{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:50:02Z","timestamp":1760986202677,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-18-CE23-0004"],"award-info":[{"award-number":["ANR-18-CE23-0004"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deanonymization is one of the major research challenges in the Bitcoin blockchain, as entities are pseudonymous and cannot be identified from the on-chain data. Various approaches exist to identify multiple addresses of the same entity, i.e., address clustering. But it is known that these approaches tend to find several clusters for the same actor. In this work, we propose to assign a fingerprint to entities based on the dynamic graph of the taint flow of money originating from them, with the idea that we could identify multiple clusters of addresses belonging to the same entity as having similar fingerprints. We experiment with different configurations to generate substructure patterns from taint flows before embedding them using representation learning models. To evaluate our method, we train classification models to identify entities from their fingerprints. Experiments show that our approach can accurately classify entities on three datasets. We compare different fingerprint strategies and show that including the temporality of transactions improves classification accuracy and that following the flow for too long impairs performance. Our work demonstrates that out-flow fingerprinting is a valid approach for recognizing multiple clusters of the same entity.<\/jats:p>","DOI":"10.1007\/s41109-023-00591-2","type":"journal-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T12:01:54Z","timestamp":1694779314000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fingerprinting Bitcoin entities using money flow representation learning"],"prefix":"10.1007","volume":"8","author":[{"given":"Natkamon","family":"Tovanich","sequence":"first","affiliation":[]},{"given":"R\u00e9my","family":"Cazabet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,15]]},"reference":[{"key":"591_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed M, Shumailov I, Anderson R (2019) Tendrils of crime: Visualizing the diffusion of stolen Bitcoins. In: Cybenko G, Pym D, Fila B (eds) Graphical Models for Security, pp 1\u201312. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-15465-3_1","DOI":"10.1007\/978-3-030-15465-3_1"},{"key":"591_CR2","doi-asserted-by":"publisher","unstructured":"Akcora C.G, Li Y, Gel Y.R, Kantarcioglu M (2020) BitcoinHeist: Topological data analysis for ransomware prediction on the Bitcoin blockchain. In: Bessiere, C. (ed.) Proceedings of the 29th international joint conference on artificial intelligence, pp. 4439\u20134445. https:\/\/doi.org\/10.24963\/ijcai.2020\/612","DOI":"10.24963\/ijcai.2020\/612"},{"key":"591_CR3","doi-asserted-by":"publisher","unstructured":"Bartoletti M, Pes B, Serusi S (2018) Data mining for detecting Bitcoin ponzi schemes. In: 2018 Crypto valley conference on blockchain technology, pp. 75\u201384. https:\/\/doi.org\/10.1109\/CVCBT.2018.00014","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"591_CR4","doi-asserted-by":"publisher","first-page":"148353","DOI":"10.1109\/ACCESS.2021.3123894","volume":"9","author":"M Bartoletti","year":"2021","unstructured":"Bartoletti M, Lande S, Loddo A, Pompianu L, Serusi S (2021) Cryptocurrency scams: analysis and perspectives. IEEE Access 9:148353\u2013148373. https:\/\/doi.org\/10.1109\/ACCESS.2021.3123894","journal-title":"IEEE Access"},{"key":"591_CR5","doi-asserted-by":"publisher","unstructured":"Bellei C, Alattas H, Kaaniche N (2021) Label-GCN: an effective method for adding label propagation to graph convolutional networks. https:\/\/doi.org\/10.48550\/ARXIV.2104.02153","DOI":"10.48550\/ARXIV.2104.02153"},{"key":"591_CR6","unstructured":"Chainalysis Team (2022) The 2022 Crypto Crime Report. Chainalysis Inc., New York, NY, USA. Accessed 28 Feb 2022. https:\/\/go.chainalysis.com\/2022-Crypto-Crime-Report.html"},{"key":"591_CR7","unstructured":"CoinMarketCap (2023): Bitcoin market price. Accessed 28 Feb. https:\/\/coinmarketcap.com\/currencies\/bitcoin\/"},{"key":"591_CR8","doi-asserted-by":"publisher","unstructured":"Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the Bitcoin transaction graph. In: 2015 IEEE symposium on visualization for cyber security, pp 