{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T07:47:21Z","timestamp":1774770441411,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:00:00Z","timestamp":1602720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,15]]},"DOI":"10.1145\/3383455.3422549","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:51:48Z","timestamp":1633618308000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":114,"title":["Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity"],"prefix":"10.1145","author":[{"given":"Joana","family":"Lorenz","sequence":"first","affiliation":[{"name":"NOVA IMS &amp; Feedzai"}]},{"given":"Maria In\u00eas","family":"Silva","sequence":"additional","affiliation":[{"name":"Feedzai"}]},{"given":"David","family":"Apar\u00edcio","sequence":"additional","affiliation":[{"name":"Feedzai"}]},{"given":"Jo\u00e3o Tiago","family":"Ascens\u00e3o","sequence":"additional","affiliation":[{"name":"Feedzai"}]},{"given":"Pedro","family":"Bizarro","sequence":"additional","affiliation":[{"name":"Feedzai"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310734"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ricardo Barata Miguel Leite Ricardo Pacheco Marco O. P. Sampaio Jo\u00e3o Ascens\u00e3o and Pedro Bizarro. 2020. Active learning for online training in imbalanced data streams under cold start. (2020). To appear.  Ricardo Barata Miguel Leite Ricardo Pacheco Marco O. P. Sampaio Jo\u00e3o Ascens\u00e3o and Pedro Bizarro. 2020. Active learning for online training in imbalanced data streams under cold start. (2020). To appear.","DOI":"10.1145\/3490354.3494423"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"e_1_3_2_1_4_1","volume-title":"The Elliptic Data Set: opening up machine learning on the blockchain. Medium (Aug","author":"Bellei Claudio","year":"2019","unstructured":"Claudio Bellei . 2019. The Elliptic Data Set: opening up machine learning on the blockchain. Medium (Aug . 2019 ). https:\/\/medium.com\/elliptic\/the-elliptic-data-set-opening-up-machine-learning-on-the-blockchain-e0a343d99a14 Claudio Bellei. 2019. The Elliptic Data Set: opening up machine learning on the blockchain. Medium (Aug. 2019). https:\/\/medium.com\/elliptic\/the-elliptic-data-set-opening-up-machine-learning-on-the-blockchain-e0a343d99a14"},{"key":"e_1_3_2_1_5_1","volume-title":"Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 787--796","author":"Camino Ramiro Daniel","year":"2017","unstructured":"Ramiro Daniel Camino , Radu State , Leandro Montero , and Petko Valtchev . 2017 . Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 787--796 . Ramiro Daniel Camino, Radu State, Leandro Montero, and Petko Valtchev. 2017. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 787--796."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-018-0116-z"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2014.7042645"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1144-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.ap07625"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.037"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2009.5302396"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1655002"},{"key":"e_1_3_2_1_16_1","volume-title":"Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network","author":"Hirshman Jason","year":"2013","unstructured":"Jason Hirshman , Yifei Huang , and Stephen Macke . 2013. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network . 3 rd ed. Technical report, Stanford University ( 2013 ). Jason Hirshman, Yifei Huang, and Stephen Macke. 2013. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. 3rd ed. Technical report, Stanford University (2013).","edition":"3"},{"key":"e_1_3_2_1_17_1","volume-title":"Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv preprint arXiv:1912.12060","author":"Hu Yining","year":"2019","unstructured":"Yining Hu , Suranga Seneviratne , Kanchana Thilakarathna , Kensuke Fukuda , and Aruna Seneviratne . 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv preprint arXiv:1912.12060 ( 2019 ). Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, and Aruna Seneviratne. 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv preprint arXiv:1912.12060 (2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.101"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599140"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50026-X"},{"key":"e_1_3_2_1_21_1","volume-title":"Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In 2017 fifth international conference on advanced cloud and big data (CBD)","author":"Li Xurui","unstructured":"Xurui Li , Xiang Cao , Xuetao Qiu , Jintao Zhao , and Jianbin Zheng . 2017. Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In 2017 fifth international conference on advanced cloud and big data (CBD) . IEEE , 176--181. Xurui Li, Xiang Cao, Xuetao Qiu, Jintao Zhao, and Jianbin Zheng. 2017. Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In 2017 fifth international conference on advanced cloud and big data (CBD). IEEE, 176--181."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEDIACOM.2010.37"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8_6"},{"key":"e_1_3_2_1_24_1","volume-title":"UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction.","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes , John Healy , and James Melville . 2018 . UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. (2018). Leland McInnes, John Healy, and James Melville. 2018. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA)","author":"Monamo Patrick","unstructured":"Patrick Monamo , Vukosi Marivate , and Bheki Twala . 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA) . IEEE , 129--134. Patrick Monamo, Vukosi Marivate, and Bheki Twala. 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA). IEEE, 129--134."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"e_1_3_2_1_27_1","unstructured":"Brian Monroe. 2020. Ousted Danske Bank CEO faces nearly $400 million lawsuit tied to historic money laundering scandal. https:\/\/www.acfcs.org\/ousted-danske-bank-ceo-faces-nearly-400-million-lawsuit-tied-to-historic-money-laundering-scandal\/Library Catalog: www.acfcs.org Section: Uncategorized.  Brian Monroe. 