{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:23:55Z","timestamp":1772907835414,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key R&D Program of China","award":["2022YFC3301300, 2023YFC3304400"],"award-info":[{"award-number":["2022YFC3301300, 2023YFC3304400"]}]},{"name":"STCSM Key Projects","award":["21DZ1201400"],"award-info":[{"award-number":["21DZ1201400"]}]},{"name":"Natural Science Foundation of China","award":["62172100"],"award-info":[{"award-number":["62172100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645684","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1880-1891","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3001-2665","authenticated-orcid":false,"given":"Kai","family":"Wang","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5241-057X","authenticated-orcid":false,"given":"Yakun","family":"Cheng","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1939-5930","authenticated-orcid":false,"given":"Michael Wen","family":"Tong","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9248-5872","authenticated-orcid":false,"given":"Zhenghao","family":"Niu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4521-4112","authenticated-orcid":false,"given":"Jun","family":"Pang","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Belval, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8663-436X","authenticated-orcid":false,"given":"Weili","family":"Han","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 6th International Conference on Complex Networks and Their Applications (Complex Networks) (Studies in Computational Intelligence","volume":"177","author":"Cazabet R\u00e9","year":"2017","unstructured":"R\u00e9 my Cazabet, Rym Baccour, and Matthieu Latapy. 2017. Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals. In Proceedings of the 6th International Conference on Complex Networks and Their Applications (Complex Networks) (Studies in Computational Intelligence, Vol. 689). Springer, 166--177."},{"key":"e_1_3_2_2_3_1","volume-title":"Chainalysis: The Blockchain Data Platform. https:\/\/www.chainalysis.com\/.","year":"2022","unstructured":"Chainalysis. 2022. Chainalysis: The Blockchain Data Platform. https:\/\/www.chainalysis.com\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"e_1_3_2_2_5_1","unstructured":"Jesse Dunietz. 2017. The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed. https:\/\/www.scientificamerican.com\/article\/the-imperfect-crime-how-the-wannacry-hackers-could-get-nabbed."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-118"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0038"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10078-9_11"},{"key":"e_1_3_2_2_9_1","unstructured":"Andy Greenberg. 2021. Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht's Laptop. https:\/\/www.wired.com\/2015\/01\/prosecutors-trace-13--4-million-bitcoins-silk-road-ulbrichts-laptop."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466826.3466833"},{"key":"e_1_3_2_2_11_1","volume-title":"Harding and Peter Todd","author":"David","year":"2015","unstructured":"David A. Harding and Peter Todd. 2015. Opt-in Full Replace-by-Fee Signaling. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0125.mediawiki."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Martin Harrigan and Christoph Fretter. 2016. The Unreasonable Effectiveness of Address Clustering. In Proceedings of the 2016 International Conference on Ubiquitous Intelligence & Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld). IEEE 368--373.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23044"},{"key":"e_1_3_2_2_15_1","unstructured":"Blockchain.com Inc. 2022. The world's most popular way to buy sell and trade crypto. https:\/\/www.blockchain.com\/."},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of 2022 International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 1--7.","author":"Kallurkar Harshal Shridhar","unstructured":"Harshal Shridhar Kallurkar and B. R. Chandavarkar. 2022. Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation. In Proceedings of 2022 International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 1--7."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security). USENIX Association, 2721--2738","author":"Kalodner Harry A.","year":"2020","unstructured":"Harry A. Kalodner, Malte M\u00f6 ser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan. 2020. BlockSci: Design and applications of a blockchain analysis platform. In Proceedings of the 29th USENIX Security Symposium (USENIX Security). USENIX Association, 2721--2738."},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 31th USENIX Security Symposium (USENIX security). USENIX Association, 2207--2223","author":"Kappos George","year":"2022","unstructured":"George Kappos, Haaroon Yousaf, Rainer St\u00fc tz, Sofia Rollet, Bernhard Haslhofer, and Sarah Meiklejohn. 