sgsourav / blockchain-network-analysisLinks
☆23Updated 5 years ago
Alternatives and similar repositories for blockchain-network-analysis
Users that are interested in blockchain-network-analysis are comparing it to the libraries listed below
Sorting:
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆29Updated 5 months ago
- Elliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet Addresses☆104Updated last year
- EvolveGCN applied to Elliptic dataset☆30Updated 3 years ago
- ☆57Updated 7 years ago
- [ICLR 2024] EX-Graph: A Pioneering Dataset Bridging Ethereum and X https://openreview.net/pdf?id=juE0rWGCJW☆19Updated 9 months ago
- ☆12Updated last year
- Graph Convolutional Network on data from Elliptic bitcoin dataset of transactions graph☆16Updated 5 years ago
- Chartalist.org. Sponsored by the Canadian NSERC Discovery Grant RGPIN-2020-05665: Data Science on Blockchain and the National Science Fou…☆33Updated last year
- ☆12Updated last year
- Extracting and Exploring Blockchain Data from Ethereum☆81Updated 2 months ago
- ☆10Updated last year
- ☆33Updated 5 years ago
- ☆14Updated last year
- Interbank Risk Rating: Datasets and Methods☆18Updated 5 months ago
- ☆13Updated 5 years ago
- ☆16Updated 3 years ago
- ☆29Updated 4 years ago
- ☆14Updated 2 years ago
- ☆10Updated 3 years ago
- ☆9Updated 11 months ago
- This github contains the implementation of the method proposed in MDGNN_BS paper☆11Updated last year
- SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning☆57Updated 2 years ago
- This is the repository for the collection of Graph Neural Network for Financial Technology.☆28Updated 3 years ago
- ☆24Updated 8 months ago
- As the most famous application of blockchain, cryptocurrency has suffered huge economic losses due to phishing scams. Our work shares phi…☆32Updated 3 years ago
- Profiling and Deanonymizing Ethereum Users☆74Updated 3 years ago
- TNNLS: A Synergistic Approach for Graph Anomaly Detection with Pattern Mining and Feature Learning; CIKM'20: Error-bounded Graph Anomaly …☆42Updated 2 years ago
- Implementation of Greedy, CELF++, SPIN, IV-Greedy, Degree Discount algorithms for influence maximization in social network and informatio…☆58Updated 3 years ago
- ☆14Updated 3 years ago
- The code of Addgraph frame.☆23Updated 3 years ago