{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:24:14Z","timestamp":1774023854149,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.129853","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T21:25:27Z","timestamp":1759008327000},"page":"129853","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"PD","title":["CoSemiGNN: Blockchain fraud detection with dynamic graph neural networks based on co-association of semi-supervised"],"prefix":"10.1016","volume":"298","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0009-9552-634X","authenticated-orcid":false,"given":"Yulong","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-0255-7876","authenticated-orcid":false,"given":"Qingxiao","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-5236-439X","authenticated-orcid":false,"given":"Xuedong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3336-660X","authenticated-orcid":false,"given":"Lingfeng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0001-0662-6210","authenticated-orcid":false,"given":"Ling","family":"Lin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2025.129853_bib0001","series-title":"Proceedings of the 2020 5th international conference on machine learning technologies","first-page":"23-27","article-title":"Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain","author":"Alarab","year":"2020"},{"issue":"7","key":"10.1016\/j.eswa.2025.129853_bib0002","doi-asserted-by":"crossref","first-page":"485","DOI":"10.3390\/ijgi10070485","article-title":"A3t-GCN: Attention temporal graph convolutional network for traffic forecasting","volume":"10","author":"Bai","year":"2021","journal-title":"ISPRS International Journal of Geo-Information"},{"key":"10.1016\/j.eswa.2025.129853_bib0003","first-page":"17804","article-title":"Adaptive graph convolutional recurrent network for traffic forecasting","volume":"33","author":"Bai","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.129853_bib0004","unstructured":"Bellei, C., Xu, M., Phillips, R., Robinson, T., Weber, M., Kaler, T., Leiserson, C. E., Chen, J. et al. (2024). The shape of money laundering: Subgraph representation learning on the blockchain with the elliptic2 dataset. arXiv preprint arXiv: 2404.19109."},{"issue":"1","key":"10.1016\/j.eswa.2025.129853_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s25010001","article-title":"Anomalous node detection in blockchain networks based on graph neural networks","volume":"25","author":"Chang","year":"2024","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.eswa.2025.129853_bib0006","doi-asserted-by":"crossref","first-page":"7513","DOI":"10.1007\/s10489-021-02518-9","article-title":"GC-LSTM: Graph convolution embedded LSTM for dynamic network link prediction","volume":"52","author":"Chen","year":"2022","journal-title":"Applied Intelligence"},{"issue":"5","key":"10.1016\/j.eswa.2025.129853_bib0007","doi-asserted-by":"crossref","first-page":"201","DOI":"10.3390\/a17050201","article-title":"Anomaly detection in blockchain networks using unsupervised learning: A survey","volume":"17","author":"Cholevas","year":"2024","journal-title":"Algorithms"},{"key":"10.1016\/j.eswa.2025.129853_bib0008","series-title":"Proceedings of the 22nd international conference on world wide web","first-page":"213","article-title":"Traveling the silk road: A measurement analysis of a large anonymous online marketplace","author":"Christin","year":"2013"},{"key":"10.1016\/j.eswa.2025.129853_bib0009","series-title":"Technical Report","article-title":"Inflection point: Global implications of scam centres, underground banking, and illicit online marketplaces in Southeast Asia","author":"Drugs","year":"2025"},{"key":"10.1016\/j.eswa.2025.129853_bib0010","unstructured":"Elliptic (2023). What is blockchain analytics?https:\/\/linproxy.fan.workers.dev:443\/https\/www.elliptic.co\/blockchain-basics\/what-is-blockchain-analytics."