{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:25:43Z","timestamp":1770225943021,"version":"3.49.0"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Classification of Bitcoin entities is an important task to help Law Enforcement Agencies reduce anonymity in the Bitcoin blockchain network and to detect classes more tied to illegal activities. However, this task is strongly conditioned by a severe class imbalance in Bitcoin datasets. Existing approaches for addressing the class imbalance problem can be improved considering generative adversarial networks (GANs) that can boost data diversity. However, GANs are mainly applied in computer vision and natural language processing tasks, but not in Bitcoin entity behaviour classification where they may be useful for learning and generating synthetic behaviours. Therefore, in this work, we present a novel approach to address the class imbalance in Bitcoin entity classification by applying GANs. In particular, three GAN architectures were implemented and compared in order to find the most suitable architecture for generating Bitcoin entity behaviours. More specifically, GANs were used to address the Bitcoin imbalance problem by generating synthetic data of the less represented classes before training the final entity classifier. The results were used to evaluate the capabilities of the different GAN architectures in terms of training time, performance, repeatability, and computational costs. Finally, the results achieved by the proposed GAN-based resampling were compared with those obtained using five well-known data-level preprocessing techniques. Models trained with data resampled with our GAN-based approach achieved the highest accuracy improvements and were among the best in terms of precision, recall and f1-score. Together with Random Oversampling (ROS), GANs proved to be strong contenders in addressing Bitcoin class imbalance and consequently in reducing Bitcoin entity anonymity (overall and per-class classification performance). To the best of our knowledge, this is the first work to explore the advantages and limitations of GANs in generating specific Bitcoin data and \u201cattacking\u201d Bitcoin anonymity. The proposed methods ultimately demonstrate that in Bitcoin applications, GANs are indeed able to learn the data distribution and generate new samples starting from a very limited class representation, which leads to better detection of classes related to illegal activities.<\/jats:p>","DOI":"10.1007\/s10489-022-03378-7","type":"journal-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:33:10Z","timestamp":1648809190000},"page":"17289-17314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1733-5515","authenticated-orcid":false,"given":"Francesco","family":"Zola","sequence":"first","affiliation":[]},{"given":"Lander","family":"Segurola-Gil","sequence":"additional","affiliation":[]},{"given":"Jan L.","family":"Bruse","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Galar","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Orduna-Urrutia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,1]]},"reference":[{"key":"3378_CR1","unstructured":"Nakamoto S (2019) Bitcoin: A peer-to-peer electronic cash system. Technical Report, Manubot"},{"issue":"5","key":"3378_CR2","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1093\/rfs\/hhz015","volume":"32","author":"S Foley","year":"2019","unstructured":"Foley S, Karlsen J R, Putni\u0146\u0161 T J (2019) Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?. Rev Financ Stud 32(5):1798\u20131853","journal-title":"Rev Financ Stud"},{"key":"3378_CR3","doi-asserted-by":"crossref","unstructured":"Marella V, Upreti B, Merikivi J, Tuunainen V K (2020) Understanding the creation of trust in cryptocurrencies: the case of bitcoin. Electron Mark:1\u201313","DOI":"10.1007\/s12525-019-00392-5"},{"key":"3378_CR4","doi-asserted-by":"crossref","unstructured":"Saez M (2020) Blockchain-enabled platforms: Challenges and recommendations. Int J Interact Multimed Artif Intell 6(3)","DOI":"10.9781\/ijimai.2020.08.005"},{"issue":"23","key":"3378_CR5","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.3390\/app9235003","volume":"9","author":"F Zola","year":"2019","unstructured":"Zola F, Bruse J L, Eguimendia M, Galar M, Orduna Urrutia R (2019) Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns. Appl Sci 9 (23):5003","journal-title":"Appl Sci"},{"key":"3378_CR6","doi-asserted-by":"crossref","unstructured":"Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, pp 55\u201362","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"3378_CR7","doi-asserted-by":"crossref","unstructured":"Harlev M A, Sun Yin H, Langenheldt K C, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii international conference on system sciences","DOI":"10.24251\/HICSS.2018.443"},{"key":"3378_CR8","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez A, Garc\u00eda S, Galar M, Prati R C, Krawczyk B, Herrera F (2018) Learning from imbalanced data sets. Springer","DOI":"10.1007\/978-3-319-98074-4"},{"key":"3378_CR9","doi-asserted-by":"crossref","unstructured":"Monamo P M, Marivate V, Twala B (2016) A multifaceted approach to bitcoin fraud detection: Global and local outliers. In: 15th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 188\u2013194","DOI":"10.1109\/ICMLA.2016.0039"},{"issue":"8","key":"3378_CR10","doi-asserted-by":"publisher","first-page":"2328","DOI":"10.1007\/s10489-019-01624-z","volume":"50","author":"W Zheng","year":"2020","unstructured":"Zheng W, Zhao H (2020) Cost-sensitive hierarchical classification for imbalance classes. Appl Intell 50(8):2328\u20132338","journal-title":"Appl Intell"},{"key":"3378_CR11","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez A, Garc\u00eda S, Galar M, Prati R C, Krawczyk B, Herrera F (2018) Algorithm-level approaches. In: Learning from imbalanced data sets. Springer, pp 123\u2013146","DOI":"10.1007\/978-3-319-98074-4_6"},{"key":"3378_CR12","doi-asserted-by":"crossref","unstructured":"Wang S, Liu W, Wu J, Cao L, Meng Q, Kennedy P J (2016) Training deep neural networks on imbalanced data sets. In: 2016 international joint conference on neural networks (IJCNN). IEEE, pp 4368\u20134374","DOI":"10.1109\/IJCNN.2016.7727770"},{"issue":"1","key":"3378_CR13","first-page":"117","volume":"6","author":"N Manju","year":"2020","unstructured":"Manju N, Harish BS, Nagadarshan N (2020) Multilayer feedforward neural network for internet traffic classification. Int J Interact Multim Artif Intell 6(1):117\u2013122","journal-title":"Int J Interact Multim Artif Intell"},{"issue":"10","key":"3378_CR14","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.3390\/sym12101705","volume":"12","author":"A Alotaibi","year":"2020","unstructured":"Alotaibi A (2020) Deep generative adversarial networks for image-to-image translation: a review. Symmetry 12(10):1705","journal-title":"Symmetry"},{"key":"3378_CR15","unstructured":"Brock A, Donahue J, Simonyan K (2018) Large scale gan training for high fidelity natural image synthesis. In: International conference on learning representations"},{"key":"3378_CR16","unstructured":"Vondrick C, Pirsiavash H, Torralba A (2016) Generating videos with scene dynamics. Adv Neural Inf Proces Syst 29"},{"key":"3378_CR17","unstructured":"Bowles C, Chen L, Guerrero R, Bentley P, Gunn R, Hammers A, Dickie D A, Hern\u00e1ndez M V, Wardlaw J, Rueckert D (2018) Gan augmentation: Augmenting training data using generative adversarial networks. arXiv:1810.10863"},{"key":"3378_CR18","unstructured":"Abusitta A, A\u00efmeur E, Abdel Wahab O (2020) Generative adversarial networks for mitigating biases in machine learning systems. In: ECAI 2020. IOS Press, pp 937\u2013944"},{"key":"3378_CR19","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672\u20132680"},{"issue":"4","key":"3378_CR20","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/JAS.2017.7510583","volume":"4","author":"K