{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:43:20Z","timestamp":1769204600084,"version":"3.49.0"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Science Foundation","award":["1739805"],"award-info":[{"award-number":["1739805"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09595-1","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T01:50:34Z","timestamp":1750125034000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptocurrency forensics automation: a deep learning and NLP-based approach for mobile platforms"],"prefix":"10.1007","volume":"28","author":[{"given":"Abhishek","family":"Bhattarai","sequence":"first","affiliation":[]},{"given":"Abdulhadi","family":"Sahin","sequence":"additional","affiliation":[]},{"given":"Maryna","family":"Veksler","sequence":"additional","affiliation":[]},{"given":"Ahmet","family":"Kurt","sequence":"additional","affiliation":[]},{"given":"Devrim","family":"Aras","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Imery","sequence":"additional","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"9595_CR1","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system.2008.https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"9595_CR2","unstructured":"Wood G Ethereum: A secure decentralised generalised transaction ledger. https:\/\/github.com\/ethereum\/yellowpaper 2014."},{"key":"9595_CR3","unstructured":"The Monero Project: Monero - secure, private, untraceable 2022. https:\/\/www.getmonero.org\/"},{"key":"9595_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2022.107504","author":"B Johnson","year":"2022","unstructured":"Johnson B, Co S, Sun T, Lim CC, Stjepanovi\u0107 D, Leung J, Saunders JB, Chan GC. Cryptocurrency trading and its associations with gambling and mental health: a scoping review. Addictive Behav. 2022. https:\/\/doi.org\/10.1016\/j.addbeh.2022.107504.","journal-title":"Addictive Behav"},{"key":"9595_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906988","author":"U Mukhopadhyay","year":"2016","unstructured":"Mukhopadhyay U, Skjellum A, Hambolu O, Oakley J, Yu L, Brooks R. A brief survey of cryptocurrency systems. 14 th Ann Conf Privacy, Secur Trust. 2016. https:\/\/doi.org\/10.1109\/PST.2016.7906988.","journal-title":"14 th Ann Conf Privacy, Secur Trust"},{"key":"9595_CR6","doi-asserted-by":"publisher","unstructured":"Suratkar S, Shirole M, Bhirud S. Cryptocurrency wallet: A review. In: 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP), 2020;1\u20137. https:\/\/doi.org\/10.1109\/ICCCSP49186.2020.9315193.","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"key":"9595_CR7","unstructured":"Brooks M. 10 best cryptocurrency wallets (January 2025). Coin Ledger, Inc. https:\/\/coinledger.io\/tools\/best-crypto-wallet 2024."},{"issue":"3","key":"9595_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1177\/1057567719827051","volume":"30","author":"S Kethineni","year":"2020","unstructured":"Kethineni S, Cao Y. The rise in popularity of cryptocurrency and associated criminal activity. Int Crim Justice Rev. 2020;30(3):325\u201344. https:\/\/doi.org\/10.1177\/1057567719827051.","journal-title":"Int Crim Justice Rev"},{"key":"9595_CR9","unstructured":"Chainalysis: dataexpert.eu. https:\/\/www.dataexpert.eu\/products\/security-solutions-producten-chainalysis\/chainalysis-reactor\/"},{"key":"9595_CR10","unstructured":"Cellebrite. https:\/\/cellebrite.com\/en\/home\/"},{"key":"9595_CR11","doi-asserted-by":"publisher","unstructured":"Infante L, Hallman RA, Hays J, Cronnon E, Stav U. Recovery cat: A digital forensics tool for cryptocurrency investigations. In: 2024 12th International Symposium on Digital Forensics and Security (ISDFS), 2024;1\u20135. https:\/\/doi.org\/10.1109\/ISDFS60797.2024.10527279 . IEEE","DOI":"10.1109\/ISDFS60797.2024.10527279"},{"issue":"6","key":"9595_CR12","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1002\/wfs2.1418","volume":"3","author":"A Jarrett","year":"2021","unstructured":"Jarrett A, Choo K-KR. The impact of automation and artificial intelligence on digital forensics. Wiley Interdiscipl Rev Forensic Sci. 2021;3(6):1418. https:\/\/doi.org\/10.1002\/wfs2.1418.","journal-title":"Wiley Interdiscipl Rev Forensic Sci"},{"key":"9595_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301576","author":"S Dudani","year":"2023","unstructured":"Dudani S, Baggili I, Raymond D, Marchany R. The current state of cryptocurrency forensics. Forensic Sci Int Digital Investig. 