1\u20138. https:\/\/doi.org\/10.1109\/VIZSEC.2015.7312773","DOI":"10.1109\/VIZSEC.2015.7312773"},{"key":"591_CR9","doi-asserted-by":"publisher","unstructured":"Goldfeder S, Kalodner H, Reisman D, Narayanan A (2017) When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. https:\/\/doi.org\/10.48550\/ARXIV.1708.04748","DOI":"10.48550\/ARXIV.1708.04748"},{"issue":"1","key":"591_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-020-00261-7","volume":"5","author":"D Goldsmith","year":"2020","unstructured":"Goldsmith D, Grauer K, Shmalo Y (2020) Analyzing hack subnetworks in the Bitcoin transaction graph. Appl Netw Sci 5(1):1\u201320. https:\/\/doi.org\/10.1007\/s41109-020-00261-7","journal-title":"Appl Netw Sci"},{"key":"591_CR11","doi-asserted-by":"publisher","unstructured":"Gomez G, Moreno-Sanchez P, Caballero J (2022) Watch your back: Identifying cybercrime financial relationships in Bitcoin through back-and-forth exploration. In: Proceedings of the 2022 ACM SIGSAC conference on computer and communications security, pp. 1291\u20131305. ACM, New York. https:\/\/doi.org\/10.1145\/3548606.3560587","DOI":"10.1145\/3548606.3560587"},{"key":"591_CR12","doi-asserted-by":"publisher","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp. 855\u2013864. ACM, New York. https:\/\/doi.org\/10.1145\/2939672.2939754","DOI":"10.1145\/2939672.2939754"},{"key":"591_CR13","doi-asserted-by":"publisher","unstructured":"Harlev M.A, Sun Yin H, Langenheldt K.C, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the Bitcoin blockchain using supervised machine learning. In: The 51st Hawaii international conference on system sciences. https:\/\/doi.org\/10.24251\/HICSS.2018.443","DOI":"10.24251\/HICSS.2018.443"},{"key":"591_CR14","doi-asserted-by":"publisher","unstructured":"Harrigan M, Fretter C (2016) The unreasonable effectiveness of address clustering. In: 2016 Intl IEEE conferences on ubiquitous intelligence & computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress, pp. 368\u2013373. https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"591_CR15","doi-asserted-by":"publisher","unstructured":"Huang Z, Huang Y, Qian P, Chen J, He Q (2022) Demystifying Bitcoin address behavior via graph neural networks. https:\/\/doi.org\/10.48550\/ARXIV.2211.14582","DOI":"10.48550\/ARXIV.2211.14582"},{"key":"591_CR16","doi-asserted-by":"publisher","unstructured":"Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the Bitcoin network. https:\/\/doi.org\/10.48550\/ARXIV.1912.12060","DOI":"10.48550\/ARXIV.1912.12060"},{"key":"591_CR17","doi-asserted-by":"publisher","unstructured":"Ivanov S, Burnaev E (2018) Anonymous walk embeddings. https:\/\/doi.org\/10.48550\/ARXIV.1805.11921","DOI":"10.48550\/ARXIV.1805.11921"},{"key":"591_CR18","unstructured":"Janda A (2023) WalletExplorer.com. Accessed 28 Feb. https:\/\/www.walletexplorer.com\/info"},{"key":"591_CR19","doi-asserted-by":"publisher","unstructured":"Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the Bitcoin blockchain. In: IEEE international conference on data mining workshops, pp. 55\u201362. IEEE, Singapore. https:\/\/doi.org\/10.1109\/ICDMW.2018.00016","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"591_CR20","doi-asserted-by":"publisher","unstructured":"Kalodner H, M\u00f6ser M, Lee K, Goldfeder S, Plattner M, Chator A, Narayanan A (2020) BlockSci: Design and applications of a blockchain analysis platform. In: Proceedings of the 29th USENIX conference on security symposium. USENIX Association, USA. https:\/\/doi.org\/10.5555\/3489212.3489365","DOI":"10.5555\/3489212.3489365"},{"issue":"2","key":"591_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor D, P\u00f3sfai M, Csabai I, Vattay G (2014) Do the rich get richer? an empirical analysis of the Bitcoin transaction network. PLoS ONE 9(2):1\u201310. https:\/\/doi.org\/10.1371\/journal.pone.0086197","journal-title":"PLoS ONE"},{"key":"591_CR22","doi-asserted-by":"publisher","unstructured":"Le QV, Mikolov T (2014) Distributed representations of sentences and documents. https:\/\/doi.org\/10.48550\/ARXIV.1405.4053","DOI":"10.48550\/ARXIV.1405.4053"},{"key":"591_CR23","doi-asserted-by":"publisher","unstructured":"Lin YJ, Wu P.-W, Hsu C.-H, Tu I.-P, Liao S.