{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:23:28Z","timestamp":1774099408532,"version":"3.50.1"},"reference-count":228,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100007567","name":"City University of Hong Kong Strategic Research","doi-asserted-by":"publisher","award":["7005405"],"award-info":[{"award-number":["7005405"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3062652","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T20:48:46Z","timestamp":1614372526000},"page":"37229-37254","source":"Crossref","is-referenced-by-count":74,"title":["Knowledge Discovery in Cryptocurrency Transactions: A Survey"],"prefix":"10.1109","volume":"9","author":[{"given":"Xiao Fan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xin-Jian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Si-Hao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chi Kong","family":"Tse","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921087"},{"key":"ref172","first-page":"101","article-title":"Analyzing the bitcoin Ponzi scheme ecosystem","author":"vasek","year":"2018","journal-title":"Proc 22nd Int Conf Financial Cryptogr Data Secur (FC)"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"ref174","first-page":"520","article-title":"Toward detecting illegal transactions on bitcoin using machine-learning methods","author":"lee","year":"2019","journal-title":"Proc Int Conf Blockchain Trustworthy Syst"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34223-4_2"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113318"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00042"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905769"},{"key":"ref168","author":"hamrick","year":"2018","journal-title":"An Examination of the Cryptocurrency Pump and Dump Ecosystem"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref39","year":"2019","journal-title":"Position Paper Regulation of Virtual Asset Trading Platforms"},{"key":"ref38","year":"2020","journal-title":"Tornado Cash"},{"key":"ref33","author":"perez","year":"2015","journal-title":"2 Former Federal Agents Charged With Stealing Bitcoin During Silk Road Probe"},{"key":"ref32","author":"dougherty","year":"2014","journal-title":"Mt Gox Seeks Bankruptcy After $480 Million Bitcoin Loss"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0033"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3323163"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001676"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00011"},{"key":"ref185","article-title":"Impact of graph-based features on bitcoin prices","author":"van schetsen","year":"2019"},{"key":"ref184","article-title":"Automated bitcoin trading via machine learning algorithms","author":"madan","year":"2015"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1550550"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.3390\/math7100898"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779181"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393351"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1002\/cjs.11547"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmoneco.2017.12.004"},{"key":"ref27","author":"buterin","year":"2014","journal-title":"A Next Generation Smart Contract and Decentralized Application Platform Ethereum white Paper"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823249"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508273"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2818623"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref26","year":"2013","journal-title":"Ponzi Schemes Using Virtual Currencies"},{"key":"ref25","year":"2017","journal-title":"Bitcoin Wiki Laszlo Hanyecz"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3205230.3205234"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345663"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.04.123"},{"key":"ref153","article-title":"Using the bitcoin transaction graph to predict the price of bitcoin","author":"greaves","year":"2015"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.08.051"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.07.032"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2016.10.033"},{"key":"ref152","author":"buchholz","year":"2012","journal-title":"Bits and Bets Information Price Volatility and Demand for Bitcoin"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-37773-3"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-03-2017-0059"},{"key":"ref147","author":"sedgwick","year":"2017","journal-title":"The Ethereum Blockchain is Congested by Cats"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2017.09.013"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2017.12.006"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973291"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-118"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180817"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/321906.321909"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80044-9"},{"key":"ref40","author":"peterson","year":"2017","journal-title":"Transaction Linkability"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737364"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.3934\/QFE.2020017"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm12020067"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123107"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1038\/srep03415"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.150288"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331304"},{"key":"ref160","article-title":"Homogeneity and heterogeneity of cryptocurrencies","author":"fan liu","year":"2019","journal-title":"arXiv 1910 01330"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"ref3","year":"2020","journal-title":"Ethereum blockchain explorer"},{"key":"ref6","author":"nilsson","year":"2017","journal-title":"Breaking open the MtGox case part 1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_1"},{"key":"ref8","first-page":"1","article-title":"Challenges of cryptocurrencies forensics&#x2014;A case study of investigating, evidencing and prosecuting organised cybercriminals","author":"naqvi","year":"2018","journal-title":"Proc 13th Int Conf Availability Rel Secur (ARES)"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2019.01.