2020. Ousted Danske Bank CEO faces nearly $400 million lawsuit tied to historic money laundering scandal. https:\/\/www.acfcs.org\/ousted-danske-bank-ceo-faces-nearly-400-million-lawsuit-tied-to-historic-money-laundering-scandal\/Library Catalog: www.acfcs.org Section: Uncategorized."},{"key":"e_1_3_2_1_28_1","unstructured":"Financial Crimes Enforcement Network. 2019. Application of FinCEN's Regulations to Certain Business Models Involving Convertible Virtual Currencies | FinCEN.gov. https:\/\/www.fincen.gov\/resources\/statutes-regulations\/guidance\/application-fincens-regulations-certain-business-models  Financial Crimes Enforcement Network. 2019. Application of FinCEN's Regulations to Certain Business Models Involving Convertible Virtual Currencies | FinCEN.gov. https:\/\/www.fincen.gov\/resources\/statutes-regulations\/guidance\/application-fincens-regulations-certain-business-models"},{"key":"e_1_3_2_1_29_1","volume-title":"The 1MDB scandal: what does it mean for Goldman Sachs? Financial Times (Jan","author":"Noonan Laura","year":"2020","unstructured":"Laura Noonan , Stefania Palma , and Kadhim Shubber . 2020. The 1MDB scandal: what does it mean for Goldman Sachs? Financial Times (Jan 2020 ). https:\/\/www.ft.com\/content\/3f161eda-3306-11ea-9703-eea0cae3f0de Laura Noonan, Stefania Palma, and Kadhim Shubber. 2020. The 1MDB scandal: what does it mean for Goldman Sachs? Financial Times (Jan 2020). https:\/\/www.ft.com\/content\/3f161eda-3306-11ea-9703-eea0cae3f0de"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_31_1","volume-title":"Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941","author":"Pham Thai","year":"2016","unstructured":"Thai Pham and Steven Lee . 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 ( 2016 ). Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942","author":"Pham Thai","year":"2016","unstructured":"Thai Pham and Steven Lee . 2016. Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 ( 2016 ). Thai Pham and Steven Lee. 2016. Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 (2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.162"},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in neural information processing systems","author":"Settles Burr","unstructured":"Burr Settles , Mark Craven , and Soumya Ray . 2008. Multiple-instance active learning . In Advances in neural information processing systems , Vol. 20 . 1289--1296. Burr Settles, Mark Craven, and Soumya Ray. 2008. Multiple-instance active learning. In Advances in neural information processing systems, Vol. 20. 1289--1296."},{"key":"e_1_3_2_1_36_1","volume-title":"Aladin: Active learning of anomalies to detect intrusions.","author":"Stokes Jack W","year":"2008","unstructured":"Jack W Stokes , John Platt , Joseph Kravis , and Michael Shilman . 2008 . Aladin: Active learning of anomalies to detect intrusions. (2008). Jack W Stokes, John Platt, Joseph Kravis, and Michael Shilman. 2008. Aladin: Active learning of anomalies to detect intrusions. (2008)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2010.07032"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2005.1527539"},{"key":"e_1_3_2_1_39_1","volume-title":"Official Journal of the European Union L 156 (June","author":"European Union. 2018. Directive (EU) 2018\/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015\/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives 2009\/138\/EC and 2013\/36\/EU.","year":"2018","unstructured":"European Union. 2018. Directive (EU) 2018\/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015\/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives 2009\/138\/EC and 2013\/36\/EU. Official Journal of the European Union L 156 (June 2018 ), 43--74. European Union. 2018. Directive (EU) 2018\/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015\/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives 2009\/138\/EC and 2013\/36\/EU. Official Journal of the European Union L 156 (June 2018), 43--74."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/KAM.2009.221"},{"key":"e_1_3_2_1_41_1","volume-title":"Mediterranean and Middle Eastern Conference on Information Systems","author":"Wang Yingfeng","year":"2008","unstructured":"Yingfeng Wang , Huaiquing Wang , Caddie Shi Jia Gao , and Dongming Xu . 2008 . Intelligent money laundering monitoring and detecting system. In European , Mediterranean and Middle Eastern Conference on Information Systems 2008. Brunel University, 1--11. Yingfeng Wang, Huaiquing Wang, Caddie Shi Jia Gao, and Dongming Xu. 2008. Intelligent money laundering monitoring and detecting system. In European, Mediterranean and Middle Eastern Conference on Information Systems 2008. Brunel University, 1--11."},{"key":"e_1_3_2_1_42_1","volume-title":"Claudio Bellei, Tom Robinson, and Charles E Leiserson.","author":"Weber Mark","year":"2019","unstructured":"Mark Weber , Giacomo Domeniconi , Jie Chen , Daniel Karl I Weidele , Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019 . Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019). Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I Weidele, Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_44_1","first-page":"1","article-title":"PyOD: A Python Toolbox for Scalable Outlier Detection","volume":"20","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao , Zain Nasrullah , and Zheng Li . 2019 . PyOD: A Python Toolbox for Scalable Outlier Detection . Journal of Machine Learning Research 20 , 96 (2019), 1 -- 7 . Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. Journal of Machine Learning Research 20, 96 (2019), 1--7.","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"ICAIF '20: ACM International Conference on AI in Finance","location":"New York New York","acronym":"ICAIF '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the First ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383455.3422549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:09Z","timestamp":1750197669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,15]]},"references-count":43,"alternative-id":["10.1145\/3383455.3422549","10.1145\/3383455"],"URL":"https:\/\/doi.org\/10.1145\/3383455.3422549","relation":{},"subject":[],"published":{"date-parts":[[2020,10,15]]},"assertion":[{"value":"2021-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}