{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:09:21Z","timestamp":1751429361138,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"DOI":"10.1140\/epjds\/s13688-025-00564-8","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T09:08:39Z","timestamp":1751360919000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bitcoin transaction behavior modes exploration based on balance data"],"prefix":"10.1140","volume":"14","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yafei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jufang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Claudio J.","family":"Tessone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"564_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system"},{"issue":"5","key":"564_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/2594288","volume":"57","author":"M Van Alstyne","year":"2014","unstructured":"Van Alstyne M (2014) Why bitcoin has value. Commun ACM 57(5):30\u201332","journal-title":"Commun ACM"},{"key":"564_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/B978-0-323-98973-2.00014-9","volume-title":"Handbook of digital currency","author":"D Yermack","year":"2024","unstructured":"Yermack D (2024) Is bitcoin a real currency? An economic appraisal. In: Handbook of digital currency. Elsevier, Amsterdam, pp\u00a029\u201340"},{"issue":"12","key":"564_CR4","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ad149a","volume":"25","author":"G Di Antonio","year":"2023","unstructured":"Di Antonio G, Vinci GV, Pietronero L, Javarone MA (2023) The rise of rationality in blockchain dynamics. New J Phys 25(12):123042","journal-title":"New J Phys"},{"key":"564_CR5","doi-asserted-by":"crossref","unstructured":"Baur DG, Hong KJ, Lee AD (2016) Bitcoin\u2013currency or asset? Melbourne Business School","DOI":"10.2139\/ssrn.2561183"},{"key":"564_CR6","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10799-016-0264-6","volume":"18","author":"K Hong","year":"2017","unstructured":"Hong K (2017) Bitcoin as an alternative investment vehicle. Inf Technol Manag 18:265\u2013275","journal-title":"Inf Technol Manag"},{"key":"564_CR7","doi-asserted-by":"crossref","unstructured":"Irwin DA (2020). Free trade under fire","DOI":"10.23943\/princeton\/9780691201009.001.0001"},{"key":"564_CR8","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2021.730122","volume":"4","author":"AR Sai","year":"2021","unstructured":"Sai AR, Buckley J, Le Gear A (2021) Characterizing wealth inequality in cryptocurrencies. Front Blockchain 4:730122","journal-title":"Front Blockchain"},{"key":"564_CR9","first-page":"1","volume-title":"2022 IEEE international conference on omni-layer intelligent systems (COINS)","author":"B Kusmierz","year":"2022","unstructured":"Kusmierz B, Overko R (2022) How centralized is decentralized? Comparison of wealth distribution in coins and tokens. In: 2022 IEEE international conference on omni-layer intelligent systems (COINS). IEEE, pp\u00a01\u20136"},{"issue":"2","key":"564_CR10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor D, P\u00f3sfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLoS ONE 9(2):86197","journal-title":"PLoS ONE"},{"key":"564_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102940","volume":"177","author":"P Nerurkar","year":"2021","unstructured":"Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2021) Dissecting bitcoin blockchain: empirical analysis of bitcoin network (2009\u20132020). J Netw Comput Appl 177:102940","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"564_CR12","first-page":"1009","volume":"69","author":"B Tao","year":"2021","unstructured":"Tao B, Dai H-N, Wu J, Ho IW-H, Zheng Z, Cheang CF (2021) Complex network analysis of the bitcoin transaction network. IEEE Trans Circuits Syst II, Express Briefs 69(3):1009\u20131013","journal-title":"IEEE Trans Circuits Syst II, Express Briefs"},{"issue":"1","key":"564_CR13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0085777","volume":"9","author":"J Alstott","year":"2014","unstructured":"Alstott J, Bullmore E, Plenz D (2014) Powerlaw: a python package for analysis of heavy-tailed distributions. PLoS ONE 9(1):85777","journal-title":"PLoS ONE"},{"issue":"1","key":"564_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-21133-2","volume":"8","author":"P Sheridan","year":"2018","unstructured":"Sheridan P, Onodera T (2018) A preferential attachment paradox: how preferential attachment combines with growth to produce networks with log-normal in-degree distributions. Sci Rep 8(1):1\u201311","journal-title":"Sci Rep"},{"key":"564_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/ICIEA48937.2020.9248197","volume-title":"2020 15th IEEE conference on industrial electronics and applications (ICIEA)","author":"H Xi","year":"2020","unstructured":"Xi H, Fan Z, Shenwen L, Hongliang M, Ketai H (2020) A review on data analysis of bitcoin transaction entity. In: 2020 15th IEEE conference on industrial electronics and applications (ICIEA), pp\u00a0159\u2013164. https:\/\/doi.org\/10.1109\/ICIEA48937.2020.9248197"},{"key":"564_CR16","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/2504730.2504747","volume-title":"Proceedings of the 2013 conference on Internet measurement conference","author":"S Meiklejohn","year":"2013","unstructured":"Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 conference on Internet measurement conference, pp\u00a0127\u2013140"},{"key":"564_CR17","series-title":"Revised selected papers","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial cryptography and data security: 17th international conference","author":"D Ron","year":"2013","unstructured":"Ron D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph. In: Financial cryptography and data security: 17th international conference, FC 2013, Okinawa, Japan, April 1-5, 2013. Revised selected papers, vol\u00a017. Springer, Berlin, pp\u00a06\u201324"},{"key":"564_CR18","series-title":"Revised selected papers","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial cryptography and data security: 17th international conference","author":"E