{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:05:54Z","timestamp":1778346354331,"version":"3.51.4"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS Grants-in-Aid for Scientific Research","award":["JP19K20258"],"award-info":[{"award-number":["JP19K20258"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1003500"],"award-info":[{"award-number":["2018YFB1003500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC Research Impact Fund","award":["R5034-18"],"award-info":[{"award-number":["R5034-18"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tetc.2020.3027309","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T21:12:40Z","timestamp":1601413960000},"page":"438-449","source":"Crossref","is-referenced-by-count":37,"title":["A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4129-5821","authenticated-orcid":false,"given":"Xiao","family":"Liu","sequence":"first","affiliation":[{"name":"Wangxuan Institute of Computer Technology, Peking University, Beijing, China"}]},{"given":"Zaiyang","family":"Tang","sequence":"additional","affiliation":[{"name":"YeeZ Tech, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4981-0496","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9831-2202","authenticated-orcid":false,"given":"Song","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Xuepeng","family":"Fan","sequence":"additional","affiliation":[{"name":"YeeZ Tech, Beijing, China"}]},{"given":"Jinbo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guanghua School of Management, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50901-3_59"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_16"},{"key":"ref4","article-title":"Ethereum white paper","author":"Buterin","year":"2013"},{"key":"ref5","article-title":"Cryptokitties"},{"key":"ref6","article-title":"Idex"},{"key":"ref7","article-title":"Etherscan"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3905\/jai.2019.21.4.013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.486"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01588-5"},{"key":"ref16","article-title":"ERC-20 token standard - The ethereum Wiki","year":"2017"},{"key":"ref17","article-title":"Erc draft"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2877083"},{"key":"ref21","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.03.022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10878"},{"key":"ref26","article-title":"What is an ERC20 token","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref28","first-page":"3077","article-title":"Learning with partially absorbing random walks","volume-title":"Proc. Advances Neural Inf. Process. Syst.","author":"Wu"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-011-0841-3"},{"key":"ref31","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref34","first-page":"1","article-title":"Identifying illicit accounts in large scale e-payment networks \u2013 A graph representation learning approach","volume":"abs\/1906.05546","author":"Tam","year":"2019","journal-title":"arXiv"},{"key":"ref35","first-page":"1","article-title":"Detecting mixing services via mining bitcoin transaction network with hybrid motifs","volume":"abs\/2001.05233","author":"Wu","year":"2020","journal-title":"arXiv"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989507"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488393"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1120.003.0080"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500\u20132323"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9726526\/09209092.pdf?arnumber=9209092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:43:30Z","timestamp":1704840210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2020.3027309","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}