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945049"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2015.10.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-01-2016-0003"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.170623"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2867497"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055528"},{"key":"ref47","article-title":"On the linkability of Zcash transactions","author":"quesnelle","year":"2017","journal-title":"arXiv 1712 01210"},{"key":"ref42","article-title":"Data-driven de-anonymization in bitcoin","author":"nick","year":"2015"},{"key":"ref41","article-title":"Improving obfuscation in the cryptonote protocol","author":"mackenzie","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5629"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_16"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93040-4_60"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751401"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.013"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96661-8_45"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-017-0074-x"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/fi8010007"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/app9122519"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802711"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"ref61","first-page":"463","article-title":"An empirical analysis of anonymity in Zcash","author":"kappos","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref63","first-page":"153","article-title":"A traceability analysis of Monero&#x2019;s blockchain","author":"kumar","year":"2017","journal-title":"Proc 22nd Eur Symp Res Comput Secur"},{"key":"ref64","author":"johnson","year":"2002","journal-title":"Emergence The Connected Lives of Ants Brains Cities and Software"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-014-1024-9"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198805090.001.0001"},{"key":"ref67","author":"holtz","year":"2013","journal-title":"Evolutionary structural analysis of the bitcoin network"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0202202"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30569-1_21"},{"key":"ref197","article-title":"Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network","author":"hirshman","year":"2013"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2018-80674-y"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00028"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990659"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05129-6"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1063\/5.0002759"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"ref95","article-title":"Detecting Bot activity in the Ethereum blockchain network","author":"zwang","year":"2018","journal-title":"arXiv 1810 01591"},{"key":"ref94","article-title":"Anomaly detection in the bitcoin system&#x2014;A network perspective","author":"pham","year":"2016","journal-title":"arXiv 1611 03942"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.11.038"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927707"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225966"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2019.112395"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101108"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aba062"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5493"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-9900-9"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of &#x2018;small-world&#x2019; networks","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref82","year":"0","journal-title":"Glassnode Studio"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00034"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0219346"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941448"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644930"},{"key":"ref85","first-page":"369","article-title":"Exploring the bitcoin network","author":"baumann","year":"2014","journal-title":"Proc 10th Int Conf Web Inf Syst Technol (WEBIST)"},{"key":"ref86","author":"sorgente","year":"2014","journal-title":"The Reaction of a Network Exploring the Relationship Between the Bitcoin Network Structure and the Bitcoin Price"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-61346-y"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.109"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09796-5"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72150-7_14"},{"key":"ref209","year":"2020","journal-title":"Rusty-Blockparser"},{"key":"ref203","year":"2020","journal-title":"Blockchain2graph"},{"key":"ref204","year":"2020","journal-title":"BlockSci"},{"key":"ref201","year":"2020","journal-title":"BlockCypher"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"ref207","year":"2020","journal-title":"Blocketl"},{"key":"ref208","year":"2020","journal-title":"BlockParser"},{"key":"ref205","year":"2020","journal-title":"Btcspark"},{"key":"ref206","year":"2020","journal-title":"Bitcoin-Blockchain-Parser"},{"key":"ref211","year":"2020","journal-title":"Bitcoinuses"},{"key":"ref210","year":"2020","journal-title":"Btctrackr"},{"key":"ref212","year":"2020","journal-title":"Blockchain ETL"},{"key":"ref213","first-page":"329","article-title":"A suite of tools for the forensic analysis of bitcoin transactions: Preliminary report","author":"bistarelli","year":"2018","journal-title":"Proc Eur Conf Parallel Process"},{"key":"ref214","year":"0","journal-title":"Ether_Sql"},{"key":"ref215","year":"0","journal-title":"Blockapi