{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:08:24Z","timestamp":1769159304731,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557212","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:22:22Z","timestamp":1665883342000},"page":"5069-5073","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Ledgit: A Service to Diagnose Illicit Addresses on Blockchain using Multi-modal Unsupervised Learning"],"prefix":"10.1145","author":[{"given":"Xiaoying","family":"Zhi","sequence":"first","affiliation":[{"name":"ETH Zurich &amp; JPMorgan Chase, Zurich, Switzerland"}]},{"given":"Yash","family":"Satsangi","sequence":"additional","affiliation":[{"name":"JPMorgan Chase, London, United Kingdom"}]},{"given":"Sean","family":"Moran","sequence":"additional","affiliation":[{"name":"JPMorgan Chase, London, United Kingdom"}]},{"given":"Shaltiel","family":"Eloul","sequence":"additional","affiliation":[{"name":"JPMorgan Chase, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2008. Blockchain.com. https:\/\/www.Blockchain.com\/  2008. Blockchain.com. https:\/\/www.Blockchain.com\/"},{"key":"e_1_3_2_2_2_1","volume-title":"Financial Conduct Authority","unstructured":"2019. Financial Conduct Authority , Joint Money Laundering Steering Group (JMLSG) PART II , Chapter 22. https:\/\/www.fca.org.uk\/firms\/financial-crime\/ cryptoassets-aml-ctf-regime 2019. Financial Conduct Authority, Joint Money Laundering Steering Group (JMLSG) PART II, Chapter 22. https:\/\/www.fca.org.uk\/firms\/financial-crime\/ cryptoassets-aml-ctf-regime"},{"key":"e_1_3_2_2_3_1","unstructured":"2020. European Commission Directorate-General for Financial Stability Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on Markets in Crypto-assets and amending Directive (EU). https:\/\/eur-lex. europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:52020PC0593  2020. European Commission Directorate-General for Financial Stability Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on Markets in Crypto-assets and amending Directive (EU). https:\/\/eur-lex. europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:52020PC0593"},{"key":"e_1_3_2_2_4_1","unstructured":"2022. . National Bureau for Counter Terror Financing of Israel. https:\/\/nbctf. mod.gov.il\/en\/seizures\/Pages\/Blockchain1.aspx  2022. . National Bureau for Counter Terror Financing of Israel. https:\/\/nbctf. mod.gov.il\/en\/seizures\/Pages\/Blockchain1.aspx"},{"key":"e_1_3_2_2_5_1","unstructured":"2022. . United States Office of Foreign Assets Control. https:\/\/www.treasury. gov\/ofac\/downloads\/sdnlist.pdf  2022. . United States Office of Foreign Assets Control. https:\/\/www.treasury. gov\/ofac\/downloads\/sdnlist.pdf"},{"key":"e_1_3_2_2_6_1","unstructured":"2022. BitcoinAbuse. https:\/\/www.bitcoinabuse.com\/  2022. BitcoinAbuse. https:\/\/www.bitcoinabuse.com\/"},{"key":"e_1_3_2_2_7_1","unstructured":"2022. Scam-alert.io. https:\/\/scam-alert.io  2022. Scam-alert.io. https:\/\/scam-alert.io"},{"key":"e_1_3_2_2_8_1","volume-title":"Reddy","author":"Aggarwal Charu C.","year":"2014","unstructured":"Charu C. Aggarwal and Chandan K . Reddy . 2014 . Data clustering. Algorithms and applications. Chapman &Hall\/CRC Data mining and Knowledge Discovery series, Londra (2014). Charu C. Aggarwal and Chandan K. Reddy. 2014. Data clustering. Algorithms and applications. Chapman&Hall\/CRC Data mining and Knowledge Discovery series, Londra (2014)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409073.3409080"},{"key":"e_1_3_2_2_10_1","first-page":"9758","article-title":"Self-supervised learning by cross-modal audiovideo clustering","volume":"33","author":"Alwassel Humam","year":"2020","unstructured":"Humam Alwassel , Dhruv Mahajan , Bruno Korbar , Lorenzo Torresani , Bernard Ghanem , and Du Tran . 2020 . Self-supervised learning by cross-modal audiovideo clustering . Advances in Neural Information Processing Systems 33 (2020), 9758 -- 9770 . Humam Alwassel, Dhruv Mahajan, Bruno Korbar, Lorenzo Torresani, Bernard Ghanem, and Du Tran. 2020. Self-supervised learning by cross-modal audiovideo clustering. Advances in Neural Information Processing Systems 33 (2020), 9758--9770.