2023. https:\/\/doi.org\/10.1016\/j.fsidi.2023.301576.","journal-title":"Forensic Sci Int Digital Investig"},{"key":"9595_CR14","volume-title":"Forensic Investigations and Risk Management in Mobile and Wireless Communications","author":"K Sharma","year":"2019","unstructured":"Sharma K, Makino M, Shrivastava G, Agarwal B. Forensic Investigations and Risk Management in Mobile and Wireless Communications. Hershey: IGI Global; 2019."},{"key":"9595_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2022.101799","volume":"63","author":"Y-S Ren","year":"2022","unstructured":"Ren Y-S, Ma C-Q, Kong X-L, Baltas K, Zureigat Q. Past, present, and future of the application of machine learning in cryptocurrency research. Res Int Bus Finance. 2022;63: 101799. https:\/\/doi.org\/10.1016\/j.ribaf.2022.101799.","journal-title":"Res Int Bus Finance"},{"key":"9595_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103392","volume":"133","author":"A-h Park","year":"2023","unstructured":"Park A-h, Ryu H, Park W, Jeong D. Forensic investigation framework for cryptocurrency wallet in the end device. Computers Security. 2023;133: 103392. https:\/\/doi.org\/10.1016\/j.cose.2023.103392.","journal-title":"Computers Security"},{"key":"9595_CR17","doi-asserted-by":"publisher","unstructured":"Taylor SK, Ariffin A, Ariffin KAZ, Abdullah SNHS. Cryptocurrencies investigation: A methodology for the preservation of cryptowallets. In: 2021 3rd International Cyber Resilience Conference (CRC), 2021;1\u20135. https:\/\/doi.org\/10.1109\/CRC50527.2021.9392446 .","DOI":"10.1109\/CRC50527.2021.9392446"},{"key":"9595_CR18","unstructured":"Kovalcik T. Digital forensics of cryptocurrency wallets. Master\u2019s thesis, Halmstad University, School of Information Technology.2022. https:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1671204&dswid=-3818"},{"issue":"21","key":"9595_CR19","doi-asserted-by":"publisher","first-page":"11180","DOI":"10.3390\/app122111180","volume":"12","author":"MM Mirza","year":"2022","unstructured":"Mirza MM, Ozer A, Karabiyik U. Mobile cyber forensic investigations of web3 wallets on android and ios. Appl Sci. 2022;12(21):11180. https:\/\/doi.org\/10.3390\/app122111180.","journal-title":"Appl Sci"},{"key":"9595_CR20","doi-asserted-by":"publisher","unstructured":"Zollner S, Choo K-KR, Le-Khac N-A. An automated live forensic and postmortem analysis tool for bitcoin on windows systems. IEEE Access 2019;7:158250\u2013158263 https:\/\/doi.org\/10.1109\/ACCESS.2019.2948774","DOI":"10.1109\/ACCESS.2019.2948774"},{"key":"9595_CR21","unstructured":"Montanez A. Investigation of cryptocurrency wallets on iOS and Android mobile devices for potential forensic artifacts. Marshall University Research Project. 2014. https:\/\/www.marshall.edu\/forensics\/files\/Montanez-Angelica_Final-Research-Paper.pdf"},{"key":"9595_CR22","doi-asserted-by":"publisher","unstructured":"Chang E, Darcy P, Choo K-KR, Le-Khac N-A. Forensic artefact discovery and attribution from Android cryptocurrency wallet applications. arXiv preprint arXiv:2205.14611 2022 https:\/\/doi.org\/10.48550\/arXiv.2205.14611","DOI":"10.48550\/arXiv.2205.14611"},{"key":"9595_CR23","unstructured":"CipherTrace. https:\/\/ciphertrace.com\/"},{"key":"9595_CR24","volume-title":"Forensic analysis of android cryptocurrency Wal- 1418let applications","author":"C Shi","year":"2023","unstructured":"Shi C, Forensic Guan Y, Analysis of Android Cryptocurrency Wallet Applications,. Forensic analysis of android cryptocurrency Wal- 1418let applications. Cham: Springer; 2023."