{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:41:22Z","timestamp":1761000082412,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535422"},{"type":"electronic","value":"9789819535439"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3543-9_4","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T11:03:39Z","timestamp":1760871819000},"page":"60-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RADIAL: Robust Adversarial Discrepancy-Aware Framework for\u00a0Early Detection of\u00a0Illicit Cryptocurrency Accounts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0259-8135","authenticated-orcid":false,"given":"Kombou","family":"Victor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2245-2588","authenticated-orcid":false,"given":"Qi","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7014-6417","authenticated-orcid":false,"given":"Jianbin","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-666X","authenticated-orcid":false,"given":"Hu","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9533-2458","authenticated-orcid":false,"given":"Kuiche Sop Brinda","family":"Leaticia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1905-4509","authenticated-orcid":false,"given":"Anto Leoba","family":"Jonathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ding, Z., Shi, J., Li, Q., Cao, J.: Effective illicit account detection on large cryptocurrency MultiGraphs. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, pp. 457\u2013466 (2024)","DOI":"10.1145\/3627673.3679707"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1109\/TIFS.2023.3346276","volume":"19","author":"J Wu","year":"2023","unstructured":"Wu, J., Lin, D., Fu, Q., Yang, S., Chen, T., Zheng, Z., Song, B.: Toward understanding asset flows in crypto money laundering through the lenses of Ethereum heists. IEEE Trans. Inf. Forensics Secur. 19, 1994\u20132009 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Hu, X., et al.: Piecing together the jigsaw puzzle of transactions on heterogeneous blockchain networks. Proc. ACM Measur. Anal. Comput. Syst. 8(3), 1\u201327 (2024)","DOI":"10.1145\/3700424"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Sui, H., Sun, X., Ge, C., Zhou, L., Susilo, W.: GrabPhisher: phishing scams detection in ethereum via temporally evolving GNNs. IEEE Trans. Serv. Comput. (2024)","DOI":"10.1109\/TSC.2024.3411449"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1109\/TIFS.2024.3359000","volume":"19","author":"J Liu","year":"2024","unstructured":"Liu, J., Chen, J., Wu, J., Wu, Z., Fang, J., Zheng, Z.: Fishing for fraudsters: uncovering ethereum phishing gangs with blockchain data. IEEE Trans. Inf. Forensics Secur. 19, 3038\u20133050 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3676164","volume":"56","author":"W Liang","year":"2024","unstructured":"Liang, W., Liu, Y., Yang, C., Xie, S., Li, K., Susilo, W.: On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: a comprehensive survey. ACM Comput. Surv. 56(12), 1\u201335 (2024)","journal-title":"ACM Comput. Surv."},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-75762-5_3","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"F Poursafaei","year":"2021","unstructured":"Poursafaei, F., Rabbany, R., Zilic, Z.: SigTran: signature vectors for detecting illicit activities in blockchain transaction networks. In: Karlapalem, K., et al. (eds.) PAKDD 2021. LNCS (LNAI), vol. 12712, pp. 27\u201339. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75762-5_3"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Ghosh, M., Ghosh, D., Halder, R., Chandra, J.: Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection. Blockchain Res. Appl. 4(4), 100153 (2023)","DOI":"10.1016\/j.bcra.2023.100153"},{"issue":"20","key":"4_CR9","doi-asserted-by":"publisher","first-page":"58449","DOI":"10.1007\/s11042-023-17323-4","volume":"83","author":"I Alarab","year":"2024","unstructured":"Alarab, I., Prakoonwit, S.: Robust recurrent graph convolutional network approach based sequential prediction of illicit transactions in cryptocurrencies. Multimedia Tools Appl. 83(20), 58449\u201358464 (2024)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3626102","volume":"18","author":"L Cheng","year":"2023","unstructured":"Cheng, L., Zhu, F., Wang, Y., Liang, R., Liu, H.: From asset flow to status, action, and intention discovery: early malice detection in cryptocurrency. ACM Trans. Knowl. Discov. Data 18(3), 1\u201327 (2023)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TDSC.2022.3152937","volume":"20","author":"W Fan","year":"2022","unstructured":"Fan, W., et al.: Lightweight and identifier-oblivious engine for cryptocurrency networking anomaly detection. IEEE Trans. Dependable Secure Comput. 20(2), 1302\u20131318 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"4946","DOI":"10.1109\/TDSC.2023.3238412","volume":"20","author":"A Wahrst\u00e4tter","year":"2023","unstructured":"Wahrst\u00e4tter, A., Gomes, J., Khan, S., Svetinovic, D.: Improving cryptocurrency crime detection: coinjoin community detection approach. IEEE Trans. Dependable Secure Comput. 20(6), 4946\u20134956 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-15-9213-3_8","volume-title":"Blockchain and Trustworthy Systems","author":"Y Li","year":"2020","unstructured":"Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99\u2013111. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9213-3_8"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/TCSS.2022.3231687","volume":"11","author":"F Zhou","year":"2023","unstructured":"Zhou, F., et al.: Visual analysis of money laundering in cryptocurrency exchange. IEEE Trans. Comput. Soc. Syst. 11(1), 731\u2013745 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Song, J., Zhang, S., Zhang, P., Park, J., Gu, Y., Yu, G.: Illicit social accounts? Anti-money laundering for transactional blockchains. IEEE Trans. Inf. Forensics Secur. (2024)","DOI":"10.1109\/TIFS.2024.3518068"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1109\/TNSE.2024.3355089","volume":"11","author":"H Sun","year":"2024","unstructured":"Sun, H., Liu, Z., Wang, S., Wang, H.: Adaptive attention-based graph representation learning to detect phishing accounts on the ethereum blockchain. IEEE Trans. Netw. Sci. Eng. 11(3), 2963\u20132975 (2024)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1038\/s41598-024-51578-7","volume":"14","author":"K Venkatesan","year":"2024","unstructured":"Venkatesan, K., Rahayu, S.B.: Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques. Sci. Rep. 14(1), 1149 (2024)","journal-title":"Sci. Rep."},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/JIOT.2020.3006896","volume":"8","author":"J Yun","year":"2020","unstructured":"Yun, J., Goh, Y., Chung, J.M.: DQN-based optimization framework for secure sharded blockchain systems. IEEE Internet Things J. 8(2), 708\u2013722 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"4_CR19","doi-asserted-by":"publisher","first-page":"5992","DOI":"10.1109\/TCOMM.2023.3288591","volume":"71","author":"Y Lin","year":"2023","unstructured":"Lin, Y., et al.: DRL-based adaptive sharding for blockchain-based federated learning. IEEE Trans. Commun. 71(10), 5992\u20136004 (2023)","journal-title":"IEEE Trans. Commun."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Y., Xu, Z., Cao, J., Wang, R., Yuan, Y., Cheng, G.: TorHunter: a lightweight method for efficient identification of obfuscated tor traffic through unsupervised pre-training. In: International Conference on Information and Communications Security, pp. 3\u201323. Springer (2024)","DOI":"10.1007\/978-981-97-8801-9_1"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Cui, B., Liu, S.: TSR-jack: an in-browser crypto-jacking detection method based on time series representation learning. In: International Conference on Information and Communications Security, pp. 273\u2013288. Springer (2024)","DOI":"10.1007\/978-981-97-8801-9_14"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3543-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:03:29Z","timestamp":1760997809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3543-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535422","9789819535439"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3543-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}