},{"key":"10.1016\/j.eswa.2025.129853_bib0011","series-title":"Proceedings of the 29th ACM SIGKDD conference on knowledge discovery and data mining","first-page":"3979-3990","article-title":"Demystifying fraudulent transactions and illicit nodes in the bitcoin network for financial forensics","author":"Elmougy","year":"2023"},{"key":"10.1016\/j.eswa.2025.129853_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113318","article-title":"Detection of illicit accounts over the ethereum blockchain","volume":"150","author":"Farrugia","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.129853_bib0013","series-title":"Recent trends in analysis of images, social networks and texts: 9th international conference, AIST 2020, Skolkovo, Moscow, Russia, october 15\u201316, 2020 revised supplementary proceedings 9","first-page":"205","article-title":"Bitcoin abnormal transaction detection based on machine learning","author":"Feldman","year":"2021"},{"key":"10.1016\/j.eswa.2025.129853_bib0014","series-title":"2018\u202fAPWG symposium on electronic crime research (ecrime)","first-page":"1","article-title":"Coinhoarder: Tracking a Ukrainian bitcoin phishing ring DNS style","author":"Holub","year":"2018"},{"key":"10.1016\/j.eswa.2025.129853_bib0015","unstructured":"Investigation, F. B. o. (2025). 2024 Internet crime report. Accessed: 2025-08-04 https:\/\/linproxy.fan.workers.dev:443\/https\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf."},{"issue":"6","key":"10.1016\/j.eswa.2025.129853_bib0016","doi-asserted-by":"crossref","first-page":"305","DOI":"10.3390\/systems11060305","article-title":"Credit card fraud detection based on unsupervised attentional anomaly detection network","volume":"11","author":"Jiang","year":"2023","journal-title":"Systems"},{"key":"10.1016\/j.eswa.2025.129853_bib0017","doi-asserted-by":"crossref","first-page":"50012","DOI":"10.1109\/ACCESS.2024.3383784","article-title":"Scalable semi-supervised graph learning techniques for anti money laundering","volume":"12","author":"Karim","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.129853_bib0018","series-title":"Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining","first-page":"1279-1289","article-title":"Predicting path failure in time-evolving graphs","author":"Li","year":"2019"},{"key":"10.1016\/j.eswa.2025.129853_bib0019","unstructured":"Li, Y., Yu, R., Shahabi, C., & Liu, Y. (2017). Diffusion convolutional recurrent neural network: Data-driven traffic forecasting. Learning, https:\/\/linproxy.fan.workers.dev:443\/https\/api.semanticscholar.org\/CorpusID:3508727."},{"issue":"3","key":"10.1016\/j.eswa.2025.129853_bib0020","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1108\/DTA-06-2021-0167","article-title":"Improving anti-money laundering in bitcoin using evolving graph convolutions and deep neural decision forest","volume":"57","author":"Mohan","year":"2023","journal-title":"Data Technologies and Applications"},{"issue":"1","key":"10.1016\/j.eswa.2025.129853_bib0021","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s41109-019-0249-6","article-title":"Quantitative analysis of cryptocurrencies transaction graph","volume":"4","author":"Motamed","year":"2019","journal-title":"Applied Network Science"},{"key":"10.1016\/j.eswa.2025.129853_bib0022","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https:\/\/linproxy.fan.workers.dev:443\/https\/bitcoin.org\/bitcoin.pdf."},{"key":"10.1016\/j.eswa.2025.129853_bib0023","series-title":"Proceedings of the thirty-fourth AAAI conference on artificial intelligence","article-title":"EvolveGCN: Evolving graph convolutional networks for dynamic graphs","author":"Pareja","year":"2020"},{"key":"10.1016\/j.eswa.2025.129853_bib0024","doi-asserted-by":"crossref","first-page":"98516","DOI":"10.1109\/ACCESS.2023.3313630","article-title":"Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks","volume":"11","author":"Sanjalawe","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2025.129853_bib0025","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","article-title":"The graph neural network model","volume":"20","author":"Scarselli","year":"2009","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.eswa.2025.129853_bib0026","series-title":"International conference on neural information processing","article-title":"Structured sequence modeling with graph convolutional recurrent networks","author":"Seo","year":"2016"},{"key":"10.1016\/j.eswa.2025.129853_bib0027","first-page":"596","article-title":"FixMatch: Simplifying semi-supervised learning with consistency and confidence","volume":"33","author":"Sohn","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.129853_bib0028","series-title":"Companion proceedings of the 2019 world wide web conference","first-page":"301-307","article-title":"Learning to represent the evolution of dynamic graphs with recurrent