Wang","year":"2017","unstructured":"Wang K, Gou C, Duan Y, Lin Y, Zheng X, Wang F-Y (2017) Generative adversarial networks: introduction and outlook. IEEE\/CAA J Autom Sin 4(4):588\u2013598","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"3378_CR21","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neucom.2019.07.094","volume":"366","author":"P Shamsolmoali","year":"2019","unstructured":"Shamsolmoali P, Zareapoor M, Wang R, Jain D K, Yang J (2019) G-ganisr: Gradual generative adversarial network for image super resolution. Neurocomputing 366:140\u2013153","journal-title":"Neurocomputing"},{"key":"3378_CR22","doi-asserted-by":"crossref","unstructured":"Ledig C, Theis L, Huszar F, Caballero J, Cunningham A, Acosta A, Aitken A, Tejani A, Totz J, Wang Z et al (2017) Photo-realistic single image super-resolution using a generative adversarial network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4681\u20134690","DOI":"10.1109\/CVPR.2017.19"},{"key":"3378_CR23","doi-asserted-by":"crossref","unstructured":"Alqahtani H, Kavakli-Thorne M, Kumar G (2019) Applications of generative adversarial networks (gans): an updated review. Arch Comput Methods Eng:1\u201328","DOI":"10.1007\/s11831-019-09388-y"},{"key":"3378_CR24","doi-asserted-by":"crossref","unstructured":"Kethineni S, Cao Y (2019) The rise in popularity of cryptocurrency and associated criminal activity. Int Crim Justice Rev:1057567719827051","DOI":"10.1177\/1057567719827051"},{"issue":"3","key":"3378_CR25","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1007\/s10489-020-01866-2","volume":"51","author":"M Hu","year":"2021","unstructured":"Hu M, Chen J, Gan W, Chen C-M (2021) A jumping mining attack and solution. Appl Intell 51(3):1367\u20131378","journal-title":"Appl Intell"},{"key":"3378_CR26","unstructured":"Fanusie Y, Robinson T (2018) Bitcoin laundering: an analysis of illicit flows into digital currency services. Center on Sanctions & Illicit Finance memorandum"},{"key":"3378_CR27","doi-asserted-by":"crossref","unstructured":"Sun X, Yang T, Hu B (2021) Lstm-tc: Bitcoin coin mixing detection method with a high recall. Appl Intell:1\u201314","DOI":"10.1007\/s10489-021-02453-9"},{"issue":"4","key":"3378_CR28","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti M, Kumar E S, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tutorials 20(4):3416\u20133452","journal-title":"IEEE Commun Surv Tutorials"},{"key":"3378_CR29","doi-asserted-by":"crossref","unstructured":"Zola F, Eguimendia M, Bruse J L, Urrutia R O (2019) Cascading machine learning to attack bitcoin anonymity. In: IEEE International conference on blockchain (Blockchain). IEEE, pp 10\u201317","DOI":"10.1109\/Blockchain.2019.00011"},{"key":"3378_CR30","unstructured":"Yin H S, Vatrapu R (2017) A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In: IEEE International conference on big data (Big Data). IEEE, pp 3690\u20133699"},{"issue":"3","key":"3378_CR31","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1007\/s10489-020-01866-2","volume":"51","author":"M Hu","year":"2020","unstructured":"Hu M, Chen J, Gan W, Chen C-M (2020) A jumping mining attack and solution. Appl Intell 51(3):1367\u20131378","journal-title":"Appl Intell"},{"key":"3378_CR32","doi-asserted-by":"crossref","unstructured":"Kim S, Kim B, Kim H J (2018) Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. In: Proceedings of the international conference on cloud computing and internet of things, pp 40\u201344","DOI":"10.1145\/3291064.3291075"},{"key":"3378_CR33","doi-asserted-by":"publisher","first-page":"210582","DOI":"10.1109\/ACCESS.2020.3039570","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Wang J, Luo J (2020) Heuristic-based address clustering in bitcoin. IEEE Access 8:210582\u2013210591","journal-title":"IEEE Access"},{"issue":"1","key":"3378_CR34","doi-asserted-by":"publisher","first-page":"tyz003","DOI":"10.1093\/cybsec\/tyz003","volume":"5","author":"M Paquet-Clouston","year":"2019","unstructured":"Paquet-Clouston M, Haslhofer B, Dupont B (2019) Ransomware payments in the bitcoin ecosystem. J Cybersecur 5(1):tyz003","journal-title":"J Cybersecur"},{"key":"3378_CR35","unstructured":"Haslhofer B, Karl R, Filtz E (2016) O bitcoin where art thou? insight into large-scale transaction graphs.. In: SEMANTiCS (Posters, Demos, SuCCESS)"},{"key":"3378_CR36","doi-asserted-by":"crossref","unstructured":"Lin Y-J, Wu P-W, Hsu C-H, Tu I-P, Liao S- (2019) An evaluation of bitcoin address classification based on transaction history summarization. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, pp 302\u2013310","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"3378_CR37","doi-asserted-by":"crossref","unstructured":"Liao K, Zhao Z, Doup\u00e9 A, Ahn G-J (2016) Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: APWG Symposium on Electronic Crime Research (eCrime). IEEE, pp 1\u201313","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"3378_CR38","unstructured":"Farnia F, Ozdaglar A (2020) Do gans always have nash equilibria?. In: International conference on machine learning. PMLR, pp 3029\u20133039"},{"key":"3378_CR39","doi-asserted-by":"crossref","unstructured":"Yuan W, Hu F, Lu L (2021) A new non-adaptive optimization method: stochastic gradient descent with momentum and difference. Appl Intell:1\u201315","DOI":"10.1007\/s10489-021-02224-6"},{"key":"3378_CR40","unstructured":"Sun R, Fang T, Schwing A (2020) Towards a better global loss landscape of gans. Adv Neural Inf Process Syst 33"},{"key":"3378_CR41","unstructured":"Goodfellow I (2016) Nips 2016 tutorial: Generative adversarial networks. arXiv:1701.00160"},{"key":"3378_CR42","doi-asserted-by":"publisher","first-page":"105165","DOI":"10.1016\/j.knosys.2019.105165","volume":"190","author":"Y Dai","year":"2020","unstructured":"Dai Y, Wang S, Chen X, Xu C, Guo W (2020) Generative adversarial networks based on wasserstein distance for knowledge graph embeddings. Knowl-Based Syst 190:105165","journal-title":"Knowl-Based Syst"},{"key":"3378_CR43","unstructured":"Martin A, Lon B (2017) Towards principled methods for training generative adversarial networks. In: NIPS Workshop on adversarial training. In review for ICLR, vol 2016"},{"key":"3378_CR44","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: Precup D, Teh Y W (eds) Proceedings of the 34th international conference on machine learning, vol 70. PMLR, pp 214\u2013223"},{"key":"3378_CR45","unstructured":"Nagarajan V, Kolter J Z (2017) Gradient descent gan optimization is locally stable. In: Advances in neural information processing systems, pp 5585\u20135595"},{"key":"3378_CR46","unstructured":"Metz L, Poole B, Pfau D, Sohl-Dickstein J (2017) Unrolled generative adversarial networks. In: 5th International conference on learning representations, conference track proceedings. OpenReview.net"},{"key":"3378_CR47","doi-asserted-by":"crossref","unstructured":"Sahu S, Gupta R, Espy-Wilson C (2018) On enhancing speech emotion recognition using generative adversarial networks. In: INTERSPEECH","DOI":"10.21437\/Interspeech.2018-1883"},{"key":"3378_CR48","doi-asserted-by":"publisher","first-page":"101552","DOI":"10.1016\/j.media.2019.101552","volume":"58","author":"X Yi","year":"2019","unstructured":"Yi X, Walia E, Babyn P (2019) Generative adversarial network in medical imaging: a review. Med Image Anal 58:101552","journal-title":"Med Image Anal"},{"key":"3378_CR49","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.neucom.2019.06.043","volume":"361","author":"A Ali-Gombe","year":"2019","unstructured":"Ali-Gombe A, Elyan E (2019) Mfc-gan: class-imbalanced dataset classification using multiple fake class generative adversarial network. Neurocomputing 361:212\u2013221","journal-title":"Neurocomputing"},{"key":"3378_CR50","doi-asserted-by":"crossref","unstructured":"Dai X, Yuan X, Wei X (2021) Data augmentation for thermal infrared object detection with cascade pyramid generative