{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:12:48Z","timestamp":1777633968531,"version":"3.51.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001852","name":"Indo-French Centre for the Promotion of Advanced Research","doi-asserted-by":"publisher","award":["IFC\/4132\/RCF 2019\/716"],"award-info":[{"award-number":["IFC\/4132\/RCF 2019\/716"]}],"id":[{"id":"10.13039\/501100001852","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10489-020-02048-w","type":"journal-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T03:54:47Z","timestamp":1605844487000},"page":"3824-3843","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["Supervised learning model for identifying illegal activities in Bitcoin"],"prefix":"10.1007","volume":"51","author":[{"given":"Pranav","family":"Nerurkar","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Bhirud","sequence":"additional","affiliation":[]},{"given":"Dhiren","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Romaric","family":"Ludinard","sequence":"additional","affiliation":[]},{"given":"Yann","family":"Busnel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-5383","authenticated-orcid":false,"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"key":"2048_CR1","doi-asserted-by":"publisher","unstructured":"Aiolli F, Conti M, Gangwal A, Polato M (2019) Mind your wallet\u2019s privacy: Identifying bitcoin wallet apps and user\u2019s actions through network traffic analysis. https:\/\/doi.org\/10.1145\/3297280.3297430","DOI":"10.1145\/3297280.3297430"},{"key":"2048_CR2","doi-asserted-by":"crossref","unstructured":"Akcora CG, Li Y, Gel YR, Kantarcioglu M (2019) Bitcoinheist: Topological data analysis for ransomware detection on the bitcoin blockchain. 1906.07852","DOI":"10.24963\/ijcai.2020\/612"},{"key":"2048_CR3","unstructured":"Alqassem I, Rahwan I, Svetinovic D (2018) The anti-social system properties: Bitcoin network data analysis. IEEE Trans Syst Man Cybern Syst"},{"key":"2048_CR4","doi-asserted-by":"crossref","unstructured":"Bartoletti M, Pes B, Serusi S (2018) Data mining for detecting bitcoin ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp 75\u201384","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"2048_CR5","doi-asserted-by":"crossref","unstructured":"Bistarelli S, Mercanti I, Santini F (2018) A suite of tools for the forensic analysis of bitcoin transactions: Preliminary report. In: European conference on parallel processing, Springer, pp 329\u2013341","DOI":"10.1007\/978-3-030-10549-5_26"},{"key":"2048_CR6","doi-asserted-by":"crossref","unstructured":"Bogner A (2017) Seeing is understanding: anomaly detection in blockchains with visualized features. In: Proceedings of the 2017 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2017 ACM international symposium on wearable computers, pp 5\u20138","DOI":"10.1145\/3123024.3123157"},{"key":"2048_CR7","doi-asserted-by":"crossref","unstructured":"Bohannon J (2016) The bitcoin busts","DOI":"10.1126\/science.351.6278.1144"},{"issue":"2","key":"2048_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1257\/jep.29.2.213","volume":"29","author":"R B\u00f6hme","year":"2015","unstructured":"B\u00f6hme R, Christin N, Edelman B, Moore T (2015) Bitcoin: economics, technology, and governance. J Econ Perspect 29(2): 213\u201338","journal-title":"J Econ Perspect"},{"key":"2048_CR9","doi-asserted-by":"crossref","unstructured":"Bonneau J, Narayanan A, Miller A, Clark J, Kroll JA, Felten EW (2014) Mixcoin: Anonymity for bitcoin with accountable mixes. In: International Conference on financial cryptography and data security. Springer, pp 486\u2013504","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"2048_CR10","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, association for computing machinery, New York, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"issue":"4","key":"2048_CR11","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti M, Kumar E S, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tutorials 20(4):3416\u20133452","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2048_CR12","doi-asserted-by":"crossref","unstructured":"Ermilov D, Panov M, Yanovich Y (2017) Automatic