},{"key":"9595_CR25","doi-asserted-by":"publisher","unstructured":"Bhattarai A, Veksler M, Sahin H, Kurt A, Akkaya K. Crypto wallet artifact detection on android devices using advanced machine learning techniques. In: International Conference on Digital Forensics and Cyber Crime, 2022;111\u2013132. https:\/\/doi.org\/10.1007\/978-3-031-36574-4_7 . Springer, Cham","DOI":"10.1007\/978-3-031-36574-4_7"},{"key":"9595_CR26","unstructured":"Bhattarai A, Veksler M, Kurt A, Sahin A, Akkaya K. 2023. Systems and methods for detecting cryptocurrency wallet artifacts in a file system. Google Patents US Patent 11(755), pp. 958."},{"key":"9595_CR27","doi-asserted-by":"publisher","unstructured":"Lwin HH, Aung WP, Lin KK. Comparative analysis of android mobile forensics tools. In: 2020 IEEE Conference on Computer Applications (ICCA), 2020;1\u20136. https:\/\/doi.org\/10.1109\/ICCA49400.2020.9022838 .","DOI":"10.1109\/ICCA49400.2020.9022838"},{"key":"9595_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101650","volume":"88","author":"C Anglano","year":"2020","unstructured":"Anglano C, Canonico M, Guazzone M. The android forensics automator (anfora): a tool for the automated forensic analysis of android applications. Comput Security. 2020;88: 101650. https:\/\/doi.org\/10.1016\/j.cose.2019.101650.","journal-title":"Comput Security"},{"key":"9595_CR29","doi-asserted-by":"publisher","unstructured":"Infante L, Hallman RA, Hays J, Cronnon E, Stav U. Recovery cat: A digital forensics tool for cryptocurrency investigations. In: 2024 12th International Symposium on Digital Forensics and Security (ISDFS), 2024; 1\u20135. https:\/\/doi.org\/10.1109\/ISDFS60797.2024.10527279","DOI":"10.1109\/ISDFS60797.2024.10527279"},{"key":"9595_CR30","doi-asserted-by":"publisher","unstructured":"Xu Q, Ibrahim G, Zheng R, Archer N. Toward automated categorization of mobile health and fitness applications. In: Proceedings of the 4th ACM MobiHoc Workshop on Pervasive Wireless Healthcare, 2014;49\u201354. https:\/\/doi.org\/10.1145\/2633651.2633658","DOI":"10.1145\/2633651.2633658"},{"key":"9595_CR31","doi-asserted-by":"publisher","unstructured":"Horppu I, Nikander A, Buyukcan E, M\u00e4kiniemi J, Sorkhei A, Ayala-G\u00f3mez F. Automatic classification of games using support vector machine. arXiv preprint arXiv:2105.05674https:\/\/doi.org\/10.48550\/arXiv.2105.05674 2021","DOI":"10.48550\/arXiv.2105.05674"},{"issue":"2","key":"9595_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474827","volume":"31","author":"F Ebrahimi","year":"2021","unstructured":"Ebrahimi F, Tushev M, Mahmoud A. Classifying mobile applications using word embeddings. ACM Trans Softw Eng Methodol (TOSEM). 2021;31(2):1\u201330. https:\/\/doi.org\/10.1145\/3474827.","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"9595_CR33","doi-asserted-by":"publisher","unstructured":"Alecci M, Samhi J, Bissyand\u00e9 TF, Klein J. Revisiting android app categorization. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, 2024;1\u201312. https:\/\/doi.org\/10.1145\/3597503.3639094","DOI":"10.1145\/3597503.3639094"},{"key":"9595_CR34","doi-asserted-by":"publisher","unstructured":"Flondor E, Frincu M. Fine-grained categorization of mobile applications through semantic similarity techniques for apps classification. In: International Conference on Similarity Search and Applications, 2023;79\u201387. https:\/\/doi.org\/10.1007\/978-3-031-46994-7_7 . Springer","DOI":"10.1007\/978-3-031-46994-7_7"},{"key":"9595_CR35","doi-asserted-by":"publisher","unstructured":"Ukwen DO, Karabatak M. Review of nlp-based systems in digital forensics and cybersecurity. In: 2021 9th International Symposium on Digital Forensics and Security (ISDFS), 2021;1\u20139. https:\/\/doi.org\/10.1109\/ISDFS52919.2021.9486354","DOI":"10.1109\/ISDFS52919.2021.9486354"},{"key":"9595_CR36","doi-asserted-by":"publisher","unstructured":"Liu C-z, Sheng Y-x, Wei Z-q, Yang Y-Q. Research of text classification based on improved TF-IDF algorithm. In: 2018 IEEE International Conference of Intelligent Robotic and Control Engineering (IRCE), 2018; 218\u2013222. https:\/\/doi.org\/10.1109\/IRCE.2018.8492945 . IEEE","DOI":"10.1109\/IRCE.2018.8492945"},{"key":"9595_CR37","doi-asserted-by":"publisher","unstructured":"Yang Z, Chen Z, Zhang P, Liu M, Li Q. An information intelligent search method for computer forensics based on text similarity. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, 2020;79\u201383. https:\/\/doi.org\/10.1145\/3377644.3377659","DOI":"10.1145\/3377644.3377659"},{"key":"9595_CR38","doi-asserted-by":"publisher","unstructured":"Hada T, Sei Y, Tahara Y, Ohsuga A. Codewords detection in microblogs focusing on differences in word use between two corpora. In: 2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2020;103\u2013108. https:\/\/doi.org\/10.1109\/iCCECE49321.2020.9231109","DOI":"10.1109\/iCCECE49321.2020.9231109"},{"key":"9595_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/fi16110426","author":"J Adkins","year":"2024","unstructured":"Adkins J, Al Bataineh A, Khalaf M. Identifying persons of interest in digital forensics using nlp-based ai. Future Int. 2024. https:\/\/doi.org\/10.3390\/fi16110426.","journal-title":"Future Int"},{"key":"9595_CR40","doi-asserted-by":"publisher","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding 2019. https:\/\/doi.org\/10.18653\/v1\/N19-1423 . https:\/\/arxiv.org\/abs\/1810.04805","DOI":"10.18653\/v1\/N19-1423"},{"key":"9595_CR41","unstructured":"Hid\u00e9n O, Bj\u00f6relind D. Clustering and Summarization of Chat Dialogues: To understand a company\u2019s customer base. https:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1576483&dswid=-7275 2021"},{"key":"9595_CR42","unstructured":"Zhu R, Lau JH, Qi J. Findings on Conversation Disentanglement 2021. https:\/\/arxiv.org\/abs\/2112.05346"},{"key":"9595_CR43","doi-asserted-by":"publisher","unstructured":"Mehmood MK, Arshad H, Alawida M, Mehmood A. Enhancing smishing detection: A deep learning approach for improved accuracy and reduced false positives. IEEE Access 2024;12:137176\u2013137193https:\/\/doi.org\/10.1109\/ACCESS.2024.3463871","DOI":"10.1109\/ACCESS.2024.3463871"},{"key":"9595_CR44","doi-asserted-by":"publisher","unstructured":"Tsur O, Littman A, Rappoport A. Efficient clustering of short messages into general domains. In: Proceedings of the International AAAI Conference on Web and Social Media, 2013:7;621\u2013630. https:\/\/doi.org\/10.1609\/icwsm.v7i1.14420","DOI":"10.1609\/icwsm.v7i1.14420"},{"key":"9595_CR45","doi-asserted-by":"publisher","unstructured":"Xu L, Hristidis V, Le NXT. Clustering-based summarization of transactional chatbot logs. In: 2019 IEEE International Conference on Humanized Computing and Communication (HCC), 2019;60\u201367. https:\/\/doi.org\/10.1109\/HCC46620.2019.00017","DOI":"10.1109\/HCC46620.2019.00017"},{"key":"9595_CR46","doi-asserted-by":"publisher","unstructured":"Kao H-H. Accelerating multilingual cryptocurrency forensics: An nlp-driven approach for efficient mnemonic identification. IEEE Access 2025:13;10513\u201310526 https:\/\/doi.org\/10.1109\/ACCESS.2025.3528829","DOI":"10.1109\/ACCESS.2025.3528829"},{"issue":"1","key":"9595_CR47","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701","volume":"2013","author":"A Piva","year":"2013","unstructured":"Piva A. An overview on image forensics. Int Schol Res Notices. 