A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain
2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence
By capitalizing on the recent advances in Topological Data Analysis, we propose a novel efficient and tractable framework to automatically predict new ransomware transactions in a ransomware family, given ...
Currently, most hackers use Bitcoin for payments, and existing ransomware detection tools depend only on a couple of heuristics and/or tedious data gathering steps. ...
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI for Computational Sustainability and Human Well-being ...
doi:10.24963/ijcai.2020/606
dblp:conf/ijcai/SubagdjaTT20
fatcat:zk7vq5fpmja6deotkvntnl3fkm
The BitcoinHeist: Classifications of Ransomware Crime Families
2021
International Journal of Computer Science & Information Technology (IJCSIT)
I propose to work on the Bitcoin Heist data set to classify the different malicious transactions. ...
The different transactions features are analyzed to predict a classifier label among the classifiers that have been identified as ransomware or associated with malicious activity. ...
This dataset has been made public by the original researchers who worked on the Bitcoin Heist for ransomware detection on the Bitcoin Blockchain [8] . ...
doi:10.5121/ijcsit.2021.13506
fatcat:zbju7tvxjbgm3mjxfqj2qh7o6i
Blockchain-Empowered Mobile Edge Intelligence, Machine Learning and Secure Data Sharing
[chapter]
2021
Blockchain Potential in AI [Working Title]
With the advent of new decentralized machine learning approaches and mobile edge computing, the IoT on-device data training has now become possible. ...
To handle these problems, blockchain has been considered as a promising solution. As a distributed smart ledger, blockchain is renowned for high scalability, privacy-preserving, and decentralization. ...
By applying topological data analysis into the past records of transactions, BitcoinHeist can automate the prediction of new ransomware transactions in an address cluster, and detect new ransomware that ...
doi:10.5772/intechopen.96618
fatcat:tjon4elghrcq5e5lfsfmyx2srm
Distributed Computing with Permissioned Blockchains and Databases (Dagstuhl Seminar 19261)
2019
Dagstuhl Reports
As a consequence, a number of players in the IT industry work on a development of the technology, and several consortia have been formed to advance the technology across industries, among them Hyperledger ...
It brought together a very good mix of people from academia and industry as well as from databases and related areas for which blockchain is a current topic and who are either users or developers in that ...
Acknowledgements We want to thank the Dagstuhl staff for providing an environment that truly encourages scientific exchange and discussions and that cares for the guests in an unmatched way. ...
doi:10.4230/dagrep.9.6.69
dblp:journals/dagstuhl-reports/0001OV19
fatcat:vwtnp5r6cjejtj2m7bnsio5mai