Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    A Bitcoin Address Multi-Classification Mechanism Based on Bipartite Graph-Based Maximization Consensus

    Lejun Zhang1,2,3,*, Junjie Zhang1, Kentaroh Toyoda4, Yuan Liu2, Jing Qiu2, Zhihong Tian2, Ran Guo5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 783-800, 2024, DOI:10.32604/cmes.2023.043469

    Abstract Bitcoin is widely used as the most classic electronic currency for various electronic services such as exchanges, gambling, marketplaces, and also scams such as high-yield investment projects. Identifying the services operated by a Bitcoin address can help determine the risk level of that address and build an alert model accordingly. Feature engineering can also be used to flesh out labeled addresses and to analyze the current state of Bitcoin in a small way. In this paper, we address the problem of identifying multiple classes of Bitcoin services, and for the poor classification of individual addresses that do not have significant… More >

  • Open Access

    ARTICLE

    Predicting Bitcoin Trends Through Machine Learning Using Sentiment Analysis with Technical Indicators

    Hae Sun Jung1, Seon Hong Lee1, Haein Lee1, Jang Hyun Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2231-2246, 2023, DOI:10.32604/csse.2023.034466

    Abstract Predicting Bitcoin price trends is necessary because they represent the overall trend of the cryptocurrency market. As the history of the Bitcoin market is short and price volatility is high, studies have been conducted on the factors affecting changes in Bitcoin prices. Experiments have been conducted to predict Bitcoin prices using Twitter content. However, the amount of data was limited, and prices were predicted for only a short period (less than two years). In this study, data from Reddit and LexisNexis, covering a period of more than four years, were collected. These data were utilized to estimate and compare the… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization attacks allow users to link… More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple problems including lack of data… More >

  • Open Access

    ARTICLE

    Selfish Mining and Defending Strategies in the Bitcoin

    Weijian Zhang1,*, Hao Wang2, Hao Hua3, Qirun Wang4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1861-1875, 2022, DOI:10.32604/iasc.2022.030274

    Abstract As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, the author conducts the simulation… More >

  • Open Access

    ARTICLE

    A Novel Cryptocurrency Prediction Method Using Optimum CNN

    Syed H. Hasan1, Syeda Huyam Hasan2, Mohammed Salih Ahmed3, Syed Hamid Hasan4,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1051-1063, 2022, DOI:10.32604/cmc.2022.020823

    Abstract In recent years, cryptocurrency has become gradually more significant in economic regions worldwide. In cryptocurrencies, records are stored using a cryptographic algorithm. The main aim of this research was to develop an optimal solution for predicting the price of cryptocurrencies based on user opinions from social media. Twitter is used as a marketing tool for cryptoanalysis owing to the unrestricted conversations on cryptocurrencies that take place on social media channels. Therefore, this work focuses on extracting Tweets and gathering data from different sources to classify them into positive, negative, and neutral categories, and further examining the correlations between cryptocurrency movements… More >

  • Open Access

    ARTICLE

    Bitcoin Candlestick Prediction with Deep Neural Networks Based on Real Time Data

    Reem K. Alkhodhairi1, Shahad R. Aljalhami1, Norah K. Rusayni1, Jowharah F. Alshobaili1, Amal A. Al-Shargabi1,*, Abdulatif Alabdulatif2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3215-3233, 2021, DOI:10.32604/cmc.2021.016881

    Abstract Currently, Bitcoin is the world’s most popular cryptocurrency. The price of Bitcoin is extremely volatile, which can be described as high-benefit and high-risk. To minimize the risk involved, a means of more accurately predicting the Bitcoin price is required. Most of the existing studies of Bitcoin prediction are based on historical (i.e., benchmark) data, without considering the real-time (i.e., live) data. To mitigate the issue of price volatility and achieve more precise outcomes, this study suggests using historical and real-time data to predict the Bitcoin candlestick—or open, high, low, and close (OHLC)—prices. Seeking a better prediction model, the present study… More >

  • Open Access

    ARTICLE

    A Survey on Security Threats and Solutions of Bitcoin

    Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1

    Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349

    Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various attack scenarios that the bitcoin… More >

  • Open Access

    ARTICLE

    A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

    Lejun Zhang1, 2, Zhijie Zhang1, Weizheng Wang3, Rasheed Waqas1, Chunhui Zhao1, 4, Seokhoon Kim5, Huiling Chen6, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 597-616, 2020, DOI:10.32604/cmc.2020.011554

    Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low information embedding efficiency, the use… More >

Displaying 1-10 on page 1 of 9. Per Page