bitcoin address clustering. In: 2017 16Th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 461\u2013466","DOI":"10.1109\/ICMLA.2017.0-118"},{"issue":"5","key":"2048_CR13","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1093\/rfs\/hhz015","volume":"32","author":"S Foley","year":"2019","unstructured":"Foley S, Karlsen J R, Putnin\u0307\u0161 TJ (2019) Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?. Rev Financ Stud 32(5):1798\u20131853","journal-title":"Rev Financ Stud"},{"key":"2048_CR14","doi-asserted-by":"crossref","unstructured":"Gaihre A, Luo Y, Liu H (2018) Do bitcoin users really care about anonymity? an analysis of the bitcoin transaction graph. In: 2018 IEEE International conference on big data, Big Data. IEEE, pp 1198\u20131207","DOI":"10.1109\/BigData.2018.8622442"},{"key":"2048_CR15","doi-asserted-by":"crossref","unstructured":"Harlev MA, Sun Yin H, Langenheldt KC, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii international conference on system sciences","DOI":"10.24251\/HICSS.2018.443"},{"key":"2048_CR16","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed J (2014) Research and challenges on bitcoin anonymity. In: Data privacy management, autonomous spontaneous security, and security assurance. Springer, pp 3\u201316","DOI":"10.1007\/978-3-319-17016-9_1"},{"key":"2048_CR17","unstructured":"Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the bitcoin network. arXiv:191212060"},{"key":"2048_CR18","doi-asserted-by":"crossref","unstructured":"Irwin AS, Turner AB (2018) Illicit bitcoin transactions: challenges in getting to the who, what, when and where. Journal of money laundering control","DOI":"10.1108\/JMLC-07-2017-0031"},{"key":"2048_CR19","unstructured":"Janda A (2016) Walletexplorer. com: Smart bicoin block explorer"},{"key":"2048_CR20","doi-asserted-by":"crossref","unstructured":"Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International conference on data mining workshops (ICDMW). IEEE, pp 55\u201362","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"2048_CR21","doi-asserted-by":"crossref","unstructured":"Kanemura K, Toyoda K, Ohtsuki T (2019) Identification of darknet markets\u2019 bitcoin addresses by voting per-address classification results. In: 2019 IEEE International conference on blockchain and cryptocurrency (ICBC). IEEE, pp 154\u2013158","DOI":"10.1109\/BLOC.2019.8751391"},{"key":"2048_CR22","doi-asserted-by":"crossref","unstructured":"Lee C, Maharjan S, Ko K, Hong J W K (2020) Toward detecting illegal transactions on bitcoin using machine-learning methods. In: Zheng Z, Dai H N, Tang M, Chen X (eds) Blockchain and trustworthy systems. Springer, Singapore, pp 520\u2013533","DOI":"10.1007\/978-981-15-2777-7_42"},{"key":"2048_CR23","unstructured":"Liang J, Li L, Luan S, Gan L, Zeng D (2019) Bitcoin exchange addresses identification and its application in online drug trading regulation"},{"key":"2048_CR24","doi-asserted-by":"crossref","unstructured":"Liu T, Ge J, Wu Y, Dai B, Li L, Yao Z, Wen J, Shi H (2020) A new bitcoin address association method using a two-level learner model. In: Wen S, Zomaya A, Yang L T (eds) Algorithms and architectures for parallel processing. Springer International Publishing, Cham, pp 349\u2013364","DOI":"10.1007\/978-3-030-38961-1_31"},{"key":"2048_CR25","doi-asserted-by":"crossref","unstructured":"Maesa D D F, Marino A, Ricci L (2016) Uncovering the bitcoin blockchain: an analysis of the full users graph. In: 2016 IEEE international conference on data science and advanced analytics (DSAA) IEEE, pp 537\u2013546","DOI":"10.1109\/DSAA.2016.52"},{"issue":"1","key":"2048_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s41060-017-0074-x","volume":"6","author":"DDF Maesa","year":"2018","unstructured":"Maesa D D F, Marino A, Ricci L (2018) Data-driven analysis of bitcoin properties: exploiting the users graph. Int J Data Sci Anal 6(1):63\u201380","journal-title":"Int J Data Sci Anal"},{"key":"2048_CR27","doi-asserted-by":"crossref","unstructured":"Maesa DDF, Marino A, Ricci L (2018) The graph structure of bitcoin. In: International conference on complex networks and their applications. Springer, pp 