{"id":"https://openalex.org/W4320004330","doi":"https://doi.org/10.1109/tdsc.2023.3238412","title":"Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach","display_name":"Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach","publication_year":2023,"publication_date":"2023-01-20","ids":{"openalex":"https://openalex.org/W4320004330","doi":"https://doi.org/10.1109/tdsc.2023.3238412"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3238412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3238412","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068658866","display_name":"Anton Wahrst\u00e4tter","orcid":"https://orcid.org/0000-0003-3816-5938"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Anton Wahrst\u00e4tter","raw_affiliation_strings":["Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025054732","display_name":"Jor\u00e3o Gomes","orcid":"https://orcid.org/0000-0001-6712-3943"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Jor\u00e3o Gomes","raw_affiliation_strings":["Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084521751","display_name":"Sajjad Khan","orcid":"https://orcid.org/0000-0002-6608-5065"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Sajjad Khan","raw_affiliation_strings":["Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049821727","display_name":"Davor Svetinovi\u0107","orcid":"https://orcid.org/0000-0002-3020-9556"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]},{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE","AT"],"is_corresponding":false,"raw_author_name":"Davor Svetinovic","raw_affiliation_strings":["Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria","Center for Cyber-Physical Systems, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Operations Management, Research Institute for Cryptoeconomics, Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]},{"raw_affiliation_string":"Center for Cyber-Physical Systems, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068658866"],"corresponding_institution_ids":["https://openalex.org/I102248843"],"apc_list":null,"apc_paid":null,"fwci":26.484,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.99632221,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"20","issue":"6","first_page":"4946","last_page":"4956"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11705","display_name":"Gambling Behavior and Treatments","score":0.9483000040054321,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/money-laundering","display_name":"Money laundering","score":0.8860319256782532},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.7782795429229736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7710592746734619},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6838707327842712},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5864814519882202},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5507841110229492},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4946920573711395},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4749603271484375},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4625638425350189},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4519864320755005},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.41745027899742126},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.36556240916252136},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2923421263694763},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21149462461471558},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17013224959373474},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10238242149353027},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.09784513711929321}],"concepts":[{"id":"https://openalex.org/C2780005421","wikidata":"https://www.wikidata.org/wiki/Q151900","display_name":"Money laundering","level":2,"score":0.8860319256782532},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.7782795429229736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7710592746734619},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6838707327842712},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5864814519882202},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5507841110229492},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4946920573711395},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4749603271484375},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4625638425350189},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4519864320755005},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.41745027899742126},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36556240916252136},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2923421263694763},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21149462461471558},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17013224959373474},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10238242149353027},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.09784513711929321},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2023.3238412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3238412","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:research.wu.ac.at:openaire_cris_publications/7f64eda3-2685-40fd-8fdc-151e9a09fec0","is_oa":false,"landing_page_url":"https://research.wu.ac.at/de/publications/7f64eda3-2685-40fd-8fdc-151e9a09fec0","pdf_url":null,"source":{"id":"https://openalex.org/S7407055123","display_name":"WU Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wahrst\u00e4tter, A, Gomes