Newell, E., et al.: User migration in online social networks: a case study on reddit during a period of community unrest. In: Proceedings of the 10th International Conference on Web and Social Media, pp. 279–288 (2016)
Kalodner, H.A., et al.: BlockSci: design and applications of a blockchain analysis platform. In: Proceedings of the 29th USENIX Conference on Security Symposium, pp. 2721–2738 (2020)
Foley, S., Karlsen, J.R., Putniņš, T.J.: Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? Rev. Fin. Stud. 32(5), 1798–1853 (2019)
Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457–468. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5 29
Athey, S., Parashkevov, I., Sarukkai, V., Xia, J.: Bitcoin pricing, adoption, and usage: theory and evidence, vol. 13, no. 4, pp. 675–746. Stanford Institute for Economic Policy Research (2016)
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 13th Conference on Internet Measurement, pp. 127–140 (2013)
Remy, C., Rym, B., Matthieu, L.: Tracking bitcoin users activity using community detection on a network of weak signals. In: Cherifi, C., Cherifi, H., Karsai, M., Musolesi, M. (eds.) COMPLEX NETWORKS 2017 2017. SCI, vol. 689, pp. 166– 177. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72150-7 14
Newman, M.E.: Power laws, pareto distributions and Zipf ’s law. Contemp. Phys. 46(5), 323–351 (2005)
Google trends (2021). https://trends.google.com
Cai, H., Zheng, V.W., Chang, K.C.C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)
Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Proceedings of the 31st Conference on Neural Information Processing Systems, pp. 1024–1034 (2017)
Bishop, C.M., et al.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1995)
Cheng, Q.: Structure entropy weight method to confirm the weight of evaluating index. Syst. Eng. Theor. Pract. 30(7), 1225–1228 (2010)
Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S.: An empirical analysis of anonymity in Zcash. In: Proceedings of the 27th USENIX Conference on Security Symposium, pp. 463–477 (2018)
Huang, D.Y., et al.: Tracking ransomware end-to-end. In: Proceedings of the 39th IEEE Symposium on Security and Privacy, pp. 618–631 (2018)
Toyoda, K., Mathiopoulos, P.T., Ohtsuki, T.: A novel methodology for HYIP oper-ators’ bitcoin addresses identification. IEEE Access 7, 74835–74848 (2019)
Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Proceedings of the 2nd Conference on Blockchain and Trustworthy Systems, pp. 99–111 (2020)
Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: evidence from mining the Mt. Gox transaction network. In: Proceedings of the 38th IEEE Conference on Computer Communications (2019)