{"id":"https://openalex.org/W4416549281","doi":"https://doi.org/10.1145/3719027.3765574","title":"Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency","display_name":"Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549281","doi":"https://doi.org/10.1145/3719027.3765574"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765574","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073282735","display_name":"Qishuang Fu","orcid":"https://orcid.org/0009-0000-6964-6641"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Qishuang Fu","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073282735"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46636187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4875","last_page":"4877"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.7954999804496765,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.7954999804496765,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.12690000236034393,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.006500000134110451,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/money-laundering","display_name":"Money laundering","score":0.8745999932289124},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.8079000115394592},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.6539999842643738},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.5115000009536743},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.3666999936103821},{"id":"https://openalex.org/keywords/consumer-privacy","display_name":"Consumer privacy","score":0.3160000145435333}],"concepts":[{"id":"https://openalex.org/C2780005421","wikidata":"https://www.wikidata.org/wiki/Q151900","display_name":"Money laundering","level":2,"score":0.8745999932289124},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.8079000115394592},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6966000199317932},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.6539999842643738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5888000130653381},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.5115000009536743},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4424000084400177},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32409998774528503},{"id":"https://openalex.org/C2778656907","wikidata":"https://www.wikidata.org/wiki/Q5164712","display_name":"Consumer privacy","level":3,"score":0.3160000145435333},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C2777989319","wikidata":"https://www.wikidata.org/wiki/Q597393","display_name":"Illegal logging","level":3,"score":0.27219998836517334},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26190000772476196}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765574","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W3033317866","https://openalex.org/W3060230940","https://openalex.org/W4286256869","https://openalex.org/W4313423368","https://openalex.org/W4364323110","https://openalex.org/W4380551105","https://openalex.org/W4386962711","https://openalex.org/W4390097444","https://openalex.org/W4392745883","https://openalex.org/W4396758663","https://openalex.org/W4396844293","https://openalex.org/W4401718954","https://openalex.org/W4409356707"],"related_works":[],"abstract_inverted_index":{"Cryptocurrency":[0],"money":[1],"laundering":[2,50,100,127],"poses":[3],"a":[4,78,112,119],"serious":[5],"threat":[6],"to":[7,30],"the":[8,44,105,109,116],"security":[9],"and":[10,46,69,97,115],"compliance":[11],"of":[12,48,111,118],"decentralized":[13],"financial":[14],"systems.":[15],"While":[16],"various":[17],"detection":[18],"methods":[19],"have":[20],"been":[21],"proposed,":[22],"existing":[23],"approaches":[24],"either":[25],"lack":[26],"explainability":[27,45],"or":[28],"struggle":[29],"effectively":[31],"handle":[32],"privacy":[33,87],"coins.":[34],"This":[35],"dissertation":[36],"proposes":[37,56],"two":[38],"research":[39],"directions":[40],"aimed":[41],"at":[42],"enhancing":[43],"effectiveness":[47],"anti-money":[49],"(AML)":[51],"techniques.":[52],"The":[53,74],"first":[54,106],"direction":[55,76,107],"an":[57],"explainable":[58],"AML":[59],"framework":[60],"for":[61,81],"non-privacy":[62],"coins":[63,88],"by":[64],"incorporating":[65],"transaction":[66],"semantic":[67],"parsing":[68],"large":[70,121],"language":[71,122],"model-based":[72],"classification.":[73],"second":[75],"explores":[77],"novel":[79],"method":[80],"tracking":[82],"illicit":[83],"fund":[84],"flows":[85],"involving":[86],"such":[89],"as":[90],"Monero,":[91],"focusing":[92],"on":[93,104],"improving":[94],"de-anonymization":[95],"accuracy":[96],"identifying":[98],"cross-chain":[99],"paths.":[101],"Preliminary":[102],"results":[103],"demonstrate":[108],"feasibility":[110],"semantic-aware":[113],"module":[114],"potential":[117],"fine-tuned":[120],"model":[123],"in":[124],"detecting":[125],"complex":[126],"behaviors.":[128]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
