{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:07:47Z","timestamp":1775815667703,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF CISE","award":["2302720, 2038029"],"award-info":[{"award-number":["2302720, 2038029"]}]},{"name":"IBM faculty award"},{"name":"CISCO edge AI grant (2020-2023)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599803","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:13:58Z","timestamp":1691172838000},"page":"3979-3990","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Demystifying Fraudulent Transactions and Illicit Nodes in the Bitcoin Network for Financial Forensics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9090-3163","authenticated-orcid":false,"given":"Youssef","family":"Elmougy","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4138-3082","authenticated-orcid":false,"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-020-00338-3"},{"key":"e_1_3_2_2_2_1","volume-title":"Graph-based lstm for anti-money laundering: Experimenting temporal graph convolutional network with bitcoin data. Neural Processing Letters","author":"Alarab Ismail","year":"2022","unstructured":"Ismail Alarab and Simant Prakoonwit . 2022. Graph-based lstm for anti-money laundering: Experimenting temporal graph convolutional network with bitcoin data. Neural Processing Letters ( 2022 ), 1--19. Ismail Alarab and Simant Prakoonwit. 2022. Graph-based lstm for anti-money laundering: Experimenting temporal graph convolutional network with bitcoin data. Neural Processing Letters (2022), 1--19."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409073.3409078"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"e_1_3_2_2_9_1","volume-title":"Pattern recognition and machine learning","author":"Bishop Christopher M","unstructured":"Christopher M Bishop and Nasser M Nasrabadi . 2006. Pattern recognition and machine learning . Vol. 4 . Springer . Christopher M Bishop and Nasser M Nasrabadi. 2006. Pattern recognition and machine learning. Vol. 4. Springer."},{"key":"e_1_3_2_2_10_1","volume-title":"Random forests. Machine learning","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine learning , Vol. 45 , 1 ( 2001 ), 5--32. Leo Breiman. 2001. Random forests. Machine learning, Vol. 45, 1 (2001), 5--32."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch35"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506--4512.  Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506--4512.","DOI":"10.24963\/ijcai.2020\/621"},{"key":"e_1_3_2_2_14_1","volume-title":"Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report","author":"Hirshman Jason","year":"2013","unstructured":"Jason Hirshman , Yifei Huang , and Stephen Macke . 2013. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report , Stanford University ( 2013 ). Jason Hirshman, Yifei Huang, and Stephen Macke. 2013. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report, Stanford University (2013)."},{"key":"e_1_3_2_2_15_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation , Vol. 9 , 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_2_17_1","volume-title":"Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060","author":"Hu Yining","year":"2019","unstructured":"Yining Hu , Suranga Seneviratne , Kanchana Thilakarathna , Kensuke Fukuda , and Aruna Seneviratne . 2019. Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060 ( 2019 ). Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, and Aruna Seneviratne. 2019. Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060 (2019)."},{"key":"e_1_3_2_2_18_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_3_2_2_20_1","volume-title":"Machine learning for evolution strategies","author":"Kramer Oliver","unstructured":"Oliver Kramer . 2016. Machine learning for evolution strategies . Vol. 20 . Springer . Oliver Kramer. 2016. Machine learning for evolution strategies. Vol. 20. Springer."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512226"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00204"},{"key":"e_1_3_2_2_24_1","unstructured":"Wai Weng Loa Gayan K Kulatillekea Mohanad Sarhana Siamak Layeghya and Marius Portmanna. 2022. Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin. (2022).  Wai Weng Loa Gayan K Kulatillekea Mohanad Sarhana Siamak Layeghya and Marius Portmanna. 2022. Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin. (2022)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422549"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_2_27_1","volume-title":"Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA)","author":"Monamo Patrick","unstructured":"Patrick Monamo , Vukosi Marivate , and Bheki Twala . 2016a. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA) . IEEE , 129--134. Patrick Monamo, Vukosi Marivate, and Bheki Twala. 2016a. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA). IEEE, 129--134."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"e_1_3_2_2_29_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_2_30_1","volume-title":"Maria In\u00eas Silva, David Apar\u00edcio, Jo\u00e3o Tiago Ascens ao, and Pedro Bizarro.","author":"Oliveira Catarina","year":"2021","unstructured":"Catarina Oliveira , Jo ao Torres , Maria In\u00eas Silva, David Apar\u00edcio, Jo\u00e3o Tiago Ascens ao, and Pedro Bizarro. 