[1] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2] 田国华,胡云瀚,陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报2021,32(5):1495-1525.
TIAN G H,HU Y H,CHEN X F.Research progress on attack and defense techniques in block-chain system[J].Journal of Software,2021,32(5):1495-1525.
[3] SONI A,MAHESHWARI S.A survey of attacks on the bitcoin system[C]//2018 IEEE International Students’ Conference on Electrical,Electronics and Computer Science,2018:1-5.
[4] 李素,宋宝燕,李冬,等.面向金融活动的复合区块链关联事件溯源方法[J].计算机科学,2022,49(3):346-353.
LI S,SONG B Y,LI D,et al.Composite blockchain associated event tracing method for financial activities[J].Computer Science,2022,49(3):346-353.
[5] PARK S,IM S,SEOL Y,et al.Nodes in the bitcoin network:comparative measurement study and survey[J].IEEE Access,2019,7:57009-57022.
[6] RAHOUTI M,XIONG K,GHANI N.Bitcoin concepts,threats,and machine-learning security solutions[J].IEEE Access,2018,6:67189-67205.
[7] 檀超,张静宣,王铁鑫,等.复杂软件系统的不确定性 [J].软件学报,2021,32(7):1926-1956.
TAN C,ZHANG J Y,WANG T X,et al.Uncertainty-wise software engineering of complex systems:a systematic mapping study[J].Journal of Software,2021,32(7):1926-1956.
[8] 张昭昭,朱应钦,乔俊飞,等.一种基于行为空间的回声状态网络参数优化方法[J].信息与控制,2021,50(5):556-565.
ZHNAG Z Z,ZHU Y Q,QIAO J F,et al.An echo state network parameter optimization method based on behavior space[J].Information and Control,2021,50(5):556-565.
[9] ROUHOLLAHI Z.Towards artificial intelligence enabled financial crime detection[J].arXiv:2105.10866,2021.
[10] CHANDRADEVA L S,AMARASINGHE T M,DE SILVA M,et al.Monetary transaction fraud detection system based on machine learning strategies[C]//Proceedings of the 4th International Congress on Information and Communication Technology,2020:385-396.
[11] 喻文强,张艳梅,李梓宇,等.以太坊庞氏骗局的类型分析与识别方法[J].重庆大学学报,2020,43(11):111-120.
YU W Q,ZHANG Y M,LI Z Y,et al.Study on type analysis and identification of Ethereum Ponzi scheme[J].Journal of Chongqing University,2020,43(11):111-120.
[12] WEBER M,DOMENICONI G,CHEN J.Anti-money laundering in bitcoin:Experimenting with graph convolutional networks for financial forensics[J].arXiv:1908. 02591,2019.
[13] MONAMO P,MARIVATE V,TWALA B.Unsupervised learning for robust Bitcoin fraud detection[C]//Proceedings of the 2016 Information Security for South Africa(ISSA),2016:129-134.
[14] 林伟宁,陈明志,詹云清,等.一种基于PCA和随机森林分类的入侵检测算法研究[J].信息网络安全,2017(11):50-54.
LIN WN,CHEN MZ,ZHAN YQ,et al.Research on an intrusion detection algorithm based on PCA and random-forest classification[J].Netinfo Security,2017(11):50-54.
[15] KURSHAN E,SHEN H,YU H.Financial crime & fraud detection using graph computing:application considerations & outlook[C]//Proceedings of the 2020 Second International Conference on Transdisciplinary AI(TransAI),2020:542-549.
[16] QIAN L,YIJUN G.Abnormal transaction detection of Bitcoin network based on feature fusion[C]//Proceedings of the 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference,2020:542-549.
[17] 张昊,张小雨,张振友,等.基于深度学习的入侵检测模型综述[J].计算机工程与应用,2022,58(6):17-28.
ZHANG H,ZHANG X Y,ZHANG Z Y,et al.Summary of intrusion detection models based on deep learning[J].Computer Engineering and Applications,2022,58(6):17-28.
[18] 张昭昭,乔俊飞,余文.多层自适应模块化神经网络结构设计[J].计算机学报,2017,40(12):2827-2838.
ZHANG Z Z,QIAO J F,YU W.Stuctrue design of hierarchical adaptive modular neural network[J].Chinese Journal of Computers,2017,40(12):2827-2838.
[19] RODRIGUEZ A,LAIO A.Clustering by fast search and find of density peaks [J].Science,2014,344:1492.
[20] CONG Y,YUAN J,LIU J.Abnormal event detection in crowded scenes using sparse representation[J].Pattern Recognition,2013,46(7):1851-1864.
[21] XU J,XIANG L,LIU Q,et al.Stacked sparse autoencoder(SSAE) for nuclei detection on breast cancer histopathology images[J].IEEE Transactions on Medical Imaging,2015,35(1):119-130.
[22] BLAKE C.UCI repository of machine learning databases[C]//Neural Information Processing Systems,1998.
[23] VASSALLO D,VELLA V,ELLUL J.Application of gradient boosting algorithms for anti-money laundering in cryptocurrencies[J].SN Computer Science,2021,2:1-15.