{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:48:49Z","timestamp":1755794929101,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Canadian NSERC Discovery","award":["RGPIN-2020-05665"],"award-info":[{"award-number":["RGPIN-2020-05665"]}]},{"name":"National Science Foundation of USA","award":["ECCS 2039701"],"award-info":[{"award-number":["ECCS 2039701"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709322","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:48:32Z","timestamp":1743792512000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Chainlet Orbits: Topological Address Embedding for Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0607-5073","authenticated-orcid":false,"given":"Poupak","family":"Azad","sequence":"first","affiliation":[{"name":"University of Manitoba, Winnipeg, MB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7462-8819","authenticated-orcid":false,"given":"Baris","family":"Coskunuzer","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9795-9063","authenticated-orcid":false,"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2882-6950","authenticated-orcid":false,"given":"Cuneyt G.","family":"Akcora","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00105"},{"key":"e_1_3_2_2_2_1","volume-title":"PAKDD 2018, Melbourne, VIC, Australia, June 3--6, 2018, Proceedings, Part III (Lecture Notes in Computer Science","author":"Akcora Cuneyt Gurcan","year":"2018","unstructured":"Cuneyt Gurcan Akcora, Asim Kumer Dey, Yulia R. Gel, and Murat Kantarcioglu. 2018. Forecasting Bitcoin Price with Graph Chainlets. In Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3--6, 2018, Proceedings, Part III (Lecture Notes in Computer Science, Vol. 10939), Dinh Q. Phung, Vincent S. Tseng, Geoffrey I. Webb, Bao Ho, Mohadeseh Ganji, and Lida Rashidi (Eds.). Springer, 765--776. https:\/\/doi.org\/10. 1007\/978--3--319--93040--4_60"},{"key":"e_1_3_2_2_3_1","volume-title":"Monero, Zcash, Ethereum, Ripple, and Iota","author":"Akcora Cuneyt Gurcan","year":"2021","unstructured":"Cuneyt Gurcan Akcora, Yulia R Gel, and Murat Kantarcioglu. 2021. Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery (2021), e1436."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 4439--4445","author":"Akcora Cuneyt G","year":"2021","unstructured":"Cuneyt G Akcora, Yitao Li, Yulia R Gel, and Murat Kantarcioglu. 2021. Bit- coinHeist: topological data analysis for ransomware prediction on the Bitcoin blockchain. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 4439--4445."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409073.3409080"},{"key":"e_1_3_2_2_6_1","volume-title":"Cuneyt Gurcan Akcora, and Arijit Khan","author":"Azad Poupak","year":"2024","unstructured":"Poupak Azad, Cuneyt Gurcan Akcora, and Arijit Khan. 2024. Machine Learning for Blockchain Data Analysis: Progress and Opportunities. arXiv preprint arXiv:2404.18251 (2024)."},{"key":"e_1_3_2_2_7_1","unstructured":"Gwern Branwen. 2023. Darknet Market Archives. Online. https:\/\/gwern.net\/DNM-archives#grams"},{"key":"e_1_3_2_2_8_1","volume-title":"Random forests. Machine learning 45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning 45 (2001), 5--32."},{"key":"e_1_3_2_2_9_1","volume-title":"On the economic signifi- cance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security","author":"Conti Mauro","year":"2018","unstructured":"Mauro Conti, Ankit Gangwal, and Sushmita Ruj. 2018. On the economic signifi- cance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security (2018)."},{"key":"e_1_3_2_2_10_1","volume-title":"8th International Conference on Learning Representations, ICLR 2020","author":"Errica Federico","year":"2020","unstructured":"Federico Errica, Marco Podda, Davide Bacciu, and Alessio Micheli. 2020. A Fair Comparison of Graph Neural Networks for Graph Classification. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26--30, 2020. OpenReview.net. https:\/\/openreview.net\/forum?id= HygDF6NFPB"},{"key":"e_1_3_2_2_11_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30 (2017)."},{"volume-title":"Tracking Ransomware End-to-end","author":"Huang D. Y.","key":"e_1_3_2_2_12_1","unstructured":"D. Y. Huang and D. McCoy. 2018. Tracking Ransomware End-to-end. In Tracking Ransomware End-to-end. IEEE, 1--12."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00137"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-017-9394-6"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain55522.2022.00042"},{"key":"e_1_3_2_2_16_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532857"},{"key":"e_1_3_2_2_18_1","volume-title":"Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain. arXiv preprint arXiv:2108.11818","author":"Lal Banwari","year":"2021","unstructured":"Banwari Lal, Rachit Agarwal, and Sandeep Kumar Shukla. 2021. Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain. arXiv preprint arXiv:2108.11818 (2021)."},{"key":"e_1_3_2_2_19_1","unstructured":"Serge Lang. 2012. Algebra. Vol. 211. Springer Science & Business Media."},{"key":"e_1_3_2_2_20_1","volume-title":"International Conference on Blockchain and Trustworthy Systems. Springer, 520--533","author":"Lee Chaehyeon","year":"2019","unstructured":"Chaehyeon Lee, Sajan Maharjan, Kyungchan Ko, and James Won-Ki Hong. 2019. Toward detecting illegal transactions on bitcoin using machine-learning methods. In International Conference on Blockchain and Trustworthy Systems. Springer, 520--533."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"S. Meiklejohn M. Pomarole G. Jordan D. Levchenko K.and McCoy G. M Voelker and S. Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In IMC. ACM 127--140.","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"R. Milo S. Shen-Orr S. Itzkovitz N. Kashtan D. Chklovskii and U. Alon. 2002. Network motifs: Simple building blocks of complex networks. Science 298 5594 (2002) 824--827.","DOI":"10.1126\/science.298.5594.824"},{"key":"e_1_3_2_2_23_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00047"},{"key":"e_1_3_2_2_25_1","volume-title":"Ransomware payments in the Bitcoin ecosystem. arXiv preprint arXiv:1804.04080","author":"Paquet-Clouston Masarah","year":"2018","unstructured":"Masarah Paquet-Clouston, Bernhard Haslhofer, and Benoit Dupont. 2018. Ransomware payments in the Bitcoin ecosystem. arXiv preprint arXiv:1804.04080 (2018)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"e_1_3_2_2_27_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"key":"e_1_3_2_2_28_1","unstructured":"Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. In arXiv preprint arXiv:1611.03941."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75762-5_3"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_16"},{"key":"e_1_3_2_2_31_1","unstructured":"Abdullah Mueen Sheng Zhong. 2024. BitLINK: Temporal Linkage of Address Clusters in Bitcoin Blockchain. (2024)."},{"volume-title":"SN Computer Science","author":"Vassallo Dylan","key":"e_1_3_2_2_32_1","unstructured":"Dylan Vassallo, Vincent Vella, and Joshua Ellul. 2021. Application of gradi- ent boosting algorithms for anti-money laundering in cryptocurrencies. In SN Computer Science, Vol. 2. Springer, 1--15."},{"volume-title":"Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. In ACM SIGKDD International Workshop on Knowledge discovery and data mining.","author":"Weber Mark","key":"e_1_3_2_2_33_1","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. In ACM SIGKDD International Workshop on Knowledge discovery and data mining."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583537"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-021-01251-0"},{"key":"e_1_3_2_2_37_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:43:12Z","timestamp":1755358992000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":38,"alternative-id":["10.1145\/3690624.3709322","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709322","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}