{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T01:10:37Z","timestamp":1778375437808,"version":"3.51.4"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1401300"],"award-info":[{"award-number":["2017YFB1401300"]}]},{"name":"National Key R&D Program of China","award":["2017YFB1401304"],"award-info":[{"award-number":["2017YFB1401304"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2881431","type":"journal-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T19:56:26Z","timestamp":1542743786000},"page":"71208-71215","source":"Crossref","is-referenced-by-count":36,"title":["Learning to Classify Blockchain Peers According to Their Behavior Sequences"],"prefix":"10.1109","volume":"6","author":[{"given":"Huayun","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0284-2661","authenticated-orcid":false,"given":"Yingying","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Butian","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Changting","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Bei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","author":"zeiler","year":"2012","journal-title":"ADADELTA An Adaptive Learning Rate Method"},{"key":"ref31","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref30","first-page":"37","article-title":"Autoencoders, unsupervised learning, and deep architectures","author":"baldi","year":"2012","journal-title":"Proc ICML Workshop Unsupervised Transfer Learn"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref13","first-page":"5:1","article-title":"Blockchain-based consensus (keynote)","author":"garay","year":"2015","journal-title":"9th Intl Conf on Principles of Distributed Systems (OPODIS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref17","first-page":"112","article-title":"The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication","author":"vukoli?","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Secur (IFIP WG iNetSec)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994784"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066213"},{"key":"ref28","author":"signorini","year":"2018","journal-title":"BAD Blockchain anomaly detection"},{"key":"ref4","first-page":"1861","article-title":"On the security and scalability of bitcoin&#x2019;s blockchain","author":"karame","year":"2016","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref27","article-title":"Dual-stream recurrent neural network for video captioning","author":"xu","year":"0","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v20i12.6198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"ref29","first-page":"18","article-title":"A simulation approach for studying behavior and quality of blockchain networks","author":"wang","year":"2018","journal-title":"Proc Blockchain-ICBC 1st Int Conf Held Services Conf Fed (SCF)"},{"key":"ref5","first-page":"747","article-title":"Beyond bitcoin&#x2014;Part II: Blockchain-based systems without mining","author":"forte","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref8","first-page":"1","article-title":"Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the Internet of money","volume":"abs 1511 5740","author":"peters","year":"2015","journal-title":"CoRR"},{"key":"ref7","first-page":"106","article-title":"On scaling decentralized blockchains&#x2014;(A position paper)","author":"croman","year":"2016","journal-title":"Proc Int Workshops Financial Cryptogr Data Secur (FC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4396-4"},{"key":"ref9","first-page":"1","article-title":"Blockchain in Internet of Things: Challenges and solutions","volume":"abs 1608 5187","author":"dorri","year":"2016","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994784"},{"key":"ref22","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"kotsiantis","year":"2007","journal-title":"Informatica"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247544"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00110-0"},{"key":"ref26","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref25","first-page":"1","article-title":"Rectifier nonlinearities improve neural network acoustic models","author":"maas","year":"2013","journal-title":"Proc ICML"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08540828.pdf?arnumber=8540828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:13:39Z","timestamp":1643220819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8540828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2881431","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}