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_11_1","volume-title":"Data Mining for Detecting Bitcoin Ponzi Schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 75--84","author":"Bartoletti Massimo","year":"2018","unstructured":"Massimo Bartoletti , Barbara Pes , and Sergio Serusi . 2018 . Data Mining for Detecting Bitcoin Ponzi Schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 75--84 . https:\/\/doi.org\/10.1109\/CVCBT.2018.00014 10.1109\/CVCBT.2018.00014 Massimo Bartoletti, Barbara Pes, and Sergio Serusi. 2018. Data Mining for Detecting Bitcoin Ponzi Schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 75--84. https:\/\/doi.org\/10.1109\/CVCBT.2018.00014"},{"key":"e_1_3_2_2_12_1","unstructured":"Joseph R. Biden. 2022. Executive order on ensuring responsible development of Digital assets. https:\/\/www.whitehouse.gov\/briefing-room\/presidentialactions\/ 2022\/03\/09\/executive-order-on-ensuring-responsible-development-ofdigital- assets\/  Joseph R. Biden. 2022. Executive order on ensuring responsible development of Digital assets. https:\/\/www.whitehouse.gov\/briefing-room\/presidentialactions\/ 2022\/03\/09\/executive-order-on-ensuring-responsible-development-ofdigital- assets\/"},{"key":"e_1_3_2_2_13_1","volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop . 2006. Pattern Recognition and Machine Learning (Information Science and Statistics) . Springer-Verlag , Berlin, Heidelberg . Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag, Berlin, Heidelberg."},{"key":"e_1_3_2_2_14_1","volume-title":"Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 787-- 796","author":"Camino Ramiro Daniel","year":"2017","unstructured":"Ramiro Daniel Camino , Radu State , Leandro Montero , and Petko Valtchev . 2017 . Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 787-- 796 . https:\/\/doi.org\/10.1109\/ICDMW.2017.109 10.1109\/ICDMW.2017.109 Ramiro Daniel Camino, Radu State, Leandro Montero, and Petko Valtchev. 2017. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 787-- 796. https:\/\/doi.org\/10.1109\/ICDMW.2017.109"},{"key":"e_1_3_2_2_15_1","volume-title":"Fast Local Algorithms for Large Scale Nonnegative Matrix and Tensor Factorizations. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A, 3","author":"Andrzej","year":"2009","unstructured":"Andrzej CICHOCKI and Anh-Huy PHAN. 2009. Fast Local Algorithms for Large Scale Nonnegative Matrix and Tensor Factorizations. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A, 3 ( 2009 ), 708--721. https:\/\/doi.org\/10.1587\/transfun.E92.A.708 10.1587\/transfun.E92.A.708 Andrzej CICHOCKI and Anh-Huy PHAN. 2009. Fast Local Algorithms for Large Scale Nonnegative Matrix and Tensor Factorizations. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A, 3 (2009), 708--721. https:\/\/doi.org\/10.1587\/transfun.E92.A.708"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485913"},{"key":"e_1_3_2_2_17_1","unstructured":"Yining Hu Suranga Seneviratne Kanchana Thilakarathna Kensuke Fukuda and Aruna Seneviratne. 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv:1912.12060 [cs.SI]  Yining Hu Suranga Seneviratne Kanchana Thilakarathna Kensuke Fukuda and Aruna Seneviratne. 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv:1912.12060 [cs.SI]"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062652"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_2_20_1","volume-title":"Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA)","author":"Monamo Patrick","unstructured":"Patrick Monamo , Vukosi Marivate , and Bheki Twala . 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA) . IEEE , 129--134. Patrick Monamo, Vukosi Marivate, and Bheki Twala. 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA). IEEE, 129--134."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-5007"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_3_2_2_24_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot."},{"key":"e_1_3_2_2_25_1","unstructured":"Emily Nicolle. 2022. U.K. Crime Agency Wants to Regulate Crypto Transaction Mixers. https:\/\/www.bloomberg.com\/news\/articles\/2022-03--15\/u-k-crimeagency- wants-to-regulate-crypto-transaction-mixers  Emily Nicolle. 2022. U.K. Crime Agency Wants to Regulate Crypto Transaction Mixers. https:\/\/www.bloomberg.com\/news\/articles\/2022-03--15\/u-k-crimeagency- wants-to-regulate-crypto-transaction-mixers"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34223-4_2"},{"key":"#cr-split#-e_1_3_2_2_27_1.1","unstructured":"Masarah Paquet-Clouston Bernhard Haslhofer and Benoit Dupont. 2018. Ransomware Payments in the Bitcoin Ecosystem. https:\/\/doi.org\/10.5281\/zenodo. 1238041 10.5281\/zenodo"},{"key":"#cr-split#-e_1_3_2_2_27_1.2","doi-asserted-by":"crossref","unstructured":"Masarah Paquet-Clouston Bernhard Haslhofer and Benoit Dupont. 2018. Ransomware Payments in the Bitcoin Ecosystem. https:\/\/doi.org\/10.5281\/zenodo. 1238041","DOI":"10.1093\/cybsec\/tyz003"},{"key":"e_1_3_2_2_28_1","volume-title":"Leiserson","author":"Pareja Aldo","year":"2019","unstructured":"Aldo Pareja , Giacomo Domeniconi , Jie Chen , Tengfei Ma , Toyotaro Suzumura , Hiroki Kanezashi , Tim Kaler , Tao B. Schardl , and Charles E . Leiserson . 2019 . EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs . arXiv:1902.10191 [cs.LG] Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao B. Schardl, and Charles E. Leiserson. 2019. EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs. arXiv:1902.10191 [cs.LG]"},{"key":"e_1_3_2_2_29_1","volume-title":"Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941","author":"Pham Thai","year":"2016","unstructured":"Thai Pham and Steven Lee . 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 ( 2016 ). Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016)."},{"key":"e_1_3_2_2_30_1","unstructured":"Thai Pham and Steven Lee. 2017. Anomaly Detection in the Bitcoin System - A Network Perspective. arXiv:1611.03942 [cs.SI]  Thai Pham and Steven Lee. 2017. Anomaly Detection in the Bitcoin System - A Network Perspective. arXiv:1611.03942 [cs.SI]"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00558-z"},{"key":"e_1_3_2_2_33_1","volume-title":"Leiserson","author":"Weber Mark","year":"2019","unstructured":"Mark Weber , Giacomo Domeniconi , Jie Chen , Daniel Karl I. Weidele , Claudio Bellei , Tom Robinson , and Charles E . Leiserson . 2019 . Anti-Money Laundering in Bitcoin : Experimenting with Graph Convolutional Networks for Financial Forensics . https:\/\/doi.org\/10.48550\/ARXIV.1908.02591 10.48550\/ARXIV.1908.02591 Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. https:\/\/doi.org\/10.48550\/ARXIV.1908.02591"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"e_1_3_2_2_35_1","volume-title":"Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil.","author":"Yang Yinfei","year":"2019","unstructured":"Yinfei Yang , Daniel Cer , Amin Ahmad , Mandy Guo , Jax Law , Noah Constant , Gustavo Hernandez Abrego , Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil. 2019 . Multilingual Universal Sentence Encoder for Semantic Retrieval . https:\/\/doi.org\/10.48550\/ARXIV.1907.04307 10.48550\/ARXIV.1907.04307 Yinfei Yang, Daniel Cer, Amin Ahmad, Mandy Guo, Jax Law, Noah Constant, Gustavo Hernandez Abrego, Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil. 2019. Multilingual Universal Sentence Encoder for Semantic Retrieval. https:\/\/doi.org\/10.48550\/ARXIV.1907.04307"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258365"}],"event":{"name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","location":"Atlanta GA USA","acronym":"CIKM '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:07Z","timestamp":1750182547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":37,"alternative-id":["10.1145\/3511808.3557212","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557212","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}