2022. How to Peel a Million: Validating and Expanding Bitcoin Clusters. In Proceedings of the 31th USENIX Security Symposium (USENIX security). USENIX Association, 2207--2223."},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 287--290","author":"Kim Dae-Yong","year":"2020","unstructured":"Dae-Yong Kim, Meryam Essaid, and Hongtaek Ju. 2020. Examining Bitcoin mempools Resemblance Using Jaccard Similarity Index. In Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 287--290."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science","volume":"597","author":"Ko Kyungchan","year":"2019","unstructured":"Kyungchan Ko, Taeyeol Jeong, Sajan Maharjan, Chaehyeon Lee, and James Won-Ki Hong. 2019. Prediction of Bitcoin Transactions Included in the Next Block. In Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science, Vol. 1156). Springer, 591--597."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science","volume":"562","author":"Li Yang","year":"2019","unstructured":"Yang Li, Zilu Liu, and Zibin Zheng. 2019. Quantitative Analysis of Bitcoin Transferred in Bitcoin Exchange. In Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science, Vol. 1156). Springer, 549--562."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"e_1_3_2_2_23_1","volume-title":"Bitcoin Address Clustering Based on Change Address Improvement","author":"Liu Feng","year":"2023","unstructured":"Feng Liu, Zhihan Li, Kun Jia, Panwei Xiang, Aimin Zhou, Jiayin Qi, and Zhibin Li. 2023. Bitcoin Address Clustering Based on Change Address Improvement. IEEE Transactions on Computational Social Systems (2023), 1--12."},{"key":"e_1_3_2_2_24_1","unstructured":"Eric Lombrozo Johnson Lau and Pieter Wuille. 2015. Segregated Witness (Consensus layer). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0141.mediawiki."},{"key":"e_1_3_2_2_25_1","unstructured":"Greg Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. https:\/\/bitcointalk.org\/index.php?topic=279249."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_2_27_1","volume-title":"Resurrecting Address Clustering in Bitcoin. In Proceedings of the 26th International Conference on Financial Cryptography and Data Security (FC) (Lecture Notes in Computer Science","volume":"403","author":"Malte","unstructured":"Malte M\u00f6 ser and Arvind Narayanan. 2022. Resurrecting Address Clustering in Bitcoin. In Proceedings of the 26th International Conference on Financial Cryptography and Data Security (FC) (Lecture Notes in Computer Science, Vol. 13411). Springer, 386--403."},{"key":"e_1_3_2_2_28_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_2_29_1","unstructured":"Jonas David Nick. 2015. Data-Driven De-Anonymization in Bitcoin. In Master's thesis. ETH Z\u00fcrich."},{"key":"e_1_3_2_2_30_1","unstructured":"United States Department of Justice. 2020. Global Disruption of Three Terror Finance Cyber-Enabled Campaigns. https:\/\/www.justice.gov\/opa\/pr\/global-disruption-three-terror-finance-cyber-enabled-campaigns."},{"key":"e_1_3_2_2_31_1","unstructured":"OrdinalHub.com. 2023. Discover Track & Analyze Bitcoin Ordinals. https:\/\/www.ordinalhub.com\/."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"e_1_3_2_2_36_1","unstructured":"Casey Rodarmor. 2022. Ordinal Numbers. https:\/\/github.com\/ordinals\/ord\/blob\/master\/bip.mediawiki."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751476"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201584"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466826.3466834"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494557"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Qin Wang and Guangsheng Yu. 2023. Understanding BRC-20: Hope or Hype. (2023).","DOI":"10.36227\/techrxiv.24233806"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE.2018.8666834"},{"key":"e_1_3_2_2_44_1","volume-title":"Taproot: SegWit version 1 spending rules. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki.","author":"Wuille Pieter","year":"2020","unstructured":"Pieter Wuille, Jonas Nick, and Anthony Towns. 2020. Taproot: SegWit version 1 spending rules. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki."},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association, 837--850","author":"Yousaf Haaroon","year":"2019","unstructured":"Haaroon Yousaf, George Kappos, and Sarah Meiklejohn. 2019. Tracing Transactions Across Cryptocurrency Ledgers. In Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association, 837--850."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90888-1_3"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20891-1_12"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-9900-9"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:29:45Z","timestamp":1755822585000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":48,"alternative-id":["10.1145\/3589334.3645684","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645684","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}