Blockchain Analytics API"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55699-4_34"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00137"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref219","first-page":"1317","article-title":"TeeTher: Gnawing at Ethereum to automatically exploit smart contracts","author":"krupp","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref220","first-page":"1371","article-title":"Erays: Reverse engineering Ethereum&#x2019;s opaque smart contracts","author":"zhou","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864814"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312773"},{"key":"ref228","year":"2017","journal-title":"Investor Bulletin Initial Coin Offerings"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.52"},{"key":"ref226","first-page":"837","article-title":"Tracing transactions across cryptocurrency ledgers","author":"yousaf","year":"2019","journal-title":"Proc 28th USENIX Secur Symp"},{"key":"ref225","year":"2020","journal-title":"goBlockchaindataanalysis"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1900532"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00210"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_22"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328741"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/SRDSW49218.2019.00015"},{"key":"ref124","first-page":"919","article-title":"Bitcoin mining pools: A cooperative game theoretic analysis","author":"lewenberg","year":"2015","journal-title":"Proc 14th Int Conf Auton Agents Multiagent Syst (AAMAS)"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_18"},{"key":"ref128","article-title":"A deep dive into bitcoin mining pools: An empirical analysis of mining shares","author":"romiti","year":"2019","journal-title":"arXiv 1905 05999"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3306309.3306328"},{"key":"ref133","first-page":"450","article-title":"Tracking the circulation routes of fresh coins in bitcoin: A way to identify coinminers based on transaction network structural properties","volume":"10","author":"lin","year":"2018","journal-title":"J Nanjing Univ Sci Technol"},{"key":"ref134","article-title":"Bitcoin transaction graph analysis","author":"fleder","year":"2015","journal-title":"arXiv 1502 01657"},{"key":"ref131","article-title":"Analysis of bitcoin pooled mining reward systems","author":"rosenfeld","year":"2011","journal-title":"arXiv 1112 4980"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2018.8548376"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233258"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref138","article-title":"Characterizing and detecting money laundering activities on the bitcoin network","author":"hu","year":"2019","journal-title":"arXiv 1912 12060"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00208"},{"key":"ref139","article-title":"Detecting mixing services via mining bitcoin transaction network with hybrid motifs","author":"wu","year":"2020","journal-title":"arXiv 2001 05233"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_18"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00047"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_10"},{"key":"ref143","author":"yanovich","year":"2016","journal-title":"Shared Send Untangling in Bitcoin"},{"key":"ref2","year":"2020","journal-title":"Blockchain Explorer"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.48"},{"key":"ref1","year":"2020","journal-title":"CoinMarketCap"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"ref109","year":"2020","journal-title":"Elliptic"},{"key":"ref108","year":"2020","journal-title":"Walletexplorer"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200894"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254420"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00010"},{"key":"ref104","first-page":"2267e","article-title":"An empirical analysis of source code metrics and smart contract resource consumption","volume":"32","author":"ajienka","year":"2020","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921936"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278575"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.443"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnx019"},{"key":"ref110","year":"2020","journal-title":"Chainalysis"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2896384"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/16\/12\/125003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2018.07.039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914098"},{"key":"ref16","first-page":"1368","article-title":"Modeling of bitcoin&#x2019;s blockchain delivery network","volume":"7","author":"mi\u0161i?","year":"2019","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2016.09.019"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3366370"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.23919\/ISITA.2018.8664236"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2017.05.001"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"ref120","article-title":"Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics","author":"weber","year":"2019","journal-title":"arXiv 1908 02591"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038513"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2130"},{"key":"ref123","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in Ethereum smart contracts","author":"torres","year":"2019","journal-title":"Proc 28th USENIX Secur Symp"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09364978.pdf?arnumber=9364978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:06Z","timestamp":1639771026000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9364978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":228,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3062652","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}