{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T18:35:40Z","timestamp":1777574140496,"version":"3.51.4"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072470"],"award-info":[{"award-number":["62072470"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272480"],"award-info":[{"award-number":["62272480"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety","award":["BTBD-2020KF01"],"award-info":[{"award-number":["BTBD-2020KF01"]}]},{"DOI":"10.13039\/501100005706","name":"Beijing Technology and Business University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005706","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002822","name":"Fundamental Research Funds for the Central Universities of Central South University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002822","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tcss.2022.3231687","type":"journal-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T18:57:00Z","timestamp":1672685820000},"page":"731-745","source":"Crossref","is-referenced-by-count":23,"title":["Visual Analysis of Money Laundering in Cryptocurrency Exchange"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4760-0551","authenticated-orcid":false,"given":"Fangfang","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"given":"Yunpeng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"given":"Chunyao","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9419-1519","authenticated-orcid":false,"given":"Lijia","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"given":"Xincheng","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"given":"Zengsheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing Technology and Business University, Chongqing, China"}]},{"given":"Xiaohui","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Data and Target Engineering, Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4141-0554","authenticated-orcid":false,"given":"Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beijing Technology and Business University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4200-5200","authenticated-orcid":false,"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-12-2017-0074"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-05-2019-0040"},{"key":"ref3","volume-title":"Bitcoin","year":"2022"},{"key":"ref4","volume-title":"Ethereum, a Community-Run Technology Powering the Cryptocurrency Ether","year":"2022"},{"key":"ref5","volume-title":"Litecoin","year":"2022"},{"key":"ref6","first-page":"10","article-title":"Bitcoin-asset or currency? Revealing users\u2019 hidden intentions","volume-title":"Proc. 22nd Eur. Conf. Inf. Syst.","author":"Glaser"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.26794\/2587-5671-2021-25-5-150-171"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2021.101982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10657-008-9070-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/17141-7780"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-02-2020-0018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2019.06.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS50802.2021.9394990"},{"key":"ref14","first-page":"102","article-title":"Rule-based anti-money laundering in financial intelligence units: Experience and vision","volume-title":"Proc. 4th Int. Joint Conf. Rules Reasoning","author":"Laurenza"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v7n1p103"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086230"},{"issue":"8","key":"ref18","first-page":"129","article-title":"Review on detection of suspicious transaction in anti-money laundering using data mining framework","volume":"1","author":"Rohit","year":"2015","journal-title":"Int. J. Innov. Res. Sci. Technol."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSE.2019.8823264"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-4007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X10374798"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059984"},{"key":"ref23","volume-title":"Xanalys Link Explorer","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3409073.3409080"},{"key":"ref25","article-title":"Anti-money laundering alert optimization using machine learning with graphs","author":"Eddin","year":"2021","journal-title":"arXiv:2112.07508"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363221"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449824"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441970"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487348"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3301403.3301407"},{"key":"ref32","first-page":"544","article-title":"Transaction characteristics of bitcoin","volume-title":"Proc. IEEE Int. Symp. Integr. Netw. Manage.","author":"Gebraselase"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5629"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00210"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3494557"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/nana.2019.00083"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.07.009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300083"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2963018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/VAST50239.2020.00014"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103139"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2021.3107297"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030338"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1089\/big.2015.0056"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312773"},{"key":"ref47","volume-title":"Bitbonkers, a Model to Visualizes Bitcoin Transactions and Blocks","year":"2022"},{"key":"ref48","volume-title":"Bitcoincity, Graphically Represent Bitcoin Transactions","year":"2022"},{"key":"ref49","volume-title":"Blockchain 3D Explorer","author":"Small","year":"2022"},{"key":"ref50","volume-title":"Bitinfocharts, a Tool to Provide Cryptocurrency Statistics","year":"2022"},{"key":"ref51","volume-title":"Coindesk, a Platform to Provide Cryptocurrency Trends and Analysis","year":"2022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.170623"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/fi8010007"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.000-3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3114821"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2021.3070303"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9524878"},{"key":"ref58","article-title":"Anomaly detection in the bitcoin system\u2014A network perspective","author":"Pham","year":"2016","journal-title":"arXiv:1611.03942"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00283"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864814"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1900532"},{"key":"ref62","first-page":"1","article-title":"Exploring entity behavior on the bitcoin blockchain","volume-title":"Proc. IEEE Conf. Visualizat.","author":"Isenberg"},{"key":"ref63","volume-title":"Binance, a Cryptocurrency Exchange Focused on Blockchain Assets","year":"2022"},{"key":"ref64","volume-title":"Huobi, a Bitcoin Transaction Exchange","year":"2022"},{"key":"ref65","volume-title":"Okex, a Platform to Provide Cryptocurrency Transaction Service","year":"2022"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-12-2017-0074"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref68","first-page":"493","article-title":"Learning from partially labeled data","volume-title":"Proc. 28th Eur. Symp. Artif. Neural Netw., Comput. Intell. Mach. Learn.","author":"Mehrkanoon"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.4324\/9780429200427-3"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83555-1_5"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5010001"},{"key":"ref72","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume-title":"Proc. Assoc. Comput. Machinery\u2019s Special Interest Group Knowl. Discovery Data Mining","author":"Ester"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2014.6814687"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01910-w"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/14738716211045005"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030404"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1177\/14738716211045005"},{"key":"ref78","volume-title":"Btcdo, a Tool to Provide Dashboard to Manage Bitcoin","year":"2022"},{"key":"ref79","volume-title":"Abacus, a Deceptively Simple Calculating Tool","year":"2022"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2020.103397"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3390\/s20102809"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3345640"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3338840.3355641"},{"issue":"5","key":"ref84","doi-asserted-by":"crossref","first-page":"473","DOI":"10.14778\/2735479.2735481","article-title":"YADING","volume":"8","author":"Ding","year":"2015","journal-title":"Proc. VLDB Endowment"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2871449"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3114793"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2745085"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec48167.2019.9161489"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.2985689"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864885"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030442"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/VAST50239.2020.00013"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10414252\/10005036.pdf?arnumber=10005036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T08:37:23Z","timestamp":1706776643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10005036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":92,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3231687","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}