-w (2019) An evaluation of Bitcoin address classification based on transaction history summarization. In: 2019 IEEE international conference on blockchain and cryptocurrency, pp. 302\u2013310. https:\/\/doi.org\/10.1109\/BLOC.2019.8751410","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"591_CR24","doi-asserted-by":"publisher","unstructured":"Lischke M, Fabian B (2016) Analyzing the Bitcoin network: the first four years. Future Internet, 8(1) https:\/\/doi.org\/10.3390\/fi8010007","DOI":"10.3390\/fi8010007"},{"issue":"1","key":"591_CR25","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1140\/epjds\/s13688-021-00276-9","volume":"10","author":"XF Liu","year":"2021","unstructured":"Liu XF, Ren H-H, Liu S-H, Jiang X-J (2021) Characterizing key agents in the cryptocurrency economy through blockchain transaction analysis. EPJ Data Sci 10(1):21. https:\/\/doi.org\/10.1140\/epjds\/s13688-021-00276-9","journal-title":"EPJ Data Sci"},{"issue":"1","key":"591_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-019-0163-y","volume":"4","author":"DDF Maesa","year":"2019","unstructured":"Maesa DDF, Marino A, Ricci L (2019) The bow tie structure of the Bitcoin users graph. Appl Netw Sci 4(1):1\u201322. https:\/\/doi.org\/10.1007\/s41109-019-0163-y","journal-title":"Appl Netw Sci"},{"issue":"4","key":"591_CR27","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2896384","volume":"59","author":"S Meiklejohn","year":"2016","unstructured":"Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2016) A fistful of Bitcoins: characterizing payments among men with no names. Commun ACM 59(4):86\u201393. https:\/\/doi.org\/10.1145\/2896384","journal-title":"Commun ACM"},{"key":"591_CR28","doi-asserted-by":"publisher","first-page":"109639","DOI":"10.1109\/ACCESS.2020.3001676","volume":"8","author":"R Michalski","year":"2020","unstructured":"Michalski R, Dziuba\u0142towska D, Macek P (2020) Revealing the character of nodes in a blockchain with supervised learning. IEEE Access 8:109639\u2013109647. https:\/\/doi.org\/10.1109\/ACCESS.2020.3001676","journal-title":"IEEE Access"},{"issue":"5594","key":"591_CR29","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1126\/science.298.5594.824","volume":"298","author":"R Milo","year":"2002","unstructured":"Milo R, Shen-Orr S, Itzkovitz S, Kashtan N, Chklovskii D, Alon U (2002) Network motifs: simple building blocks of complex networks. Science 298(5594):824\u2013827. https:\/\/doi.org\/10.1126\/science.298.5594.824","journal-title":"Science"},{"key":"591_CR30","doi-asserted-by":"publisher","unstructured":"M\u00f6ser M, Narayanan A (2022) Resurrecting address clustering in Bitcoin. In: Eyal I, Garay J (eds) Financial Cryptography and Data Security, pp 386\u2013403. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-18283-9_19","DOI":"10.1007\/978-3-031-18283-9_19"},{"key":"591_CR31","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Technical report. Accessed 28 Feb 2023. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"591_CR32","doi-asserted-by":"publisher","unstructured":"Narayanan A, Chandramohan M, Venkatesan R, Chen L, Liu Y, Jaiswal S (2017) graph2vec: learning distributed representations of graphs. https:\/\/doi.org\/10.48550\/ARXIV.1707.05005","DOI":"10.48550\/ARXIV.1707.05005"},{"key":"591_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102940","volume":"177","author":"P Nerurkar","year":"2021","unstructured":"Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2021) Dissecting Bitcoin blockchain: empirical analysis of Bitcoin network (2009\u20132020). J Netw Comput Appl 177:102940. https:\/\/doi.org\/10.1016\/j.jnca.2020.102940","journal-title":"J Netw Comput Appl"},{"key":"591_CR34","doi-asserted-by":"publisher","unstructured":"Qu L, Zhu H, Duan Q, Shi Y (2020) Continuous-time link prediction via temporal dependent graph neural network. In: Proceedings of the web conference 2020, pp. 3026\u20133032. ACM, New York. https:\/\/doi.org\/10.1145\/3366423.3380073","DOI":"10.1145\/3366423.3380073"},{"key":"591_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2022.102094","volume":"142","author":"R Ramos Tubino","year":"2022","unstructured":"Ramos Tubino R, Robardet C, Cazabet R (2022) Towards a better identification of Bitcoin actors by supervised learning. Data Knowl Eng 142:102094. https:\/\/doi.org\/10.1016\/j.datak.2022.102094","journal-title":"Data Knowl Eng"},{"key":"591_CR36","doi-asserted-by":"publisher","unstructured":"Reid F, Harrigan M (2013) An analysis of anonymity in the Bitcoin system. In: Altshuler Y, Elovici Y, Cremers AB, Aharony N, Pentland, A. (eds.) Security and privacy in social networks, pp 197\u2013223. Springer, New York. https:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"591_CR37","doi-asserted-by":"publisher","unstructured":"Cazabet R, Rym B, and Latapy M (2018) Tracking Bitcoin users activity using community detection on a network of weak signals. In: Cherifi, C., Cherifi, H., Karsai, M., Musolesi, M. (eds.) Complex networks & their applications VI, pp. 166\u2013177. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-72150-7_14","DOI":"10.1007\/978-3-319-72150-7_14"},{"key":"591_CR38","doi-asserted-by":"publisher","unstructured":"Tironsakkul T, Maarek M, Eross A, Just M (2019) Probing the mystery of cryptocurrency theft: an investigation into methods for taint analysis. https:\/\/doi.org\/10.48550\/ARXIV.1906.05754","DOI":"10.48550\/ARXIV.1906.05754"},{"issue":"3","key":"591_CR39","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1109\/TNSM.2022.3159004","volume":"19","author":"N Tovanich","year":"2022","unstructured":"Tovanich N, Souli\u00e9 N, Heulot N, Isenberg P (2022) The evolution of mining pools and miners\u2019s behaviors in the Bitcoin blockchain. IEEE Trans Netw Serv Manage 19(3):3633\u20133644. https:\/\/doi.org\/10.1109\/TNSM.2022.3159004","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"591_CR40","doi-asserted-by":"publisher","unstructured":"Tovanich N, Cazabet R (2023) Pattern analysis of money flows in the Bitcoin blockchain. In: Cherifi H, Mantegna RN, Rocha LM, Cherifi C, Miccich\u00e8 S (eds.) Complex Networks and Their Applications XI, pp. 443\u2013455. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-21127-0_36","DOI":"10.1007\/978-3-031-21127-0_36"},{"key":"591_CR41","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00286","author":"N Vallarano","year":"2020","unstructured":"Vallarano N, Tessone CJ, Squartini T (2020) Bitcoin transaction networks: an overview of recent results. Front Phys. https:\/\/doi.org\/10.3389\/fphy.2020.00286","journal-title":"Front Phys"},{"issue":"86","key":"591_CR42","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9(86):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"591_CR43","doi-asserted-by":"publisher","unstructured":"Weber M, Domeniconi G, Chen J, Weidele D.K.I, Bellei C, Robinson T, Leiserson C.E (2019) Anti-money laundering in Bitcoin: Experimenting with graph convolutional networks for financial forensics. In: KDD workshop on anomaly detection in finance. https:\/\/doi.org\/10.48550\/arXiv.1908.02591","DOI":"10.48550\/arXiv.1908.02591"},{"issue":"4","key":"591_CR44","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1109\/TSMC.2021.3049278","volume":"52","author":"J Wu","year":"2022","unstructured":"Wu J, Liu J, Chen W, Huang H, Zheng Z, Zhang Y (2022) Detecting mixing services via mining Bitcoin transaction network with hybrid motifs. IEEE Trans Syst Man Cybern Syst 52(4):2237\u20132249. https:\/\/doi.org\/10.1109\/TSMC.2021.3049278","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"591_CR45","doi-asserted-by":"publisher","unstructured":"Xiang Y, Lei Y, Bao D, Ren W, Li T, Yang Q, Liu W, Zhu T, Choo KKR (2022) BABD: a Bitcoin address behavior dataset for pattern analysis. https:\/\/doi.org\/10.48550\/ARXIV.2204.05746","DOI":"10.48550\/ARXIV.2204.05746"},{"key":"591_CR46","doi-asserted-by":"publisher","unstructured":"Zola F, Eguimendia M, Bruse J.L, Urrutia R.O (2019) Cascading machine learning to attack Bitcoin anonymity. In: IEEE international conference on blockchain, pp. 10\u201317. IEEE, Atlanta. https:\/\/doi.org\/10.1109\/Blockchain.2019.00011","DOI":"10.1109\/Blockchain.2019.00011"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-023-00591-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-023-00591-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-023-00591-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T20:02:54Z","timestamp":1700337774000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-023-00591-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,15]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["591"],"URL":"https:\/\/doi.org\/10.1007\/s41109-023-00591-2","relation":{},"ISSN":["2364-8228"],"issn-type":[{"type":"electronic","value":"2364-8228"}],"subject":[],"published":{"date-parts":[[2023,9,15]]},"assertion":[{"value":"1 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"63"}}