2013;2013(1): 496701. https:\/\/doi.org\/10.1155\/2013\/496701.","journal-title":"Int Schol Res Notices"},{"key":"9595_CR48","doi-asserted-by":"publisher","unstructured":"Nikitha A, Geetha J, JayaLakshmi D. Handwritten text recognition using deep learning. In: 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2020;388\u2013392. https:\/\/doi.org\/10.1109\/RTEICT49044.2020.9315679 . IEEE","DOI":"10.1109\/RTEICT49044.2020.9315679"},{"key":"9595_CR49","doi-asserted-by":"publisher","unstructured":"Wigington C, Tensmeyer C, Davis B, Barrett W, Price B, Cohen S. Start, follow, read: End-to-end full-page handwriting recognition. In: Proceedings of the European Conference on Computer Vision (ECCV), 2018;367\u2013383. https:\/\/doi.org\/10.1007\/978-3-030-01231-1_23","DOI":"10.1007\/978-3-030-01231-1_23"},{"key":"9595_CR50","doi-asserted-by":"publisher","unstructured":"Neves RFdP, Zanchettin C, Mello CAB. An adaptive thresholding algorithm based on edge detection and morphological operations for document images. DocEng \u201913, pp. 107\u2013110. Association for Computing Machinery, NY, USA. https:\/\/doi.org\/10.1145\/2494266.2494301 2013","DOI":"10.1145\/2494266.2494301"},{"key":"9595_CR51","doi-asserted-by":"publisher","unstructured":"Cheng L, Frankem\u00f6lle J, Axelsson A, Vats E. Uncovering the handwritten text in the margins: End-to-end handwritten text detection and recognition. In: Proceedings of the 8th Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature (LaTeCH-CLfL 2024), pp. 111\u2013120. Association for Computational Linguistics, Sweden 2024. https:\/\/doi.org\/10.48550\/arXiv.2303.05929","DOI":"10.48550\/arXiv.2303.05929"},{"key":"9595_CR52","doi-asserted-by":"publisher","unstructured":"Vaidya R, Trivedi D, Satra S, Pimpale M. Handwritten character recognition using deep-learning. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018;772\u2013775. https:\/\/doi.org\/10.1109\/ICICCT.2018.8473291 . IEEE","DOI":"10.1109\/ICICCT.2018.8473291"},{"key":"9595_CR53","doi-asserted-by":"publisher","DOI":"10.3390\/math11143134","author":"C Shi","year":"2023","unstructured":"Shi C, Chen L, Wang C, Zhou X, Qin Z. Review of image forensic techniques based on deep learning. Mathematics. 2023. https:\/\/doi.org\/10.3390\/math11143134.","journal-title":"Mathematics"},{"key":"9595_CR54","doi-asserted-by":"publisher","unstructured":"Sanapala L, Gondi L. Qr-code crime-specific framework with crime-specific intelligence. In: Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing, 2023;99\u2013115. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-2746-3_11","DOI":"10.1007\/978-981-99-2746-3_11"},{"key":"9595_CR55","doi-asserted-by":"publisher","unstructured":"Nalawade A, Bharne S, Mane V. Forensic analysis and evidence collection for web browser activity. In: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016;518\u2013522. https:\/\/doi.org\/10.1109\/ICACDOT.2016.7877639 . IEEE","DOI":"10.1109\/ICACDOT.2016.7877639"},{"key":"9595_CR56","unstructured":"Cohen A. 2020 FuzzyWuzzy. https:\/\/pypi.org\/project\/fuzzywuzzy\/"},{"key":"9595_CR57","unstructured":"JoMingyu: Google-Play-Scraper. 2022 https:\/\/pypi.org\/project\/google-play-scraper\/"},{"key":"9595_CR58","unstructured":"Apple: iTunes Search API. 2017 https:\/\/developer.apple.com\/library\/archive\/documentation\/AudioVideo\/Conceptual\/iTuneSearchAPI\/index.html"},{"key":"9595_CR59","doi-asserted-by":"publisher","unstructured":"Bird S. Nltk: the natural language toolkit. In: Proceedings of the COLING\/ACL 2006 Interactive Presentation Sessions, 2006;69\u201372. https:\/\/doi.org\/10.48550\/arXiv.cs\/0205028","DOI":"10.48550\/arXiv.cs\/0205028"},{"key":"9595_CR60","doi-asserted-by":"publisher","unstructured":"Liu Q, Wang J, Zhang D, Yang Y, Wang N. Text features extraction based on tf-idf associating semantic. In: 2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2018;2338\u20132343. https:\/\/doi.org\/10.1109\/CompComm.2018.8780663 . IEEE","DOI":"10.1109\/CompComm.2018.8780663"},{"issue":"6","key":"9595_CR61","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE. Imagenet classification with deep convolutional neural networks. Commun ACM. 2017;60(6):84\u201390. https:\/\/doi.org\/10.1145\/3065386.","journal-title":"Commun ACM"},{"key":"9595_CR62","doi-asserted-by":"publisher","unstructured":"Ha J, Haralick RM, Phillips IT. Document page decomposition by the bounding-box project. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, 1995:2;1119\u20131122 https:\/\/doi.org\/10.1109\/ICDAR.1995.602115 . IEEE","DOI":"10.1109\/ICDAR.1995.602115"},{"key":"9595_CR63","doi-asserted-by":"publisher","unstructured":"Singh SS, Karayev S. Full page handwriting recognition via image to sequence extraction. In: International Conference on Document Analysis and Recognition, 2021:55\u201369. https:\/\/doi.org\/10.1007\/978-3-030-86334-0_4 . Springer","DOI":"10.1007\/978-3-030-86334-0_4"},{"issue":"7","key":"9595_CR64","doi-asserted-by":"publisher","first-page":"1480","DOI":"10.1109\/TPAMI.2014.2366765","volume":"37","author":"Q Ye","year":"2014","unstructured":"Ye Q, Doermann D. Text detection and recognition in imagery: a survey. IEEE Trans Pattern Anal Machine Intell. 2014;37(7):1480\u2013500. https:\/\/doi.org\/10.1109\/TPAMI.2014.2366765.","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"9595_CR65","unstructured":"Keras Team: Handwriting recognition (2022). https:\/\/github.com\/keras-team\/keras-io\/blob\/master\/examples\/vision\/handwriting_recognition.py"},{"key":"9595_CR66","doi-asserted-by":"publisher","unstructured":"Graves A. Connectionist temporal classification. In: Supervised Sequence Labelling with Recurrent Neural Networks, 2012;61\u201393. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-24797-2_7","DOI":"10.1007\/978-3-642-24797-2_7"},{"key":"9595_CR67","unstructured":"Hooson M. Cryptocurrency Glossary Of Terms & Acronyms. https:\/\/www.forbes.com\/advisor\/investing\/cryptocurrency\/crypto-glossary\/ 2022"},{"key":"9595_CR68","unstructured":"CoinMarketCap: Crypto Glossary. https:\/\/coinmarketcap.com\/alexandria\/glossary 2022."},{"key":"9595_CR69","volume-title":"Mobile Forensics-The File Format Handbook: Common File Formats and File Systems Used in Mobile Devices","author":"Pawlaszczyk D Sqlite","year":"2019","unstructured":"Sqlite Pawlaszczyk D. Mobile Forensics-The File Format Handbook: Common File Formats and File Systems Used in Mobile Devices. Cham: Springer; 2019."},{"key":"9595_CR70","doi-asserted-by":"publisher","unstructured":"Kummerfeld JK, Gouravajhala SR, Peper JJ, Athreya V, Gunasekara C, Ganhotra J, Patel SS, Polymenakos LC, Lasecki W. A large-scale corpus for conversation disentanglement. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 3846\u20133856. Association for Computational Linguistics, USA. https:\/\/doi.org\/10.18653\/v1\/P19-1374 . https:\/\/aclanthology.org\/P19-1374 2019","DOI":"10.18653\/v1\/P19-1374"},{"key":"9595_CR71","unstructured":"Prakash G, Koshy J. Google Play Store Apps. https:\/\/www.kaggle.com\/datasets\/gauthamp10\/google-playstore-apps 2021."},{"key":"9595_CR72","unstructured":"Han S. Googletrans. http:\/\/pypi.org\/project\/googletrans\/. Accessed: 2024-12-18"},{"key":"9595_CR73","doi-asserted-by":"publisher","unstructured":"Parmar A, Katariya R, Patel V. A review on random forest: An ensemble classifier. In: International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2019;2018:758\u2013763. https:\/\/doi.org\/10.1007\/978-3-030-03146-6_86 .","DOI":"10.1007\/978-3-030-03146-6_86"},{"key":"9595_CR74","doi-asserted-by":"publisher","unstructured":"Pisner DA, Schnyer DM. Support vector machine. Machine Learning, 2020. 101\u2013121. Elsevier, UK. https:\/\/doi.org\/10.1016\/B978-0-12-815739-8.00006-7","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"9595_CR75","doi-asserted-by":"publisher","unstructured":"Zhang H, Li D. Na\u00efve bayes text classifier. In: 2007 IEEE International Conference on Granular Computing (GRC 2007), 2007;708\u2013708. https:\/\/doi.org\/10.1109\/GrC.2007.40 . IEEE","DOI":"10.1109\/GrC.2007.40"},{"key":"9595_CR76","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-59745-530-5_14","author":"TG Nick","year":"2007","unstructured":"Nick TG, Campbell KM. Logistic regression. Topics Biostat. 