547\u2013558","DOI":"10.1007\/978-3-030-05414-4_44"},{"issue":"1","key":"2048_CR28","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s41109-019-0163-y","volume":"4","author":"DDF Maesa","year":"2019","unstructured":"Maesa D D F, Marino A, Ricci L (2019) The bow tie structure of the bitcoin users graph. Appl Netw Sci 4(1):56","journal-title":"Appl Netw Sci"},{"key":"2048_CR29","doi-asserted-by":"crossref","unstructured":"Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust bitcoin fraud detection. In: 2016 Information security for South Africa (ISSA). IEEE, pp 129\u2013134","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"2048_CR30","doi-asserted-by":"crossref","unstructured":"Monamo P M, Marivate V, Twala B (2016) A multifaceted approach to bitcoin fraud detection: Global and local outliers. In: 2016 15Th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 188\u2013194","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"2048_CR31","unstructured":"Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Technical report, Manubot"},{"key":"2048_CR32","doi-asserted-by":"crossref","unstructured":"Nan L, Tao D (2018) Bitcoin mixing detection using deep autoencoder. In: 2018 IEEE Third international conference on data science in cyberspace (DSC), pp 280\u2013287","DOI":"10.1109\/DSC.2018.00047"},{"key":"2048_CR33","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston M, Romiti M, Haslhofer B, Charvat T (2019) Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In: Proceedings of the 1st ACM conference on advances in financial technologies, pp 76\u201388","DOI":"10.1145\/3318041.3355466"},{"key":"2048_CR34","doi-asserted-by":"publisher","first-page":"57009","DOI":"10.1109\/ACCESS.2019.2914098","volume":"7","author":"S Park","year":"2019","unstructured":"Park S, Im S, Seol Y, Paek J (2019) Nodes in the bitcoin network: comparative measurement study and survey. IEEE Access 7:57009\u201357022","journal-title":"IEEE Access"},{"key":"2048_CR35","unstructured":"Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv:161103941"},{"key":"2048_CR36","doi-asserted-by":"crossref","unstructured":"Phetsouvanh S, Oggier F, Datta A (2018) Egret: Extortion graph exploration techniques in the bitcoin network. In: 2018 IEEE International conference on data mining workshops (ICDMW), pp 244\u2013251","DOI":"10.1109\/ICDMW.2018.00043"},{"issue":"9","key":"2048_CR37","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1093\/comjnl\/bxy001","volume":"61","author":"A Pinna","year":"2018","unstructured":"Pinna A, Tonelli R, Orr\u00fa M, Marchesi M (2018) A petri nets model for blockchain analysis. Comput J 61(9):1374\u20131388","journal-title":"Comput J"},{"key":"2048_CR38","doi-asserted-by":"crossref","unstructured":"Portnoff RS, Huang DY, Doerfler P, Afroz S, McCoy D (2017) Backpage and bitcoin: Uncovering human traffickers. In: KDD \u201917","DOI":"10.1145\/3097983.3098082"},{"key":"2048_CR39","doi-asserted-by":"publisher","first-page":"67189","DOI":"10.1109\/ACCESS.2018.2874539","volume":"6","author":"M Rahouti","year":"2018","unstructured":"Rahouti M, Xiong K, Ghani N (2018) Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access 6: 67189\u201367205","journal-title":"IEEE Access"},{"issue":"07","key":"2048_CR40","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TLA.2019.8931194","volume":"17","author":"VG Reyes-Macedo","year":"2019","unstructured":"Reyes-Macedo V G, Salinas-Rosales M, Garcia G G (2019) A method for blockchain transactions analysis. IEEE Lat Am Trans 17(07):1080\u20131087","journal-title":"IEEE Lat Am Trans"},{"key":"2048_CR41","doi-asserted-by":"crossref","unstructured":"Sabry F, Labda W, Erbad A, Al Jawaheri H, Malluhi Q (2019) Anonymity and privacy in bitcoin escrow trades. In: Proceedings of the 18th ACM workshop on privacy in the electronic society, pp 211\u2013220","DOI":"10.1145\/3338498.3358639"},{"key":"2048_CR42","doi-asserted-by":"crossref","unstructured":"Shao W, Li H, Chen M, Jia C, Liu C, Wang Z (2018) Identifying bitcoin users using deep neural network. In: Vaidya J, Li J (eds) Algorithms and architectures for parallel processing. Springer International Publishing, Cham, pp 