{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:41Z","timestamp":1766441861559,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765574","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"4875-4877","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6964-6641","authenticated-orcid":false,"given":"Qishuang","family":"Fu","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. In 2019 IEEE European Symposium on Security and Privacy. 172--184","author":"Biryukov Alex","year":"2019","unstructured":"Alex Biryukov and Sergei Tikhomirov. 2019. Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. In 2019 IEEE European Symposium on Security and Privacy. 172--184."},{"key":"e_1_3_2_1_2_1","unstructured":"Chanalysis. 2024. The 2024 Crypto Crime Report. https:\/\/go.chainalysis.com\/crypto-crime-2024.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-06-2020-0113"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0085"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599803"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC59979.2024.10634447"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.7240\/jeps.1224416"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645692"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFTIC59930.2023.10455883"},{"key":"e_1_3_2_1_10_1","volume-title":"A peer-to-peer electronic cash system. Bitcoin.--URL: https:\/\/bitcoin.org\/bitcoin. pdf 4, 2","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto and A Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin.--URL: https:\/\/bitcoin.org\/bitcoin. pdf 4, 2 (2008), 15."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888920000314"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651487"},{"key":"e_1_3_2_1_13_1","volume-title":"Sydney","author":"Staples M","year":"2017","unstructured":"M Staples, S Chen, S Falamaki, A Ponomarev, P Rimba, AB Tran, I Weber, X Xu, and J Zhu. 2017. Risks and opportunities for systems using blockchain and smart contracts. Data61. CSIRO), Sydney (2017)."},{"key":"e_1_3_2_1_14_1","volume-title":"GraphALM: Active Learning for Detecting Money Laundering Transactions on Blockchain Networks","author":"Wang Qianyu","year":"2024","unstructured":"Qianyu Wang, Wei-Tek Tsai, and Tianyu Shi. 2024. GraphALM: Active Learning for Detecting Money Laundering Transactions on Blockchain Networks. IEEE Network (2024). early access."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3346276"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3266162"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3560193"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3231687"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:15:31Z","timestamp":1766441731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":18,"alternative-id":["10.1145\/3719027.3765574","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765574","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}