{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:53:10Z","timestamp":1768312390037,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/brains49436.2020.9223269","type":"proceedings-article","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T20:00:57Z","timestamp":1602705657000},"page":"136-143","source":"Crossref","is-referenced-by-count":6,"title":["Generative Adversarial Networks for Bitcoin Data Augmentation"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Zola","sequence":"first","affiliation":[]},{"given":"Jan Lukas","family":"Bruse","sequence":"additional","affiliation":[]},{"given":"Xabier Etxeberria","family":"Barrio","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Galar","sequence":"additional","affiliation":[]},{"given":"Raul Orduna","family":"Urrutia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"issue":"6\u201310","key":"ref4","first-page":"71","article-title":"Blockchain technology: Beyond bitcoin","volume":"2","author":"Crosby","year":"2016","journal-title":"Applied Innovation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98074-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2018.8363576"},{"key":"ref9","article-title":"Nips 2016 tutorial: Generative adversarial networks","author":"Goodfellow","year":"2016"},{"key":"ref10","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.443"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref13","article-title":"Progressive growing of gans for improved quality, stability, and variation","author":"Karras"},{"key":"ref14","author":"Kingma","year":"2014","journal-title":"Adam: A method for stochastic optimization"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04335-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823249"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751410"},{"issue":"2","key":"ref18","first-page":"539","article-title":"Exploratory undersampling for class-imbalance learning","volume":"39","author":"Liu","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"ref19","article-title":"Bagan: Data augmentation with balancing gan","author":"Mariani","year":"2018"},{"key":"ref20","first-page":"131","article-title":"Expansion of cyber attack data from unbalanced datasets using generative adversarial networks","volume-title":"International Conference on Software Engineering Research, Management and Applications","author":"Merino"},{"key":"ref21","article-title":"Finger-gan: Generating realistic fingerprint images using connectivity imposed gan","author":"Minaee","year":"2018"},{"key":"ref22","first-page":"5585","article-title":"Gradient descent gan optimization is locally stable","author":"Nagarajan","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref23","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume-title":"Tech. rep., Manubot","author":"Nakamoto","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298623"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00536-8_1"},{"issue":"2","key":"ref27","first-page":"26","article-title":"Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude","volume":"4","author":"Tieleman","year":"2012","journal-title":"COURSERA: Neural networks for machine learning"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510583"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00946-5_11"},{"key":"ref30","article-title":"A cost-sensitive ensemble method for class-imbalanced datasets","volume-title":"Abstract and applied analysis","volume":"2013","author":"Zhang","year":"2013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/app9235003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00011"}],"event":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","location":"Paris, France","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,9,30]]}},"container-title":["2020 2nd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9218222\/9223268\/09223269.pdf?arnumber=9223269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:51:08Z","timestamp":1706061068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9223269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/brains49436.2020.9223269","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}