ADPP: A Novel Anomaly Detection and Privacy-Preserving Framework using Blockchain and Neural Networks in Tokenomics
-
Published:2022-11-30
Issue:6
Volume:13
Page:17-32
-
ISSN:0976-2191
-
Container-title:International Journal of Artificial Intelligence & Applications
-
language:
-
Short-container-title:IJAIA
Author:
Yao Wei,Gu Jingyi,Du Wenlu,P. Deek Fadi,Wang Guiling
Abstract
The increasing popularity of crypto assets has resulted in greater cryptocurrency investor interest and more exposure in both industry and academia. Despite the substantial socioeconomic benefits, the anonymous character of cryptocurrency trading makes it prone to abuse and a magnet for illicit purposes, which cause monetary losses for individual traders and erosion in the standing of the tokenomics industry. To regulate the illicit behavior and secure users' privacy for cryptocurrency trading, we present an Anomaly Detection and Privacy-Preserving (ADPP) Framework integrating blockchain and deep learning technologies. Specifically, ADPP leverages blockchain technologies to build a user management platform that ensures anonymity and enhances the privacy-preservation of user information. Atop the user management system, an Anomaly Detection System adapts neural networks and imbalanced learning on topological cryptocurrency flow among users to identify anomalous addresses and maintain a sanction list repository. The experiments on the real-world dataset demonstrate the effectiveness and superior performance of ADPP. The flexible framework can be easily generalized to the crypto assets with public real-time transaction (e.g., Non-fungible Token), which takes up a significant proportion of market capitalization in the domain of tokenomics.
Publisher
Academy and Industry Research Collaboration Center (AIRCC)
Reference28 articles.
1. [1] E. A. Akartuna, S. D. Johnson, and A. Thornton, "Preventing the money laundering and terrorist financing risks of emerging technologies: An international policy delphi study," Technological Forecasting and Social Change, vol. 179, p. 121632, 2022. 2. [2] S. Foley, J. R. Karlsen, and T. J. Putnin, š, "Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?," The Review of Financial Studies, vol. 32, no. 5, pp. 1798- 1853, 2019. 3. [3] S. Cantor, J. Hodges, J. Kemp, and P. Thompson, "Liberty id-ff architecture overview," Wason, Thomas (Herausgeber): Liberty Alliance Project Version, vol. 1, 2003. 4. [4] D. K. Duvenaud, D. Maclaurin, J. Iparraguirre, R. Bombarell, T. Hirzel, A. Aspuru-Guzik, and R. P. Adams, "Convolutional networks on graphs for learning molecular fingerprints," Advances in neural information processing systems, vol. 28, 2015. 5. [5] R. Oppliger, "Microsoft. net passport: A security analysis," Computer, vol. 36, no. 7, pp. 29-35, 2003.
|
|