Junior, J, Khan, S & Svetinovic, D 2023, 'Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach', IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 6, pp. 4946-4956. https://doi.org/10.1109/TDSC.2023.3238412","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W179922057","https://openalex.org/W1454642304","https://openalex.org/W1994130174","https://openalex.org/W2022932831","https://openalex.org/W2113341218","https://openalex.org/W2283695185","https://openalex.org/W2404740077","https://openalex.org/W2583871253","https://openalex.org/W2611486340","https://openalex.org/W2754835279","https://openalex.org/W2783786631","https://openalex.org/W2794784953","https://openalex.org/W2905573247","https://openalex.org/W2921156420","https://openalex.org/W2941654642","https://openalex.org/W2954892532","https://openalex.org/W2963604227","https://openalex.org/W3041329983","https://openalex.org/W3096419271","https://openalex.org/W3101206772","https://openalex.org/W3106122107","https://openalex.org/W3110811887","https://openalex.org/W3123431419","https://openalex.org/W3127103187","https://openalex.org/W3138941680","https://openalex.org/W3156644234","https://openalex.org/W3161427439","https://openalex.org/W3162879054","https://openalex.org/W3169173345","https://openalex.org/W3182540742","https://openalex.org/W3200395602","https://openalex.org/W3203824217","https://openalex.org/W3211374183","https://openalex.org/W4200420517","https://openalex.org/W4205171403","https://openalex.org/W4210340004","https://openalex.org/W4213426662","https://openalex.org/W4221151955","https://openalex.org/W4286521419","https://openalex.org/W4287322766","https://openalex.org/W4295720041","https://openalex.org/W6686453509","https://openalex.org/W6761310889","https://openalex.org/W6773953581","https://openalex.org/W6791470956","https://openalex.org/W6801431300","https://openalex.org/W6809870053"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W618752296","https://openalex.org/W3109867883","https://openalex.org/W4291291739","https://openalex.org/W1694920370","https://openalex.org/W4321377877"],"abstract_inverted_index":{"The":[0],"potential":[1,81,183],"of":[2,22,74,96,193],"Bitcoin":[3,34,49,98],"for":[4],"money":[5,35],"laundering":[6,187],"and":[7,29,174,189,195],"terrorist":[8],"financing":[9,192],"represents":[10],"a":[11,71,93,109,124],"significant":[12,168],"challenge":[13],"in":[14,52,60],"law":[15],"enforcement.":[16],"In":[17,37,63],"recent":[18],"years,":[19],"the":[20,47,66,97,106,129,153,191],"use":[21,41,78],"privacy-improving":[23],"CoinJoin":[24,172],"transactions":[25],"has":[26],"grown":[27],"significantly":[28,148],"helped":[30],"criminal":[31,82],"actors":[32,57],"obfuscate":[33],"flows.":[36],"this":[38],"study,":[39],"we":[40,69,77,87,137,158],"unsupervised":[42],"machine":[43],"learning":[44],"to":[45,54,65,79,92,104,118,146,171,185],"analyze":[46,105],"complete":[48],"user":[50,99],"graph":[51],"order":[53],"identify":[55,80],"suspicious":[56,155],"potentially":[58],"involved":[59],"illegal":[61,164,197],"activities.":[62,198],"contrast":[64],"existing":[67],"studies,":[68],"introduce":[70],"novel":[72],"set":[73],"features":[75],"that":[76,139,160],"activity":[83,151],"more":[84,110,149],"accurately.":[85],"Furthermore,":[86],"apply":[88],"our":[89,132,140],"clustering":[90,142],"algorithm":[91],"CoinJoin-adjusted":[94],"variant":[95],"graph,":[100],"which":[101],"enables":[102],"us":[103],"network":[107],"at":[108,123],"detailed,":[111],"user-centric":[112],"level":[113],"while":[114],"still":[115],"offering":[116],"opportunities":[117],"address":[119],"advanced":[120],"privacy-enhancing":[121],"techniques":[122],"later":[125],"stage.":[126],"By":[127],"comparing":[128],"results":[130,181],"with":[131,163],"ground":[133],"truth":[134],"data":[135],"set,":[136],"find":[138,159],"improved":[141],"method":[143],"is":[144],"able":[145],"capture":[147],"illicit":[150],"within":[152],"most":[154],"clusters.":[156],"Finally,":[157],"users":[161],"associated":[162],"activities":[165],"commonly":[166],"have":[167,182],"short":[169],"paths":[170],"wallets":[173],"show":[175],"tendencies":[176],"toward":[177],"outlier":[178],"behavior.":[179],"Our":[180],"contributions":[184],"anti-money":[186],"efforts":[188],"combating":[190],"terrorism":[194],"other":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":11}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
