4.7 Article

Detecting Mixing Services via Mining Bitcoin Transaction Network With Hybrid Motifs

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSMC.2021.3049278

关键词

Bitcoin; Feature extraction; Task analysis; Training; Peer-to-peer computing; Ecosystems; Tools; Anti-money laundering (AML); bitcoin; mixing services; network mining; network motifs

资金

  1. Key-Area Research and Development Program of Guangdong Province [2018B010109001]
  2. National Natural Science Foundation of China [62032025, 61973325, U1811462]

向作者/读者索取更多资源

This article focuses on the detection of addresses belonging to mixing services in Bitcoin, proposing a feature-based network analysis framework to identify statistical properties of mixing services and introducing the concept of attributed temporal heterogeneous motifs (ATH motifs). By approaching the mixing detection task as a positive and unlabeled learning problem, a detection model is built with considered features. Experiments on real Bitcoin datasets demonstrate the effectiveness of the detection model and the importance of hybrid motifs including ATH motifs in mixing detection.
As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, the P2P and pseudonymous nature of Bitcoin make transactions on this platform very difficult to track, thus triggering the emergence of various illegal activities in the Bitcoin ecosystem. Particularly, mixing services in Bitcoin, originally designed to enhance transaction anonymity, have been widely employed for money laundering to complicate the process of trailing illicit fund. In this article, we focus on the detection of the addresses belonging to mixing services, which is an important task for anti-money laundering in Bitcoin. Specifically, we provide a feature-based network analysis framework to identify statistical properties of mixing services from three levels, namely, network level, account level, and transaction level. To better characterize the transaction patterns of different types of addresses, we propose the concept of attributed temporal heterogeneous motifs (ATH motifs). Moreover, to deal with the issue of imperfect labeling, we tackle the mixing detection task as a positive and unlabeled learning (PU learning) problem and build a detection model by leveraging the considered features. Experiments on real Bitcoin datasets demonstrate the effectiveness of our detection model and the importance of hybrid motifs including ATH motifs in mixing detection.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Profit-based deep architecture with integration of reinforced data selector to enhance trend-following strategy

Yang Li, Zibin Zheng, Hong-Ning Dai, Raymond Chi-Wing Wong, Haoran Xie

Summary: This paper presents a profit-based deep architecture with the integration of reinforced data selector (PDA-RDS) to address the challenges in applying deep learning methods to enhance trend-following strategies. Experimental results demonstrate that PDA-RDS outperforms existing baseline methods on stock-market datasets.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2023)

Article Agriculture, Dairy & Animal Science

Supplementary Feeding of Grazing Inner Mongolian Cashmere Goats during Pregnancy-Based on Nutrient Requirements of Cashmere Goats

Xin-Hui Wang, Qing Li, Zi-Bin Zheng, Xiao-Gao Diao, Li-Wen He, Wei Zhang

Summary: This study applied the Nutrient Requirements of Cashmere Goats to supplementary feeding for pregnant Inner Mongolian cashmere goats under grazing. The results showed that supplementation based on the feeding standard enhanced the production performance of pregnant goats. This is important for the healthy and precise nutrition and management of cashmere goats.

ANIMALS (2023)

Article Agriculture, Dairy & Animal Science

Comparative Study of the Nutritional Value and Degradation Characteristics of Amaranth Hay in the Rumen of Goats at Different Growth Stages

Shengjun Zhao, Shilong Zhou, Yuanqi Zhao, Jun Yang, Liangkang Lv, Zibin Zheng, Honghua Lu, Ying Ren

Summary: In this study, the chemical composition and rumen degradation characteristics of amaranth hay at four different growth stages were investigated. The results showed that the initial bloom stage (IS) exhibited superior chemical composition and rumen degradability compared to the other stages.

ANIMALS (2023)

Article Computer Science, Artificial Intelligence

An accurate approach of device-free localization with attention empowered residual network

Lingjun Zhao, Huakun Huang, Weizheng Wang, Zibin Zheng

Summary: Device-free localization (DFL) is an emerging technology in the Internet of Things (IoT) field that can locate targets without carrying any equipment. In this paper, a channel-dependent attention empowered residual network (CA-ResNet) is designed to extract underlying signal features for precise localization. Experimental results show that our proposed approach achieves high localization accuracy and strong robustness.

APPLIED SOFT COMPUTING (2023)

Article Economics

Does Short-and-Distort Scheme Really Exist? A Bitcoin Futures Audit Scheme through BIRCH & BPNN Approach

Dun Li, Dezhi Han, Zibin Zheng, Tien-Hsiung Weng, Kuan-Ching Li, Ming Li, Shaokang Cai

Summary: Short and Distort (S & D) is a prevalent price manipulation scheme in the futures trading market, especially in the context of Bitcoin futures. This article presents the first detailed empirical study on S & D, combining the analysis of available information and cryptocurrencies, proposing a problematic definition and discriminatory criteria for S & D in Bitcoin futures. Additionally, a model for real-time detection of S & D in perpetual and term contracts is developed, demonstrating higher accuracy and robustness compared to previous studies. The results highlight significant S & D manipulation in both perpetual and term contracts, with Binance exchange being relatively secure and Bittrex exchange being the most vulnerable to S & D.

COMPUTATIONAL ECONOMICS (2023)

Article Computer Science, Software Engineering

Selecting reliable blockchain peers via hybrid blockchain reliability prediction

Peilin Zheng, Zibin Zheng, Liang Chen

Summary: Blockchain and blockchain-based decentralised applications have attracted increasing attention recently. Connecting to unreliable blockchain peers in public blockchain systems can result in resource waste and loss of cryptocurrencies. To address this, a Hybrid Blockchain Reliability Prediction model (H-BRP) is proposed to evaluate and predict the reliability of blockchain peers. Comprehensive experiments on 100 blockchain requesters and 200 blockchain peers demonstrate the effectiveness of the H-BRP model, with the implementation and dataset of 2,000,000 test cases released.

