2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) 2018
DOI: 10.1109/dsc.2018.00047
|View full text |Cite
|
Sign up to set email alerts
|

Bitcoin Mixing Detection Using Deep Autoencoder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…Some swapping service providers, such as Darklaunder, repeatedly use a single receiving address in a short time [140], resulting in a larger degree of centrality than normal nodes [138]. Moreover, since users who belong to different communities may use the same mixing service, mixing service nodes can also act as bridges to nodes with few connections before mixings [141].…”
Section: Mixing Serivcesmentioning
confidence: 99%
“…Some swapping service providers, such as Darklaunder, repeatedly use a single receiving address in a short time [140], resulting in a larger degree of centrality than normal nodes [138]. Moreover, since users who belong to different communities may use the same mixing service, mixing service nodes can also act as bridges to nodes with few connections before mixings [141].…”
Section: Mixing Serivcesmentioning
confidence: 99%
“…Identification of abnormal activities within Bitcoin transactions has been intensively addressed in the past. Such works addressed a broad range of security issues and challenges, including, but not limited to, privacy and deanonymization investigation, 4 botnets detection, 5 abnormal and fraudulent transactions detection, 6,7 malicious users and miners detection, [8][9][10][11] darknet markets, 12 money laundering and drug trading, 13 etc. However, it is worth noting that feature engineering (ie, which comprises various mechanisms and approaches including network embeddings, clustering, and network traffic characterization) is a vital and crucial aspect of most of Bitcoin-based research works that mainly focus on illegitimate user and miner activity identification.…”
Section: Related Workmentioning
confidence: 99%
“…Other illicit users are ransom calls for extortions, bombs threats, sextortionists, scams, and blackmail. [7] Tracing suspicious bitcoin entities Transaction features M Weber et al [8] Identifying illicit bitcoin users Transaction features Y Hu et al [9] Detecting Money Laundering Graph embeddings H Yin et al [10] Identifying illicit bitcoin users Transaction features L Nan et al [11] Mixing service detection Graph embeddings…”
Section: Description Of Bitcoin Systemmentioning
confidence: 99%