178\u2013192","DOI":"10.1007\/978-3-030-05063-4_15"},{"issue":"1","key":"2048_CR43","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/07421222.2018.1550550","volume":"36","author":"HH Sun Yin","year":"2019","unstructured":"Sun Yin H H, Langenheldt K, Harlev M, Mukkamala R R, Vatrapu R (2019) Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. J Manag Inf Syst 36(1):37\u201373","journal-title":"J Manag Inf Syst"},{"key":"2048_CR44","doi-asserted-by":"publisher","first-page":"74835","DOI":"10.1109\/ACCESS.2019.2921087","volume":"7","author":"K Toyoda","year":"2019","unstructured":"Toyoda K, Mathiopoulos P T, Ohtsuki T (2019) A novel methodology for hyip operators\u2019 bitcoin addresses identification. IEEE Access 7:74835\u201374848","journal-title":"IEEE Access"},{"key":"2048_CR45","doi-asserted-by":"crossref","unstructured":"Turner A, Irwin ASM (2018) Bitcoin transactions: a digital discovery of illicit activity on the blockchain. Journal of Financial Crime","DOI":"10.1108\/JFC-12-2016-0078"},{"key":"2048_CR46","doi-asserted-by":"crossref","unstructured":"Vasek M, Moore T (2015) There\u2019s no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In: B\u00f6hme R, Okamoto T (eds) Financial cryptography and data security. Springer, Berlin, pp 44\u201361","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"2048_CR47","unstructured":"Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv:190802591"},{"key":"2048_CR48","doi-asserted-by":"publisher","first-page":"200895","DOI":"10.1016\/j.fsidi.2019.200895","volume":"31","author":"Y Wu","year":"2019","unstructured":"Wu Y, Luo A, Xu D (2019) Identifying suspicious addresses in bitcoin thefts. Digit Investig 31:200895. https:\/\/doi.org\/10.1016\/j.fsidi.2019.200895","journal-title":"Digit Investig"},{"key":"2048_CR49","doi-asserted-by":"crossref","unstructured":"Wu Y, Tao F, Liu L, Gu J, Panneerselvam J, Zhu R, Shahzad MN (2020) A bitcoin transaction network analytic method for future blockchain forensic investigation. IEEE Trans Netw Sci Eng:1\u20131","DOI":"10.1109\/TNSE.2020.2970113"},{"key":"2048_CR50","doi-asserted-by":"crossref","unstructured":"Yang L, Dong X, Xing S, Zheng J, Gu X, Song X (2019) An abnormal transaction detection mechanim on bitcoin. In: 2019 International conference on networking and network applications (NaNA). IEEE, pp 452\u2013457","DOI":"10.1109\/NaNA.2019.00083"},{"key":"2048_CR51","unstructured":"Yin H S, Vatrapu R (2017) A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In: 2017 IEEE International conference on big data, big data. IEEE, pp 3690\u20133699"},{"key":"2048_CR52","doi-asserted-by":"crossref","unstructured":"Zarpel\u00e3o B B, Miani R S, Rajarajan M (2019) Detection of bitcoin-based botnets using a one-class classifier. In: Blazy O, Yeun C Y (eds) Information security theory and practice. Springer International Publishing, Cham, pp 174\u2013189","DOI":"10.1007\/978-3-030-20074-9_13"},{"key":"2048_CR53","unstructured":"Zayuelas Mu\u00f1oz J (2019) Detection of bitcoin miners from network measurements. B.S. thesis, Universitat Polit\u00e8cnica de Catalunya"},{"key":"2048_CR54","unstructured":"Zhang Z, Zhou T, Xie Z (2017) Bitscope: Scaling bitcoin address de-anonymization using multi-resolution clustering"},{"key":"2048_CR55","doi-asserted-by":"crossref","unstructured":"Zola F, Eguimendia M, Bruse J L, Urrutia RO (2019) Cascading machine learning to attack bitcoin anonymity. In: 2019 IEEE International conference on blockchain. IEEE, Blockchain, pp 10\u201317","DOI":"10.1109\/Blockchain.2019.00011"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02048-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-020-02048-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02048-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T08:26:45Z","timestamp":1621499205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-020-02048-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,20]]},"references-count":55,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["2048"],"URL":"https:\/\/doi.org\/10.1007\/s10489-020-02048-w","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,20]]},"assertion":[{"value":"28 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}