2021 . GuiltyWalker: Distance to illicit nodes in the Bitcoin network. arXiv preprint arXiv:2102.05373 (2021). Catarina Oliveira, Jo ao Torres, Maria In\u00eas Silva, David Apar\u00edcio, Jo\u00e3o Tiago Ascens ao, and Pedro Bizarro. 2021. GuiltyWalker: Distance to illicit nodes in the Bitcoin network. arXiv preprint arXiv:2102.05373 (2021)."},{"key":"e_1_3_2_2_31_1","volume-title":"Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941","author":"Pham Thai","year":"2016","unstructured":"Thai Pham and Steven Lee . 2016a. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 ( 2016 ). Thai Pham and Steven Lee. 2016a. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016)."},{"key":"e_1_3_2_2_32_1","volume-title":"Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942","author":"Pham Thai","year":"2016","unstructured":"Thai Pham and Steven Lee . 2016b. Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 ( 2016 ). Thai Pham and Steven Lee. 2016b. Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 (2016)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"D. Dziubaltowska R. Michalski and P. Macek. 2020. Revealing the character of nodes in a blockchain with supervised learning. IEEE Access (2020).  D. Dziubaltowska R. Michalski and P. Macek. 2020. Revealing the character of nodes in a blockchain with supervised learning. IEEE Access (2020).","DOI":"10.1109\/ACCESS.2020.3001676"},{"key":"e_1_3_2_2_34_1","volume-title":"Security and privacy in social networks","author":"Reid Fergal","unstructured":"Fergal Reid and Martin Harrigan . 2013. An analysis of anonymity in the bitcoin system . In Security and privacy in social networks . Springer , 197--223. Fergal Reid and Martin Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks. Springer, 197--223."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7993-3_1"},{"key":"e_1_3_2_2_36_1","volume-title":"The Web Conference.","author":"Shengliang Lu Bingsheng He Bingqiao Luo","year":"2023","unstructured":"Bingqiao Luo Shengliang Lu Bingsheng He Sihao Hu , Zhen Zhang and Ling Liu . 2023 a. BERT4ETH: Pre-training of Transformer Encoder Representation for Ethereum Fraud Detection . In The Web Conference. May 2-4, 2023, Austin, TX). Bingqiao Luo Shengliang Lu Bingsheng He Sihao Hu, Zhen Zhang and Ling Liu. 2023 a. BERT4ETH: Pre-training of Transformer Encoder Representation for Ethereum Fraud Detection. In The Web Conference. May 2-4, 2023, Austin, TX)."},{"key":"e_1_3_2_2_37_1","volume-title":"Tiansheg Huang and Ling Liu. 2023 b. Etherum Account Profiling and De-anonymization via Pseudo-Siamese BERT","author":"Chow Fatih Ilhan Selim Ka Ho","year":"2023","unstructured":"Ka Ho Chow Fatih Ilhan Selim Tekin Sihao Hu , Tiansheg Huang and Ling Liu. 2023 b. Etherum Account Profiling and De-anonymization via Pseudo-Siamese BERT . Technical Report , Georgia Tech ( 2023 ). Ka Ho Chow Fatih Ilhan Selim Tekin Sihao Hu, Tiansheg Huang and Ling Liu. 2023 b. Etherum Account Profiling and De-anonymization via Pseudo-Siamese BERT. Technical Report, Georgia Tech (2023)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498418"},{"key":"e_1_3_2_2_39_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Petar Velivc","year":"2017","unstructured":"Petar Velivc kovi\u0107, Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Lio , and Yoshua Bengio . 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 ( 2017 ). Petar Velivc kovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_2_40_1","volume-title":"Claudio Bellei, Tom Robinson, and Charles E Leiserson.","author":"Weber Mark","year":"2019","unstructured":"Mark Weber , Giacomo Domeniconi , Jie Chen , Daniel Karl I Weidele , Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019 . Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019). Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I Weidele, Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01620"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.201"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039570"},{"key":"e_1_3_2_2_46_1","volume-title":"Behavior-aware Account De-anonymization on Ethereum Interaction Graph. arXiv preprint arXiv:2203.09360","author":"Zhou Jiajun","year":"2022","unstructured":"Jiajun Zhou , Chenkai Hu , Jianlei Chi , Jiajing Wu , Meng Shen , and Qi Xuan . 2022. Behavior-aware Account De-anonymization on Ethereum Interaction Graph. arXiv preprint arXiv:2203.09360 ( 2022 ). Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, and Qi Xuan. 2022. Behavior-aware Account De-anonymization on Ethereum Interaction Graph. arXiv preprint arXiv:2203.09360 (2022)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00011"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:23Z","timestamp":1750182563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":47,"alternative-id":["10.1145\/3580305.3599803","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599803","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}