sgsourav / blockchain-network-analysisLinks
☆23Updated 5 years ago
Alternatives and similar repositories for blockchain-network-analysis
Users that are interested in blockchain-network-analysis are comparing it to the libraries listed below
Sorting:
- [ICLR 2024] EX-Graph: A Pioneering Dataset Bridging Ethereum and X https://openreview.net/pdf?id=juE0rWGCJW☆21Updated last year
- Chartalist.org. Sponsored by the Canadian NSERC Discovery Grant RGPIN-2020-05665: Data Science on Blockchain and the National Science Fou…☆34Updated 2 years ago
- Elliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet Addresses☆117Updated last year
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆29Updated 9 months ago
- MSc Project☆36Updated 6 years ago
- EvolveGCN applied to Elliptic dataset☆30Updated 3 years ago
- ☆18Updated last year
- ☆57Updated 7 years ago
- ☆12Updated 2 years ago
- ☆32Updated 5 years ago
- As the most famous application of blockchain, cryptocurrency has suffered huge economic losses due to phishing scams. Our work shares phi…☆34Updated 3 years ago
- Extracting and Exploring Blockchain Data from Ethereum☆90Updated last week
- ☆13Updated 5 years ago
- ☆18Updated last year
- Graph Convolutional Network on data from Elliptic bitcoin dataset of transactions graph☆16Updated 6 years ago
- ☆12Updated last year
- Profiling and Deanonymizing Ethereum Users☆75Updated 3 years ago
- ☆30Updated 5 years ago
- ☆10Updated 3 years ago
- ☆11Updated last year
- ☆15Updated 3 years ago
- The code of Addgraph frame.☆23Updated 4 years ago
- Interbank Risk Rating: Datasets and Methods☆19Updated 9 months ago
- ☆49Updated 5 years ago
- Detecting Fraudulent Blockchain Accounts on Ethereum with Supervised Machine Learning☆36Updated 2 years ago
- Implementation of Greedy, CELF++, SPIN, IV-Greedy, Degree Discount algorithms for influence maximization in social network and informatio…☆59Updated 4 years ago
- ☆14Updated 3 years ago
- ☆17Updated 3 years ago
- This repository contains the code used in the experimental setup of the paper 'Inductive Graph Representation Learning for Fraud Detectio…☆34Updated 2 years ago
- Attacker Contract Identifier Through Static Dataflow Analysis☆26Updated 2 weeks ago