajan","family":"Maharjan","sequence":"additional","affiliation":[]},{"given":"Kyungchan","family":"Ko","sequence":"additional","affiliation":[]},{"given":"James Won-Ki","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"42_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"42_CR2","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Harvey, C.R.: Bitcoin myths and facts (2014)","DOI":"10.2139\/ssrn.2479670"},{"key":"42_CR4","unstructured":"https:\/\/www.chainalysis.com\/"},{"issue":"1","key":"42_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote. Sens. 26(1), 217\u2013222 (2005)","journal-title":"Int. J. Remote. Sens."},{"key":"42_CR6","volume-title":"Introduction to Artificial Neural Systems","author":"JM Zurada","year":"1992","unstructured":"Zurada, J.M.: Introduction to Artificial Neural Systems, vol. 8. West Publishing Company, St. Paul (1992)"},{"key":"42_CR7","unstructured":"Zambre, D., Shah, A.: Analysis of Bitcoin network dataset for fraud. Unpublished Report (2013)"},{"issue":"1","key":"42_CR8","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100\u2013108 (1979)","journal-title":"J. R. Stat. Soc. Ser. C (Appl. Stat.)"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Identification of high yielding investment programs in Bitcoin via transactions pattern analysis. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, pp. 1\u20136 (2017)","DOI":"10.1109\/GLOCOM.2017.8254420"},{"key":"42_CR10","unstructured":"https:\/\/www.blockchain.com\/ko\/explorer"},{"key":"42_CR11","unstructured":"https:\/\/www.walletexplorer.com\/"},{"key":"42_CR12","unstructured":"https:\/\/www.blockchain.com\/btc\/address\/1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX?offset=0&filter=6"},{"key":"42_CR13","unstructured":"https:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/doc\/"},{"key":"42_CR14","unstructured":"Bitcoin core. https:\/\/bitcoin.org\/en\/bitcoin-core"},{"key":"42_CR15","unstructured":"Btcoin core json apis. http:\/\/chainquery.com\/bitcoin-api"},{"key":"42_CR16","unstructured":"https:\/\/scikit-learn.org\/stable\/"},{"key":"42_CR17","unstructured":"https:\/\/www.tensorflow.org\/?hl=en"},{"key":"42_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-31865-1_25","volume-title":"Advances in Information Retrieval","author":"C Goutte","year":"2005","unstructured":"Goutte, C., Gaussier, E.: A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: Losada, D.E., Fern\u00e1ndez-Luna, J.M. (eds.) ECIR 2005. LNCS, vol. 3408, pp. 345\u2013359. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31865-1_25"},{"issue":"2","key":"42_CR19","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.1467-9868.2005.00503.x","volume":"67","author":"H Zou","year":"2005","unstructured":"Zou, H., Hastie, T.: Regularization and variable selection via the elastic net. J. R. Stat. Soc. Ser. B (Stat. Methodol.) 67(2), 301\u2013320 (2005)","journal-title":"J. R. Stat. Soc. Ser. B (Stat. Methodol.)"},{"issue":"1","key":"42_CR20","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T22:09:32Z","timestamp":1630102172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}