2007. https:\/\/doi.org\/10.1007\/978-1-59745-530-5_14.","journal-title":"Topics Biostat"},{"key":"9595_CR77","doi-asserted-by":"publisher","unstructured":"Ranjan G, Verma AK, Radhika S. K-nearest neighbors and grid search cv based real time fault monitoring system for industries. In: 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019;1\u20135. https:\/\/doi.org\/10.1109\/I2CT45611.2019.9033691. IEEE","DOI":"10.1109\/I2CT45611.2019.9033691"},{"key":"9595_CR78","doi-asserted-by":"publisher","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, Kudlur M, Levenberg J, Monga R, Moore S, Murray DG, Steiner B, Tucker P, Vasudevan V, Warden P, Wicke M, Yu Y, Zheng X. Tensorflow: a system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation. OSDI\u201916, pp. 265\u2013283. USENIX Association, USA. https:\/\/doi.org\/10.5555\/3026877.3026899 2016","DOI":"10.5555\/3026877.3026899"},{"key":"9595_CR79","doi-asserted-by":"publisher","unstructured":"Kingma DP, Ba J. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 2014 https:\/\/doi.org\/10.48550\/arXiv.1412.6980","DOI":"10.48550\/arXiv.1412.6980"},{"key":"9595_CR80","doi-asserted-by":"publisher","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L. ImageNet: A large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, 2009;248\u2013255. https:\/\/doi.org\/10.1109\/CVPR.2009.5206848. IEEE","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"9595_CR81","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1162\/tacl_a_00166","volume":"2","author":"P Young","year":"2014","unstructured":"Young P, Lai A, Hodosh M, Hockenmaier J. From image descriptions to visual denotations: New similarity metrics for semantic inference over event descriptions. Trans Assoc Computat Linguist. 2014;2:67\u201378. https:\/\/doi.org\/10.1162\/tacl_a_00166.","journal-title":"Trans Assoc Computat Linguist"},{"key":"9595_CR82","unstructured":"Barcha P. Old books dataset. https:\/\/github.com\/PedroBarcha\/old-books-dataset2017"},{"key":"9595_CR83","unstructured":"Aydos F. WebScreenshots. Kaggle. https:\/\/www.kaggle.com\/datasets\/aydosphd\/webscreenshots 2020"},{"key":"9595_CR84","doi-asserted-by":"publisher","unstructured":"Krishnan P, Kovvuri R, Pang G. Vassilev B, Hassner T. TextStyleBrush: Transfer of Text Aesthetics from a Single Example. https:\/\/doi.org\/10.1109\/TPAMI.2023.3239736 2021","DOI":"10.1109\/TPAMI.2023.3239736"},{"issue":"1","key":"9595_CR85","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s100320200071","volume":"5","author":"U-V Marti","year":"2002","unstructured":"Marti U-V, Bunke H. The IAM-database: an english sentence database for offline handwriting recognition. Int J Document Anal Recogn. 2002;5(1):39\u201346. https:\/\/doi.org\/10.1007\/s100320200071.","journal-title":"Int J Document Anal Recogn"},{"key":"9595_CR86","doi-asserted-by":"publisher","unstructured":"Lee AW, Chung J, Lee M. GNHK: A dataset for english handwriting in the wild. In: International Conference on Document Analysis and Recognition, 2021;399\u2013412. https:\/\/doi.org\/10.1007\/978-3-030-86337-1_27. Springer","DOI":"10.1007\/978-3-030-86337-1_27"},{"key":"9595_CR87","doi-asserted-by":"publisher","unstructured":"Konstantinidis S. Computing the levenshtein distance of a regular language. In: IEEE Information Theory Workshop, 2005., 2005;4. https:\/\/doi.org\/10.1109\/ITW.2005.1531868.","DOI":"10.1109\/ITW.2005.1531868"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09595-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09595-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09595-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T01:50:42Z","timestamp":1750125042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09595-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":87,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9595"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09595-1","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"1 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"123"}}