Androulaki","year":"2013","unstructured":"Androulaki E, Karame GO, Roeschlin M, Scherer T, Capkun S (2013) Evaluating user privacy in bitcoin. In: Financial cryptography and data security: 17th international conference, FC 2013, Okinawa, Japan, April 1-5, 2013. Revised selected papers, vol\u00a017. Springer, Berlin, pp\u00a034\u201351"},{"key":"564_CR19","doi-asserted-by":"crossref","unstructured":"Kelemen L, Seres IA, Backhausz \u00c1 (2023) the spatiotemporal scaling laws of bitcoin transactions. arXiv preprint. arXiv:2309.11884","DOI":"10.1109\/ICBC59979.2024.10634369"},{"key":"564_CR20","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s41060-017-0074-x","volume":"6","author":"D Di Francesco Maesa","year":"2018","unstructured":"Di Francesco Maesa D, Marino A, Ricci L (2018) Data-driven analysis of bitcoin properties: exploiting the users graph. Int J Data Sci Anal 6:63\u201380","journal-title":"Int J Data Sci Anal"},{"key":"564_CR21","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-319-30569-1_21","volume-title":"Complex networks VII: proceedings of the 7th workshop on complex networks CompleNet 2016","author":"MK Popuri","year":"2016","unstructured":"Popuri MK, Gunes MH (2016) Empirical analysis of crypto currencies. In: Complex networks VII: proceedings of the 7th workshop on complex networks CompleNet 2016. Springer, Berlin, pp\u00a0281\u2013292"},{"key":"564_CR22","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1007\/978-3-319-50901-3_59","volume-title":"Complex networks & their applications v: proceedings of the 5th international workshop on complex networks and their applications (COMPLEX NETWORKS 2016)","author":"D Di Francesco Maesa","year":"2017","unstructured":"Di Francesco Maesa D, Marino A, Ricci L (2017) An analysis of the bitcoin users graph: inferring unusual behaviours. In: Complex networks & their applications v: proceedings of the 5th international workshop on complex networks and their applications (COMPLEX NETWORKS 2016). Springer, Berlin, pp\u00a0749\u2013760"},{"issue":"1","key":"564_CR23","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke M, Fabian B (2016) Analyzing the bitcoin network: the first four years. Future Internet 8(1):7","journal-title":"Future Internet"},{"key":"564_CR24","doi-asserted-by":"crossref","unstructured":"Makarov I, Schoar A (2021) Blockchain analysis of the bitcoin market. Technical report, National Bureau of Economic Research","DOI":"10.3386\/w29396"},{"key":"564_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2024.130294","volume":"658","author":"D Sornette","year":"2025","unstructured":"Sornette D, Zhang Y (2025) Transaction flows and holding time scaling laws of bitcoin. Phys A, Stat Mech Appl 658:130294","journal-title":"Phys A, Stat Mech Appl"},{"key":"564_CR26","first-page":"197","volume-title":"Security and privacy in social networks","author":"F Reid","year":"2012","unstructured":"Reid F, Harrigan M (2012) An analysis of anonymity in the bitcoin system. In: Security and privacy in social networks. Springer, Berlin, pp\u00a0197\u2013223"},{"key":"564_CR27","doi-asserted-by":"publisher","first-page":"210582","DOI":"10.1109\/ACCESS.2020.3039570","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Wang J, Luo J (2020) Heuristic-based address clustering in bitcoin. IEEE Access 8:210582\u2013210591","journal-title":"IEEE Access"},{"issue":"1","key":"564_CR28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0242600","volume":"16","author":"AT Aspembitova","year":"2021","unstructured":"Aspembitova AT, Feng L, Chew LY (2021) Behavioral structure of users in cryptocurrency market. PLoS ONE 16(1):0242600","journal-title":"PLoS ONE"},{"issue":"2","key":"564_CR29","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1049\/blc2.12014","volume":"2","author":"X He","year":"2022","unstructured":"He X, He K, Lin S, Yang J, Mao H (2022) Bitcoin address clustering method based on multiple heuristic conditions. IET Blockchain 2(2):44\u201356","journal-title":"IET Blockchain"},{"issue":"446","key":"564_CR30","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1080\/01621459.1999.10474147","volume":"94","author":"J Del Castillo","year":"1999","unstructured":"Del Castillo J, Puig P (1999) The best test of exponentiality against singly truncated normal alternatives. J Am Stat Assoc 94(446):529\u2013532","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"564_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S0167-7152(02)00117-7","volume":"58","author":"R Gatto","year":"2002","unstructured":"Gatto R, Jammalamadaka SR (2002) A saddlepoint approximation for testing exponentiality against some increasing failure rate alternatives. Stat Probab Lett 58(1):71\u201381","journal-title":"Stat Probab Lett"},{"key":"564_CR32","doi-asserted-by":"publisher","first-page":"20099","DOI":"10.1007\/s11042-017-4396-4","volume":"76","author":"B Huang","year":"2017","unstructured":"Huang B, Liu Z, Chen J, Liu A, Liu Q, He Q (2017) Behavior pattern clustering in blockchain networks. Multimed Tools Appl 76:20099\u201320110","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"564_CR33","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/s40854-023-00525-y","volume":"10","author":"G Vlahavas","year":"2024","unstructured":"Vlahavas G, Karasavvas K, Vakali A (2024) Unsupervised clustering of bitcoin transactions. Financial Innovation 10(1):25","journal-title":"Financial Innovation"},{"key":"564_CR34","unstructured":"Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint. arXiv:1611.03941"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00564-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-025-00564-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00564-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T09:08:44Z","timestamp":1751360924000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-025-00564-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["564"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-025-00564-8","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"24 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"46"}}