{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:43:31Z","timestamp":1775850211488,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973325"],"award-info":[{"award-number":["61973325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025"],"award-info":[{"award-number":["62032025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundations of Guangdong Province","award":["2021A1515011661"],"award-info":[{"award-number":["2021A1515011661"]}]},{"name":"Guangzhou Basic and Applied Basic Research Project","award":["202102020616"],"award-info":[{"award-number":["202102020616"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/ojcs.2023.3245801","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T23:08:42Z","timestamp":1676588922000},"page":"37-49","source":"Crossref","is-referenced-by-count":97,"title":["Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1289-2603","authenticated-orcid":false,"given":"Kaixin","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7067-2396","authenticated-orcid":false,"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Ziye","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7035-6446","authenticated-orcid":false,"given":"Huawei","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-Sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"ref2","article-title":"The metaverse: Web3.0 virtual cloud economies","author":"Research","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2022.3181504"},{"key":"ref4","article-title":"Web3 beyond the hype","author":"Banerjee","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3381036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3386\/w27136"},{"key":"ref10","article-title":"The metaverse fraud question: What are the risks?","author":"Kadar","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/1137585"},{"key":"ref12","volume-title":"The Con Game and Yellow Kid Weil","author":"Weil","year":"1948"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123894"},{"key":"ref14","article-title":"The future of financial crime in the metaverse","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201709.19(5).01"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94478-4_6"},{"key":"ref19","article-title":"$100,000 worth of NFTs disappear forever, thanks to OpenSea bug","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615702"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3144763"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIFEr.2014.6924058"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.126405"},{"key":"ref24","article-title":"The chainalysis 2021 NFT market report","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449824"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2022.103374"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559342"},{"key":"ref28","article-title":"Study guide for the CAMS","year":"2012"},{"key":"ref29","article-title":"What is money laundering","year":"2021"},{"key":"ref30","article-title":"Anti-money laundering (AML)","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1108\/intr-08-2022-0666"},{"key":"ref32","article-title":"Identity, crimes, and law enforcement in the metaverse","author":"Qin","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref36","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103139"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_33"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3161112"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3166655"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/612"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00043"},{"key":"ref44","first-page":"837","article-title":"Tracing transactions across cryptocurrency ledgers","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Yousaf","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3093384"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00204"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3177898"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.127504"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3208471"},{"key":"ref51","article-title":"CERTIKs HACK3D: The Web3 security quarterly report","year":"2022"},{"key":"ref52","article-title":"Mid-year blockchain security and anti-money laundering analysis report","year":"2022"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/jfc-06-2022-0124"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1108\/jfc-09-2021-0218"},{"key":"ref55","doi-asserted-by":"crossref","DOI":"10.3386\/w25407","article-title":"Blockchain economics","author":"Abadi","year":"2018"},{"key":"ref56","article-title":"Guidance for a risk-based approach to virtual assets and virtual asset service providers","author":"Force","year":"2019"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10657-019-09609-6"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4082648"},{"issue":"7","key":"ref59","first-page":"270","article-title":"Legal measures for crimes in the field of cryptocurrency billing","volume":"25","author":"Bokovnya","year":"2020","journal-title":"Utopa y Praxis Latinoamericana"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1108\/jmlc-05-2020-0060"},{"key":"ref61","article-title":"Liechtenstein: Parliament adopts blockchain act","year":"2019"},{"key":"ref62","article-title":"IPFS-content addressed, versioned, p2p file system","author":"Benet","year":"2014"},{"key":"ref63","article-title":"DeFiRanger: Detecting price manipulation attacks on DeFi applications","author":"Wu","year":"2021"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00047"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"ref66","article-title":"The chainalysis state of web3 report","year":"2022"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2990458"},{"key":"ref68","article-title":"Transaction tracking on blockchain trading systems using personalized PageRank","author":"Wu","year":"2022"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1080\/26941899.2022.2151950"},{"key":"ref71","article-title":"Data containing transaction history and visual traits of eight highly valued non-fungible token (NFT) collections","author":"Serneels","year":"2022"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1017\/aju.2021.66"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782664\/10016900\/10045768.pdf?arnumber=10045768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T15:17:05Z","timestamp":1707837425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10045768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2023.3245801","relation":{},"ISSN":["2644-1268"],"issn-type":[{"value":"2644-1268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}