2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2019
DOI: 10.1109/bloc.2019.8751410
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Abstract: Bitcoin is a cryptocurrency that features a distributed, decentralized and trustworthy mechanism, which has made Bitcoin a popular global transaction platform. The transaction efficiency among nations and the privacy benefiting from address anonymity of the Bitcoin network have attracted many activities such as payments, investments, gambling, and even money laundering in the past decade. Unfortunately, some criminal behaviors which took advantage of this platform were not identified. This has discouraged many… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(40 citation statements)
references
References 21 publications
0
39
0
1
Order By: Relevance
“…Others relied on online sources (flagged by communities) [15,46] or by employing heuristic-based reasoning processes (e.g., reuse of the same addresses) to categorise instances [45,49]. Some researchers focus on detecting a specific kind of criminal activity such as Bitcoin accounts linked to High Yielding Investment Programs (HYIP) [46] or Ponzi Schemes [3], while others link cryptocurrency accounts or transactions to multiple labels (multiclass classification), e.g., mixer services, dark marketplaces, exchanges, wallet providers, scams, gambling, terrorists, and ransomware [19,29,30,45,47,58]. Others focus on a binary classification, grouping illegal/illicit vs legal/licit activities [15,26,33,49].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Others relied on online sources (flagged by communities) [15,46] or by employing heuristic-based reasoning processes (e.g., reuse of the same addresses) to categorise instances [45,49]. Some researchers focus on detecting a specific kind of criminal activity such as Bitcoin accounts linked to High Yielding Investment Programs (HYIP) [46] or Ponzi Schemes [3], while others link cryptocurrency accounts or transactions to multiple labels (multiclass classification), e.g., mixer services, dark marketplaces, exchanges, wallet providers, scams, gambling, terrorists, and ransomware [19,29,30,45,47,58]. Others focus on a binary classification, grouping illegal/illicit vs legal/licit activities [15,26,33,49].…”
Section: Related Workmentioning
confidence: 99%
“…Previous research primarily focuses on detecting illicit activities on one of the following approaches: at an account level [15,30,45], or at a transaction level [26,49]. When these ensembles were compared head-to-head against each other [30,45,46] at an accountlevel, some reported that RF outperforms tree-based gradient boosting [46], while others suggested otherwise [30,45]. However, we could not identify a comparative analysis investigating the effectiveness of these two ensembles on both approaches.…”
Section: Introductionmentioning
confidence: 96%
See 1 more Smart Citation
“…This study can be perceived as belonging to the family of studies that investigate the possibilities of the deanonymization of nodes in cryptocurrency networks. This family tackles the problem at different levels, e.g., by identifying the IP addresses of nodes [19], or by studying transaction motifs analysis [18] or transaction history summarization [24]. This direction was summarized in [1].…”
Section: Related Researchmentioning
confidence: 99%
“…They used synthetic minority over-sampling technique (SMOTE) to oversample the two minority classes hosted-wallet and mixing to overcome the class imbalance problem. Modeling the problem as a classification problem as well, Lin et al [64] proposed a different set of features including moments of transaction time in higher order to train different supervised machine learning models (LR, SVM, RF, AdaBoost, LightGBM, ANN, etc.) on a labeled category data set.…”
Section: E Anonymity and Privacymentioning
confidence: 99%