adversarial network. Appl Intell:1\u201315","DOI":"10.1007\/s10489-021-02445-9"},{"issue":"4","key":"3378_CR51","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1007\/s10489-020-01987-8","volume":"51","author":"Q-M Liu","year":"2021","unstructured":"Liu Q-M, Jia R-S, Liu Y-B, Sun H-B, Yu J-Z, Sun H-M (2021) Infrared image super-resolution reconstruction by using generative adversarial network with an attention mechanism. Appl Intell 51 (4):2018\u20132030","journal-title":"Appl Intell"},{"key":"3378_CR52","doi-asserted-by":"crossref","unstructured":"Zhang F, Ma Y, Yuan G, Zhang H, Ren J (2021) Multiview image generation for vehicle reidentification. Appl Intell:1\u201318","DOI":"10.1007\/s10489-020-02171-8"},{"issue":"4","key":"3378_CR53","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s10489-020-01931-w","volume":"51","author":"X Zong","year":"2021","unstructured":"Zong X, Chen Z, Wang D (2021) Local-cyclegan: a general end-to-end network for visual enhancement in complex deep-water environment. Appl Intell 51(4):1947\u20131958","journal-title":"Appl Intell"},{"issue":"6","key":"3378_CR54","doi-asserted-by":"publisher","first-page":"3460","DOI":"10.1007\/s10489-020-01971-2","volume":"51","author":"Y Chen","year":"2021","unstructured":"Chen Y, Zhang H, Liu L, Chen X, Zhang Q, Yang K, Xia R, Xie J (2021) Research on image inpainting algorithm of improved gan based on two-discriminations networks. Appl Intell 51 (6):3460\u20133474","journal-title":"Appl Intell"},{"key":"3378_CR55","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.neucom.2019.05.046","volume":"358","author":"S Chen","year":"2019","unstructured":"Chen S, Chen S, Guo Z, Zuo Y (2019) Low-resolution palmprint image denoising by generative adversarial networks. Neurocomputing 358:275\u2013284","journal-title":"Neurocomputing"},{"key":"3378_CR56","doi-asserted-by":"crossref","unstructured":"Li Y, Zhang Y, Yu K, Hu X (2021) Adversarial training with wasserstein distance for learning cross-lingual word embeddings. Appl Intell:1\u201313","DOI":"10.1007\/s10489-020-02136-x"},{"key":"3378_CR57","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.neucom.2018.09.006","volume":"321","author":"Z Yang","year":"2018","unstructured":"Yang Z, Chen W, Wang F, Xu B (2018) Generative adversarial training for neural machine translation. Neurocomputing 321:146\u2013155","journal-title":"Neurocomputing"},{"key":"3378_CR58","doi-asserted-by":"crossref","unstructured":"Athanasiadis C, Hortal E, Asteriadis S (2019) Audio\u2013visual domain adaptation using conditional semi-supervised generative adversarial networks. Neurocomputing","DOI":"10.1016\/j.neucom.2019.09.106"},{"key":"3378_CR59","doi-asserted-by":"crossref","unstructured":"Merino T, Stillwell M, Steele M, Coplan M, Patton J, Stoyanov A, Deng L (2019) Expansion of cyber attack data from unbalanced datasets using generative adversarial networks. In: International conference on software engineering research, management and applications. Springer, pp 131\u2013145","DOI":"10.1007\/978-3-030-24344-9_8"},{"key":"3378_CR60","unstructured":"Yilmaz I, Masum R (2019) Expansion of cyber attack data from unbalanced datasets using generative techniques. arXiv:1912.04549"},{"key":"3378_CR61","doi-asserted-by":"crossref","unstructured":"Mukhtar N, Batina L, Picek S, Kong Y (2021) Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices","DOI":"10.1007\/978-3-030-95312-6_13"},{"key":"3378_CR62","doi-asserted-by":"crossref","unstructured":"Wang P, Li S, Ye F, Wang Z, Zhang M (2020) Packetcgan: Exploratory study of class imbalance for encrypted traffic classification using cgan. In: ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20137","DOI":"10.1109\/ICC40277.2020.9148946"},{"key":"3378_CR63","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.eswa.2016.12.035","volume":"73","author":"G Haixiang","year":"2017","unstructured":"Haixiang G, Yijing L, Shang J, Mingyun G, Yuanyue H, Bing G (2017) Learning