{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T08:26:26Z","timestamp":1768724786050,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811679926","type":"print"},{"value":"9789811679933","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7993-3_1","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T17:18:47Z","timestamp":1638465527000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Identity Inference on Blockchain Using Graph Neural Network"],"prefix":"10.1007","author":[{"given":"Jie","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jiajun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yunyi","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Shanqing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-662-47854-7_4","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2015","unstructured":"Vasek, M., Moore, T.: There\u2019s no free lunch, even using bitcoin: tracking the popularity and profits of virtual currency scams. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 44\u201361. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47854-7_4"},{"key":"1_CR2","unstructured":"Wu, J., Lin, D., Zheng, Z., Yuan, Q.: T-edge: temporal weighted multidigraph embedding for ethereum transaction network analysis. arXiv preprint arXiv:1905.08038 (2019)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting ponzi schemes on ethereum: towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp. 1409\u20131418 (2018)","DOI":"10.1145\/3178876.3186046"},{"key":"1_CR4","first-page":"441","volume":"89","author":"D Bryans","year":"2014","unstructured":"Bryans, D.: Bitcoin and money laundering: mining for an effective solution. Ind. LJ 89, 441 (2014)","journal-title":"Ind. LJ"},{"key":"1_CR5","unstructured":"Fanusie, Y., Robinson, T.: Bitcoin laundering: an analysis of illicit flows into digital currency services. Center on Sanctions and Illicit Finance memorandum, January 2018"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392155","volume":"4","author":"Y Huang","year":"2020","unstructured":"Huang, Y., et al.: Understanding (mis) behavior on the eosio blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2), 1\u201328 (2020)","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.osnem.2017.10.006","volume":"3","author":"D Di Francesco","year":"2017","unstructured":"Di Francesco, D., Maesa, A.M., Ricci, L.: Detecting artificial behaviours in the bitcoin users graph. Online Soc. Networks Media 3, 63\u201374 (2017)","journal-title":"Online Soc. Networks Media"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor, D., P\u00f3sfai, M., Csabai, I., Vattay, G.: Do the rich get richer? an empirical analysis of the bitcoin transaction network. PloS One 9(2), e86197 (2014)","journal-title":"PloS One"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TSMC.2018.2883678","volume":"50","author":"I Alqassem","year":"2018","unstructured":"Alqassem, I., Rahwan, I., Svetinovic, D.: The anti-social system properties: bitcoin network data analysis. IEEE Trans. Syst. Man Cybern. Syst. 50(1), 21\u201331 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Tasca, P., Hayes, A., Liu, S.: The evolution of the bitcoin economy: extracting and analyzing the network of payment relationships. J. Risk Financ. (2018)","DOI":"10.1108\/JRF-03-2017-0059"},{"key":"1_CR11","unstructured":"Bai, Q., Zhang, C., Xu, Y., Chen, X., Wang, X.: Evolution of ethereum: a temporal graph perspective. arXiv preprint arXiv:2001.05251 (2020)"},{"issue":"12","key":"1_CR12","volume":"32","author":"S Ferretti","year":"2020","unstructured":"Ferretti, S., D\u2019Angelo, G.: On the ethereum blockchain structure: a complex networks theory perspective. Concurrency Comput. Practice Exp. 32(12), e5493 (2020)","journal-title":"Concurrency Comput. Practice Exp."},{"issue":"19","key":"1_CR13","doi-asserted-by":"publisher","first-page":"20099","DOI":"10.1007\/s11042-017-4396-4","volume":"76","author":"B Huang","year":"2017","unstructured":"Huang, B., Liu, Z., Chen, J., Liu, A., Liu, Q., He, Q.: Behavior pattern clustering in blockchain networks. Multimed. Tools Appl. 76(19), 20099\u201320110 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4396-4","journal-title":"Multimed. Tools Appl."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-319-70278-0_16","volume-title":"Financial Cryptography and Data Security","author":"S Ranshous","year":"2017","unstructured":"Ranshous, S., et al.: Exchange pattern mining in the bitcoin transaction directed hypergraph. In: Brenner, M. (ed.) FC 2017. LNCS, vol. 10323, pp. 248\u2013263. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_16"},{"key":"1_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-981-15-9213-3_14","volume-title":"Blockchain and Trustworthy Systems","author":"Z Yuan","year":"2020","unstructured":"Yuan, Z., Yuan, Q., Wu, J.: Phishing detection on ethereum via learning representation of transaction subgraphs. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 178\u2013191. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9213-3_14"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Yuan, Q., Huang, B., Zhang, J., Wu, J., Zhang, H., Zhang, X.: Detecting phishing scams on ethereum based on transaction records. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/ISCAS45731.2020.9180815"},{"key":"1_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-15-9213-3_8","volume-title":"Blockchain and Trustworthy Systems","author":"Y Li","year":"2020","unstructured":"Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99\u2013111. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9213-3_8"},{"key":"1_CR18","unstructured":"Pham, T., Lee, S.: Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 (2016)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Wu, J., et al.: Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Trans. Syst. Man Cybern. Syst. (2020)","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Wu, J., Liu, J., Chen, W., Huang, H., Zheng, Z., Zhang, Y.: Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Trans. Syst. Man Cybern. Syst. (2021)","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"1_CR21","unstructured":"Tam, D.S.H., Lau, W.C., Hu, B., Ying, Q.F., Chiu, D.M., Liu, H.: Identifying illicit accounts in large scale e-payment networks-a graph representation learning approach. arXiv preprint arXiv:1906.05546 (2019)"},{"key":"1_CR22","unstructured":"Weber, M., et al.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Lin, Y.-J., Wu, P.-W., Hsu, C.-H., Tu, I.-P., Liao, S.: An evaluation of bitcoin address classification based on transaction history summarization. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 302\u2013310. IEEE (2019)","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"key":"1_CR25","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: graph2vec: learning distributed representations of graphs. arXiv preprint arXiv:1707.05005 (2017)"},{"key":"1_CR26","unstructured":"Xuan, Q., et al.: Subgraph networks with application to structural feature space expansion. IEEE Trans. Knowl. Data Eng. (2019)"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398071","volume":"21","author":"L Chen","year":"2020","unstructured":"Chen, L., Peng, J., Liu, Y., Li, J., Xie, F., Zheng, Z.: Phishing scams detection in ethereum transaction network. ACM Trans. Internet Technol. (TOIT) 21(1), 1\u201316 (2020)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"1_CR28","first-page":"3146","volume":"30","author":"G Ke","year":"2017","unstructured":"Ke, G., et al.: Lightgbm: a highly efficient gradient boosting decision tree. Adv. Neural Inf. Process. Syst. 30, 3146\u20133154 (2017)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Phetsouvanh, S., Oggier, F., Datta, A.: Egret: extortion graph exploration techniques in the bitcoin network. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 244\u2013251. IEEE (2018)","DOI":"10.1109\/ICDMW.2018.00043"},{"key":"1_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101829","volume":"110","author":"R Zhang","year":"2020","unstructured":"Zhang, R., Zhang, G., Liu, L., Wang, C., Wan, S.: Anomaly detection in bitcoin information networks with multi-constrained meta path. J. Syst. Archit. 110, 101829 (2020)","journal-title":"J. Syst. Archit."},{"key":"1_CR31","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"1_CR32","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: International Conference on Learning Representations (2018). Accepted as poster"},{"key":"1_CR33","unstructured":"Gilmer, J., Schoenholz, S.S., Riley, P.F., Vinyals, O., Dahl, G.E.: Neural message passing for quantum chemistry. In: International Conference on Machine Learning, pp. 1263\u20131272. PMLR (2017)"},{"key":"1_CR34","unstructured":"de Lara, N., Pineau, E.: A simple baseline algorithm for graph classification. arXiv preprint arXiv:1810.09155 (2018)"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Tsitsulin, A., Mottin, D., Karras, P., Bronstein, A., M\u00fcller, E.: Netlsd: hearing the shape of a graph. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2347\u20132356 (2018)","DOI":"10.1145\/3219819.3219991"},{"key":"1_CR36","unstructured":"Verma, S., Zhang, Z.-L.: Hunt for the unique, stable, sparse and fast feature learning on graphs. In: NIPS, pp. 88\u201398 (2017)"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7993-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T17:27:13Z","timestamp":1638466033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7993-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811679926","9789811679933"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7993-3_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}