{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:46:05Z","timestamp":1772678765069,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3412421","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:05:37Z","timestamp":1718129137000},"page":"8924-8938","source":"Crossref","is-referenced-by-count":15,"title":["Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3187-6131","authenticated-orcid":false,"given":"Jeyakumar Samantha","family":"Tharani","sequence":"first","affiliation":[{"name":"School of Information and Communication Technology, Griffith University, Gold Coast, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7164-0580","authenticated-orcid":false,"given":"Zh\u00e9","family":"H\u00f3u","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technology, Griffith University, Gold Coast, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0678-3486","authenticated-orcid":false,"given":"Eugene","family":"Yugarajah Andrew Charles","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Jaffna, Jaffna, Sri Lanka"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4835-4556","authenticated-orcid":false,"given":"Punit","family":"Rathore","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bengaluru, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3635-4252","authenticated-orcid":false,"given":"Marimuthu","family":"Palaniswami","sequence":"additional","affiliation":[{"name":"Institute of Electrical and Electronics Engineers, The University of Melbourne, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6787-6379","authenticated-orcid":false,"given":"Vallipuram","family":"Muthukkumarasamy","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technology, Griffith University, Gold Coast, QLD, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2928256"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2948287"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref4","volume-title":"Cerber Ransomware Campaign","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/612"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101829"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-02048-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3266162"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3418981.3418984"},{"key":"ref10","article-title":"BitcoinHeist: Topological data analysis for ransomware detection on the Bitcoin blockchain","volume-title":"arXiv:1906.07852","author":"Gurcan Akcora","year":"2019"},{"key":"ref11","volume-title":"Bitcoin Heist Ransomware Address","year":"2020"},{"key":"ref12","article-title":"Anti-money laundering in Bitcoin: Experimenting with graph convolutional networks for financial forensics","volume-title":"arXiv:1908.02591","author":"Weber","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599803"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app13158766"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/issa.2016.7802939"},{"key":"ref17","article-title":"Anomaly detection in the Bitcoin system\u2014A network perspective","volume-title":"arXiv:1611.03942","author":"Pham","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s20010147"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref22","first-page":"212","article-title":"A deep learning approach for detecting security attacks on blockchain","volume-title":"Proc. ITASEC","author":"Scicchitano"},{"key":"ref23","volume-title":"Ethereum Transaction Dataset","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0006-6_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2020.3016821"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2003.1260106"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9524878"},{"key":"ref28","volume-title":"Blockchain Data API","year":"2021"},{"key":"ref29","volume-title":"Ethereum Transaction Dataset","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100107"},{"key":"ref31","article-title":"Bitcoin hacked transactions 2010\u20132013","author":"Shafiq","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2777-7_42"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2019.8806126"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1810452115"},{"key":"ref35","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Hamilton"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1161\/circulationaha.106.682658"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17849\/insm-47-01-31-39.1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.11919\/j.issn.1002\u20130829.215044"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"issue":"22","key":"ref41","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"Proc. IJCAI Workshop Empirical Methods Artif. Intell.","volume":"3","author":"Rish"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2174\/1574893615666200120103948"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114806"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330648"},{"key":"ref45","first-page":"900","article-title":"An explainable artificial intelligence system for small-unit tactical behavior","volume-title":"Proc. 16th Conf. Innov. Appl. Artif. Intell.","author":"van Lent"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref47","first-page":"9269","article-title":"The many Shapley values for model explanation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sundararajan"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10552782.pdf?arnumber=10552782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T18:23:25Z","timestamp":1727893405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10552782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3412421","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}