dkondor / bitcoinLinks
Bitcoin Core integration/staging tree
☆13Updated 4 years ago
Alternatives and similar repositories for bitcoin
Users that are interested in bitcoin are comparing it to the libraries listed below
Sorting:
- Clustering of pseudoanonymous bitcoin addresses into related entities using structure of the bitcoin transaction graph and de-anonymizati…☆17Updated 7 years ago
- EvolveGCN applied to Elliptic dataset☆30Updated 3 years ago
- ☆33Updated 5 years ago
- ☆24Updated 7 months ago
- Graph Convolutional Network on data from Elliptic bitcoin dataset of transactions graph☆16Updated 5 years ago
- Elliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet Addresses☆101Updated last year
- ☆49Updated 5 years ago
- As the most famous application of blockchain, cryptocurrency has suffered huge economic losses due to phishing scams. Our work shares phi…☆31Updated 3 years ago
- ☆10Updated 3 years ago
- ☆57Updated 7 years ago
- Blockchain graph analysis tools for Bitcoin. In collaboration w. Aurora Guo.☆26Updated 8 years ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆28Updated 4 months ago
- Anomaly Mining of Entity Neighborhoods (AMEN)☆17Updated 8 years ago
- SedanSpot: Detecting Anomalies in Edge Streams☆25Updated 6 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆221Updated 3 years ago
- ☆9Updated 4 years ago
- Graph-based Sybil detection☆23Updated 7 years ago
- ☆28Updated last year
- Outlier Aware Network Embedding for Attributed Networks☆19Updated 5 years ago
- ☆9Updated 6 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11Updated 2 years ago
- Codes and data for KDD2020 submission☆17Updated 5 years ago
- ☆58Updated 5 years ago
- 用于图异常检测的数据集☆44Updated 5 years ago
- ☆12Updated last year
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Updated 5 years ago
- ☆23Updated 5 years ago
- ☆13Updated 9 years ago
- Code for Deep Anomaly Detection on Attributed Networks (SDM2019)☆131Updated 3 years ago
- Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"☆22Updated 9 months ago