from class-imbalanced data: review of methods and applications. Expert Syst Appl 73:220\u2013239","journal-title":"Expert Syst Appl"},{"key":"3378_CR64","doi-asserted-by":"crossref","unstructured":"Garc\u00eda V, S\u00e1nchez JS, Marqu\u00e9s AI, Florencia R, Rivera G (2019) Understanding the apparent superiority of over-sampling through an analysis of local information for class-imbalanced data. Expert Syst Appl:113026","DOI":"10.1016\/j.eswa.2019.113026"},{"key":"3378_CR65","doi-asserted-by":"crossref","unstructured":"Pereira R M, Costa Yandre MG, Silla Jr C N (2020) Mltl: A multi-label approach for the tomek link undersampling algorithm. Neurocomputing 383:95\u2013105","DOI":"10.1016\/j.neucom.2019.11.076"},{"key":"3378_CR66","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1613\/jair.1.11192","volume":"61","author":"A Fernandez","year":"2018","unstructured":"Fernandez A, Garcia S, Herrera F, Chawla N V (2018) Smote for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J Artif Intell Res 61:863\u2013905","journal-title":"J Artif Intell Res"},{"key":"3378_CR67","doi-asserted-by":"crossref","unstructured":"Vo M T, Nguyen T, Vo H A, Le T (2021) Noise-adaptive synthetic oversampling technique. Appl Intell:1\u201310","DOI":"10.1007\/s10489-021-02341-2"},{"key":"3378_CR68","doi-asserted-by":"crossref","unstructured":"Oussidi A, Elhassouny A (2018) Deep generative models: Survey. In: 2018 International Conference on Intelligent Systems and Computer Vision (ISCV). IEEE, pp 1\u20138","DOI":"10.1109\/ISACV.2018.8354080"},{"key":"3378_CR69","doi-asserted-by":"crossref","unstructured":"Xie Y, Zhang T (2018) Imbalanced learning for fault diagnosis problem of rotating machinery based on generative adversarial networks. In: 2018 37th Chinese Control Conference (CCC). IEEE, pp 6017\u20136022","DOI":"10.23919\/ChiCC.2018.8483334"},{"issue":"6","key":"3378_CR70","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1007\/s10489-020-02048-w","volume":"51","author":"P Nerurkar","year":"2021","unstructured":"Nerurkar P, Bhirud S, Patel D, Ludinard R, Busnel Y, Kumari S (2021) Supervised learning model for identifying illegal activities in bitcoin. Appl Intell 51(6):3824\u20133843","journal-title":"Appl Intell"},{"key":"3378_CR71","doi-asserted-by":"crossref","unstructured":"Bartoletti M, Pes B, Serusi S (2018) Data mining for detecting bitcoin ponzi schemes. In: Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, pp 75\u201384","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"3378_CR72","doi-asserted-by":"crossref","unstructured":"Ranshous S, Joslyn C A, Kreyling S, Nowak K, Samatova N F, West C L, Winters S (2017) Exchange pattern mining in the bitcoin transaction directed hypergraph. In: International conference on financial cryptography and data security. Springer, pp 248\u2013263","DOI":"10.1007\/978-3-319-70278-0_16"},{"key":"3378_CR73","unstructured":"Liang J, Li L, Luan S, Gan L, Zeng D (2019) Bitcoin exchange addresses identification and its application in online drug trading regulation. In: 23rd Pacific Asia Conference on Information Systems: Secure ICT Platform for the 4th Industrial Revolution, PACIS 2019"},{"key":"3378_CR74","unstructured":"Monamo M P (2018) Anomaly detection in the open financial markets: A case for the bitcoin network. University of Johannesburg, South Africa"},{"key":"3378_CR75","doi-asserted-by":"crossref","unstructured":"Pfenninger M, Rikli S, Bigler D N (2021) Wasserstein gan: Deep generation applied on financial time series. Available at SSRN 3877960","DOI":"10.2139\/ssrn.3877960"},{"key":"3378_CR76","unstructured":"Grilli L, Santoro D (April 2020) Generative Adversarial Network for Market Hourly Discrimination. In: 3RD International conference on mathematical and related sciences: current trends and developments proceedings book"},{"key":"3378_CR77","doi-asserted-by":"crossref","unstructured":"Zola F, Bruse J L, Barrio X E, Galar M, Urrutia R O (2020) Generative