models","author":"Taheri","year":"2019"},{"issue":"10","key":"10.1016\/j.eswa.2025.129853_bib0029","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1007\/s00607-023-01177-7","article-title":"Ethereum fraud behavior detection based on graph neural networks","volume":"105","author":"Tan","year":"2023","journal-title":"Computing"},{"key":"10.1016\/j.eswa.2025.129853_bib0030","series-title":"Third international conference on electronics and communication; network and computer technology (ECNCT 2021)","first-page":"369","article-title":"Semi-supervised graph convolutional network for ethereum phishing scam recognition","volume":"vol. 12167","author":"Tang","year":"2022"},{"key":"10.1016\/j.eswa.2025.129853_bib0031","unstructured":"Team, C., (2025). Crypto scam revenue 2024: Pig.butchering grows nearly 40 % YoY as fraud industry leverages AI and increases in sophistication. Technical Report Chainalysis, Inc.https:\/\/linproxy.fan.workers.dev:443\/https\/www.chainalysis.com\/blog\/2024-pig-butchering-scam-revenue-grows-yoy\/."},{"key":"10.1016\/j.eswa.2025.129853_bib0032","series-title":"2019\u202fIEEE International conference on data mining (ICDM)","first-page":"598","article-title":"A semi-supervised graph attentive network for financial fraud detection","author":"Wang","year":"2019"},{"issue":"5","key":"10.1016\/j.eswa.2025.129853_bib0033","doi-asserted-by":"crossref","first-page":"2054","DOI":"10.1109\/TSC.2024.3407601","article-title":"Anomaly detection service for blockchain transactions using minimal substitution-based label propagation","volume":"17","author":"Wang","year":"2024","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.eswa.2025.129853_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109194","article-title":"Research on blockchain abnormal transaction detection technology combining CNN and transformer structure","volume":"116","author":"Wang","year":"2024","journal-title":"Computers and Electrical Engineering"},{"key":"10.1016\/j.eswa.2025.129853_bib0035","unstructured":"Weber, M., Domeniconi, G., Chen, J., Weidele, D. K. I., Bellei, C., Robinson, T., & Leiserson, C. E. (2019). Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. arXiv: 1908.02591 [cs.SI], https:\/\/linproxy.fan.workers.dev:443\/https\/arxiv.org\/abs\/1908.02591."},{"key":"10.1016\/j.eswa.2025.129853_bib0036","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"14557","article-title":"Semi-supervised credit card fraud detection via attribute-driven graph representation","volume":"vol. 37","author":"Xiang","year":"2023"},{"issue":"16","key":"10.1016\/j.eswa.2025.129853_bib0037","doi-asserted-by":"crossref","first-page":"11647","DOI":"10.1007\/s00500-023-08220-x","article-title":"CTDM: Cryptocurrency abnormal transaction detection method with spatio-temporal and global representation","volume":"27","author":"Xiao","year":"2023","journal-title":"Soft Comput."},{"key":"10.1016\/j.eswa.2025.129853_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102055","article-title":"Bitcoin transaction pattern recognition based on semi-supervised learning","volume":"71","author":"Xue","year":"2023","journal-title":"Journal of Computational Science"},{"key":"10.1016\/j.eswa.2025.129853_bib0039","series-title":"2021\u202fIEEE 45th annual computers, software, and applications conference (COMPSAC)","first-page":"312","article-title":"Abnormal transaction detection based on graph networks","author":"Yu","year":"2021"},{"key":"10.1016\/j.eswa.2025.129853_bib0040","series-title":"2022\u202fIEEE conference on telecommunications, optics and computer science (TOCS)","first-page":"666","article-title":"GRU-GAT model for blockchain bitcoin abnormal transaction detection","author":"Zheng","year":"2022"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425034682?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425034682?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:18:14Z","timestamp":1764850694000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425034682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":40,"alternative-id":["S0957417425034682"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129853","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"CoSemiGNN: Blockchain fraud detection with dynamic graph neural networks based on co-association of semi-supervised","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129853","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"129853"}}