{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:36:34Z","timestamp":1772120194136,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011"],"award-info":[{"award-number":["112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011112-2119-M-A49-011"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Mach. Intell."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s42484-025-00302-3","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T10:36:36Z","timestamp":1753958196000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Bitcoin address classification using quantum-inspired feature selection"],"prefix":"10.1007","volume":"7","author":[{"given":"Ming-Fong","family":"Sie","sequence":"first","affiliation":[]},{"given":"Yen-Jui","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Chien-Lung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Ching-Ray","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Shih-Wei","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"302_CR1","doi-asserted-by":"publisher","first-page":"7162","DOI":"10.3390\/s22197162","volume":"22","author":"T Ashfaq","year":"2022","unstructured":"Ashfaq T et al (2022) A machine learning and blockchain based efficient fraud detection mechanism. Sensors 22:7162","journal-title":"Sensors"},{"key":"302_CR2","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1007\/s00181-020-01990-5","volume":"61","author":"DG Baur","year":"2021","unstructured":"Baur DG, Dimpfl T (2021) The volatility of Bitcoin and its role as a medium of exchange and a store of value. Emp Econ 61:2663\u20132683","journal-title":"Emp Econ"},{"key":"302_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332","journal-title":"Mach Learn"},{"key":"302_CR4","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1103\/RevModPhys.39.883","volume":"39","author":"SG Brush","year":"1967","unstructured":"Brush SG (1967) History of the Lenz-Ising model. Rev Mod Phys 39:883\u2013893","journal-title":"Rev Mod Phys"},{"key":"302_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MNANO.2024.3378485","volume":"18","author":"Y-J Chang","year":"2024","unstructured":"Chang Y-J et al (2024) Quantum computing for optimization with Ising machine. IEEE Nanatechnol Mag 18:15\u201322","journal-title":"IEEE Nanatechnol Mag"},{"key":"302_CR6","doi-asserted-by":"crossref","unstructured":"Chang Y-J, Sie M-F, Liao S-W, Chang C-R (2023) The prospects of quantum computing for quantitative finance and beyond. IEEE Nanatechnol Mag 17:31\u201337","DOI":"10.1109\/MNANO.2023.3249501"},{"key":"302_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"302_CR8","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"302_CR9","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273\u2013297","journal-title":"Mach Learn"},{"key":"302_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55:119\u2013139","journal-title":"J Comput Syst Sci"},{"key":"302_CR11","doi-asserted-by":"publisher","first-page":"349","DOI":"10.4310\/SII.2009.v2.n3.a8","volume":"2","author":"T Hastie","year":"2009","unstructured":"Hastie T, Rosset S, Zhu J, Zou H (2009) Multi-class AdaBoost. Stat Interf 2:349\u2013360","journal-title":"Stat Interf"},{"key":"302_CR12","doi-asserted-by":"crossref","unstructured":"Hauke P, Katzgraber H, Lechner W, Nishimori H, Oliver W (2019) Perspectives of quantum annealing: methods and implementations. Reports on Progress in Physics 83","DOI":"10.1088\/1361-6633\/ab85b8"},{"key":"302_CR13","unstructured":"Inc., D-WS (2023) dwave-neal: A Python simulated annealing sampler library. https:\/\/pypi.org\/project\/dwave-neal\/"},{"key":"302_CR14","unstructured":"Ke G et\u00a0al (2017) LightGBM: a highly efficient gradient boosting decision tree 3146\u20133154"},{"key":"302_CR15","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick S, Gelatt CD Jr, Vecchi MP (1983) Optimization by simulated annealing. Science 220:671\u2013680","journal-title":"Science"},{"key":"302_CR16","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1161\/CIRCULATIONAHA.106.682658","volume":"117","author":"MP LaValley","year":"2008","unstructured":"LaValley MP (2008) Logistic regression. Circulation 117:2395\u20132399","journal-title":"Circulation"},{"key":"302_CR17","doi-asserted-by":"crossref","unstructured":"Lin Y-J, Wu P-W, Hsu C-H, Tu I-P, Liao S-w (2019) An evaluation of bitcoin address classification based on transaction history summarization 302\u2013310","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"302_CR18","doi-asserted-by":"publisher","first-page":"665399","DOI":"10.3389\/fphy.2021.665399","volume":"9","author":"M Liu","year":"2021","unstructured":"Liu M, Chen H, Yan J (2021) Detecting roles of money laundering in bitcoin mixing transactions: a goal modeling and mining framework. Front Phys 9:665399","journal-title":"Front Phys"},{"key":"302_CR19","unstructured":"Louppe G, Wehenkel L, Sutera A, Geurts P (2013) Understanding variable importances in forests of randomized trees 431\u2013439"},{"key":"302_CR20","doi-asserted-by":"crossref","unstructured":"Mandal AK et\u00a0al (2021) An approach of feature subset selection using simulated quantum annealing 133\u2013146","DOI":"10.1007\/978-981-15-5616-6_10"},{"key":"302_CR21","unstructured":"Milne A, Rounds M, Goddard P (2017) Optimal feature selection in credit scoring and classification using a quantum annealer. https:\/\/1qbit.com. White Paper, 1QB Information Technologies"},{"key":"302_CR22","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review"},{"key":"302_CR23","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F et al (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"302_CR24","doi-asserted-by":"crossref","unstructured":"Rathore MM, Chaurasia S Shukla, D (2022) Mixers detection in bitcoin network: a step towards detecting money laundering in crypto-currencies 5775\u20135782","DOI":"10.1109\/BigData55660.2022.10020982"},{"key":"302_CR25","doi-asserted-by":"crossref","unstructured":"Seliya N, Khoshgoftaar T (2011) The use of decision trees for cost-sensitive classification: an empirical study in software quality prediction. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 1","DOI":"10.1002\/widm.38"},{"key":"302_CR26","doi-asserted-by":"crossref","unstructured":"Toyoda K, Ohtsuki T, Mathiopoulos PT (2018) Multi-class bitcoin-enabled service identification based on transaction history summarization 1153\u20131160","DOI":"10.1109\/Cybermatics_2018.2018.00208"},{"key":"302_CR27","doi-asserted-by":"crossref","unstructured":"Wu L et\u00a0al (2021) Towards understanding and demystifying Bitcoin mixing services 33\u201344","DOI":"10.1145\/3442381.3449880"},{"key":"302_CR28","doi-asserted-by":"crossref","unstructured":"Zweig MH, Campbell G (1993) Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. Clin Chem 39:561\u2013577","DOI":"10.1093\/clinchem\/39.4.561"}],"container-title":["Quantum Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-025-00302-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42484-025-00302-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-025-00302-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T09:37:26Z","timestamp":1769679446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42484-025-00302-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["302"],"URL":"https:\/\/doi.org\/10.1007\/s42484-025-00302-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-6147454\/v1","asserted-by":"object"}]},"ISSN":["2524-4906","2524-4914"],"issn-type":[{"value":"2524-4906","type":"print"},{"value":"2524-4914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"3 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"75"}}