IET SOFTWARE (2023)

Article Computer Science, Information Systems

Joint Communication and Sensing Toward 6G: Models and Potential of Using MIMO

Xinran Fang, Wei Feng, Yunfei Chen, Ning Ge, Yan Zhang

Summary: The sixth-generation (6G) network aims to integrate communication and sensing functions to improve efficiency and support novel applications. The MIMO technique plays a crucial role in balancing communication and sensing performance, but it also brings challenges in terms of cost, power consumption, and complexity. This survey discusses the application of MIMO in joint communication and sensing (JCAS), outlines its roles in wireless communication and radar sensing, and explores current advances and potential solutions.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Energy-Efficient Task Transfer in Wireless Computing Power Networks

Yunlong Lu, Bo Ai, Zhangdui Zhong, Yan Zhang

Summary: This article proposes the model of wireless computing power networks (WCPNs) and solves the problems encountered by conventional mobile edge computing systems in 6G networks. By jointly unifying the computing resources from end devices and MEC servers, and optimizing the allocation of computation and communication resources through a deep reinforcement learning (DRL) algorithm, the objective of minimizing execution latency and energy consumption is achieved. Numerical results show improvement in computation efficiency, convergence rate, and utility performance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Cloud-Edge-End Intelligence for Fault-Tolerant Renewable Energy Accommodation in Smart Grid

Xueqing Yang, Xin Guan, Ning Wang, Yongnan Liu, Huayang Wu, Yan Zhang

Summary: Smart grid integrates distributed energy resources and massive information to facilitate energy flow in industries. Accommodating renewable energy is crucial for achieving energy efficiency, but optimal policies are difficult to obtain due to intermittency. To capture renewable energy statuses for decision-making, heterogeneous information is collected by end devices in smart grid, posing challenges for existing algorithms. This article proposes a cloud-edge-end computing scheme to efficiently repair missing values and obtain optimal policies in two separate layers using deep learning and deep reinforcement learning algorithms. Simulations on a real power grid dataset demonstrate the effectiveness of the proposed fault-tolerant renewable energy accommodation algorithm.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Engineering, Multidisciplinary

Latency Minimization for Mobile Edge Computing Enhanced Proximity Detection in Road Networks

Yunlong Song, Yaqiong Liu, Yan Zhang, Zhifu Li, Guochu Shou

Summary: This paper proposes a proximity detection scheme for dynamic road networks based on Mobile Edge Computing (MEC), and formulates the proximity detection problem as a nonlinear optimization problem. By using the SLSQP algorithm and DDPG algorithm, the computational time can be effectively reduced, and the computational time of the DDPG algorithm is two orders of magnitude lower than that of the SLSQP algorithm.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Engineering, Multidisciplinary

Lightweight Digital Twin and Federated Learning With Distributed Incentive in Air-Ground 6G Networks

Wen Sun, Sijia Lian, Haibin Zhang, Yan Zhang

Summary: The sixth-generation (6G) wireless network aims to provide universal and reliable network access through effective inter-networking among space, air, and terrestrial networks, which poses significant challenges for dynamic network orchestration. Digital twin (DT) offers an alternative approach to real-time resource allocation by mapping and learning the complex network topology. However, establishing a digital twin on aerial networks is difficult due to limited energy capacity and insufficient computing power of unmanned aerial vehicles. In this paper, a lightweight DT empowered air-ground network architecture is proposed, where the modelling task is distributed to ground devices using federated learning, and a distributed incentive mechanism is designed to incentivize high-performance ground devices.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit

Shiyi Qi, Yaoxian Li, Cuiyun Gao, Xiaohong Su, Shuzheng Gao, Zibin Zheng, Chuanyi Liu

Summary: This study proposes a Transformer-based model, named DTrans, for learning to predict code changes. By incorporating dynamically relative position encoding in the multi-head attention of Transformer, DTrans can accurately generate patches and locate lines to change with higher accuracy compared to existing methods.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Theory & Methods

TurBO: A cost-efficient configuration-based auto-tuning approach for cluster-based big data frameworks

Hui Dou, Lei Zhang, Yiwen Zhang, Pengfei Chen, Zibin Zheng

Summary: Big data processing frameworks like Spark often come with numerous configuration parameters that affect performance, and auto-tuning these parameters is a long-standing issue in academia and industry. In this paper, we propose a cost-efficient configuration auto-tuning approach called TurBO that integrates adaptive pseudo point mechanism and CASampling method to achieve fast configuration adjustment in big data frameworks. Experimental results show that TurBO outperforms three baseline approaches, OpenTuner, Bliss, and ResTune, by 2.24x, 2.29x, and 1.97x respectively in terms of tuning speed. Furthermore, TurBO consistently delivers positive cumulative performance gain in a simulated dynamic workload scenario, making it suitable for workload changes in big data applications.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2023)

Article Computer Science, Cybernetics

From Decentralization to Oligopoly: A Data-Driven Analysis of Decentralization Evolution and Voting Behaviors on EOSIO

Jieli Liu, Weilin Zheng, Dingyuan Lu, Jiajing Wu, Zibin Zheng

Summary: This article provides a data-driven decentralization analysis of EOSIO and proposes methods to detect abnormal voting behaviors. The study reveals the evolution of decentralization in EOSIO and highlights potential issues in the system. The findings offer important insights for the design and maintenance of other DPoS-based blockchains.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li

Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.

COMPUTER STANDARDS & INTERFACES (2024)

暂无数据