adversarial networks for bitcoin data augmentation. In: 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS). IEEE, pp 136\u2013143","DOI":"10.1109\/BRAINS49436.2020.9223269"},{"key":"3378_CR78","doi-asserted-by":"crossref","unstructured":"Han J, Woo J, Hong J W-K (2020) Oversampling techniques for detecting bitcoin illegal transactions. In: 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 330\u2013333","DOI":"10.23919\/APNOMS50412.2020.9236780"},{"key":"3378_CR79","doi-asserted-by":"crossref","unstructured":"Toyoda K, Ohtsuki T, Mathiopoulos P T (2018) Multi-class bitcoin-enabled service identification based on transaction history summarization. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 1153\u20131160","DOI":"10.1109\/Cybermatics_2018.2018.00208"},{"key":"3378_CR80","doi-asserted-by":"crossref","unstructured":"Zou F, Shen L, Jie Z, Zhang W, Liu W (2019) A sufficient condition for convergences of adam and rmsprop. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition, pp 11127\u201311135","DOI":"10.1109\/CVPR.2019.01138"},{"issue":"1","key":"3378_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco D, Jurman G (2020) The advantages of the matthews correlation coefficient (mcc) over f1 score and accuracy in binary classification evaluation. BMC Genomics 21(1):1\u201313","journal-title":"BMC Genomics"},{"issue":"1","key":"3378_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00414-0","volume":"8","author":"V Sampath","year":"2021","unstructured":"Sampath V, Maurtua I, Mart\u00edn J J A, Gutierrez A (2021) A survey on generative adversarial networks for imbalance problems in computer vision tasks. J Big Data 8(1):1\u201359","journal-title":"J Big Data"},{"key":"3378_CR83","doi-asserted-by":"crossref","unstructured":"Lee C, Maharjan S, Ko K, Woo J, Hong J W-K (2020) Machine learning based bitcoin address classification. In: International conference on blockchain and trustworthy systems. Springer, pp 517\u2013531","DOI":"10.1007\/978-981-15-9213-3_40"},{"key":"3378_CR84","unstructured":"Lydia A, Francis S (2019) Adagrad\u2013an optimizer for stochastic gradient descent. Int J Inf Comput Sci 6(5)"},{"key":"3378_CR85","doi-asserted-by":"crossref","unstructured":"Dogo EM, Afolabi OJ, Nwulu NI, Twala B, Aigbavboa CO (2018) A comparative analysis of gradient descent-based optimization algorithms on convolutional neural networks. In: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). IEEE, pp 92\u201399","DOI":"10.1109\/CTEMS.2018.8769211"},{"key":"3378_CR86","doi-asserted-by":"publisher","first-page":"58774","DOI":"10.1109\/ACCESS.2018.2872698","volume":"6","author":"D Liang","year":"2018","unstructured":"Liang D, Yang F, Zhang T, Yang P (2018) Understanding mixup training methods. IEEE Access 6:58774\u201358783","journal-title":"IEEE Access"},{"issue":"4","key":"3378_CR87","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s10489-020-02011-9","volume":"51","author":"C Hu","year":"2021","unstructured":"Hu C, He S, Wang Y (2021) A classification method to detect faults in a rotating machinery based on kernelled support tensor machine and multilinear principal component analysis. Appl Intell 51 (4):2609\u20132621","journal-title":"Appl Intell"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03378-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03378-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03378-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T10:26:25Z","timestamp":1668853585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03378-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":87,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["3378"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03378-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]},"assertion":[{"value":"11 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"(check journal-specific guidelines for which heading to use)","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}