<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Machine Learning⋆,⋆⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadia Pocher</string-name>
          <email>nadia.pocher@uab.cat</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mirko Zichichi</string-name>
          <email>mirko.zichichi@upm.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefano Ferretti</string-name>
          <email>stefano.ferretti@uniurb.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, University of Bologna</institution>
          ,
          <addr-line>Bologna</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Legal Studies, University of Bologna</institution>
          ,
          <addr-line>Bologna</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Dipartimento di Scienze Pure e Applicate, University of Urbino Carlo Bo</institution>
          ,
          <addr-line>Urbino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Institute of Law and Technology, Universitat Autònoma de Barcelona</institution>
          ,
          <addr-line>Bellaterra</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Ontology Engineering Group, Universidad Politécnica de Madrid</institution>
          ,
          <addr-line>Madrid</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>19</volume>
      <issue>2022</issue>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Financial applications of distributed ledger technologies (DLTs) generate regulatory concerns. In the crypto sphere, pseudonymity may safeguard privacy and data protection, but lack of identifiability cripples investigation and enforcement. This challenges the fight against money laundering and the ifnancing of terrorism and proliferation (AML/CFT/CPF). Nonetheless, forensic techniques trace transfers across blockchain ecosystems and provide intelligence to regulated entities. This working paper addresses anomaly detection in the crypto space, the role of machine learning, and the impact of disintermediation.</p>
      </abstract>
      <kwd-group>
        <kwd>AML/CFT/CPF</kwd>
        <kwd>blockchain</kwd>
        <kwd>cryptocurrency</kwd>
        <kwd>machine learning</kwd>
        <kwd>forensics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Ever since the launch of Bitcoin [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the opportunities ofered by distributed ledger technologies
(DLTs) have driven a fierce excitement for technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Leveraging distributed systems
and cryptography, Nakamoto’s work opened the way to recording and managing information
trustworthily without intermediaries. Although the ‘blockchain hype’ goes beyond the financial
domain, its first large-scale implementation and leading regulatory debates are financial in
nature. The perception of this space as inherently anonymous triggers substantial concerns,
and some of its fundamentals clash with accountability. From the early 2010s to the present day,
scandals and scams ignite fears of illicit exploitation (e.g., Silk Road, Tornado Cash [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]). A
prime example concerns the fight against money laundering and the financing of terrorism and
proliferation (AML/CFT/CPF). The field is overseen by the Financial Action Task Force (FATF),
whose risk indicators guide the understanding of crypto risks [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. The EU has harmonised its
rules since 1991, and a major reform is about to establish a regulation-based single rulebook.
Currently, the consolidated version of the AML Directive (AMLD) is Directive (EU) 2015/849 as
amended by Directive (EU) 2018/843. The regime relies on ‘regulated entities’, on which duties
CEUR
are imposed to prevent misuses of the financial systems and draw the attention of authorities
when suspicions arise. They comprise financial entities – e.g., banks, but also cryptoasset service
providers (CASPs) – but also non financial businesses and professions. 1
      </p>
      <p>
        In AML/CFT/CPF compliance, operations are typically screened in a partially automated way
by software solutions that for crypto transactions are based on blockchain analytics. Nowadays,
research displays how this sphere is less anonymous, disintermediated and decentralised than
what the hype would suggest [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. Meanwhile, crypto-related crime seemingly decreased from
USD 4.5 to 1.9 billion between 2019 and 2020 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. However, industry estimates keep reporting
unsettling numbers: in 2021 crypto-related laundering amounted to USD 8.6 billion and illicit
addresses were holding at least USD 10 billion [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The shortcomings of early-stage monitoring
systems led to explore the use of artificial intelligence to enhance anomaly detection.
      </p>
      <p>Against this backdrop, this paper provides an AML/CFT/CPF overview of blockchain forensics
and introduces the role of machine learning. In particular, Section II outlines blockchain specifics
and elaborates on the concepts of pseudonymity and de-anonymization. Section III dives into the
AML/CFT/CPF regime and gives an interdisciplinary account of anomaly detection. Section IV
addresses analytic techniques, thus introducing the role of machine learning solutions described
in Section V. Section VI presents open issues, and Section VII concludes the work.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Pseudonymity and AML/CFT/CPF</title>
      <p>
        The Bitcoin system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] showed there is no need of a centralized party to reliably keep records
of transactions. A distributed ledger is shared, replicated, and synchronised in a distributed and
decentralized way, which in principle means control is distributed among participants [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In
turn, a blockchain is a type of distributed ledger where data is recorded in a tamper-proof chain
of blocks linked cryptographically. Blockchain types vary depending on whether the ledger is
public (publicly readable) or private (readable only by authorised actors), and permissionless
(everyone can add transactions) or permissioned (only authorised parties can).
      </p>
      <p>
        Diferent ledger types manage identity diferently. In public permissionless systems with
no centralised authority, such as Bitcoin and Ethereum, the nodes that maintain the network
“operate without association to a particular given identity” [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and “are structurally designed
as devices allowing anonymous transactions between peers” [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. On the contrary, in
permissioned ones there is a centralised entity/consortium that identifies the nodes, and key-pairs
tend to be associated with real-world identities. In blockchains such as Bitcoin’s two elements
co-exist: ledger transparency and user pseudonymity – i.e., using pseudonyms as identifiers [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
Typically, a blockchain system manages identifiers through key pairs that identify the wallet
holder uniquely [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Hence, the history of Bitcoin transactions is transparent, but participants
are only related to addresses [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. These alone do not convey any personal identifying
information, unless there is an association with additional data [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] However, they can be used to
connect transactions to their history, and de-anonymization techniques can help establish links
to real-world identities, or identify entity types, for the sake of compliance or investigation.
1The Markets in Crypto-Assets Regulation defines CASPs as providers of various crypto-related services including
custody, administration, trading, exchange, advice. The definition includes FATF’s virtual asset service providers
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        A key component of the AML/CFT/CPF regime is customer due diligence (CDD), including
know your customer (KYC). These provisions pivot on the identification of some subjects –
primarily, customers and beneficial owners, 2 and the verification or authentication of these
identities. CDD also comprises assessing purpose and intended nature of the relationship and
ongoing monitoring. As per the AMLD, all operations must be consistent with the entity’s
knowledge of the customer, business and risk profile. Identification means establishing a
realworld identity and a blockchain address that acts as a pseudonym is not suficient to hold
users accountable. Hence, identifiability safeguards accountability. On the other hand, the
authenticity of said identity must be verified against a(n) (set of) identifiers [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>In AML/CFT/CPF compliance, identifiability plays a crucial role in all risk-based assessments
performed by the regulated entity – e.g., to decide whether to accept a client, perform an
operation, assess the risk of the client and/or the operation, if enhanced due diligence is
required. Hence, it is not surprising the primary concerns about crypto misuse were linked to
the lack of identifiability of the parties involved, due to the absence of real-world identities.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Anomaly Detection</title>
      <p>
        Since Bitcoin proved not to possess key anonymity properties [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], new cryptographic
techniques were deployed in new currencies, services, and networks – e.g., ‘privacy coins’ such
as Monero and Zcash,3 which typically pursue anonymity explicitly [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Authorities outline
these scenarios in red flag indicators that describe suspicious activities to guide compliance and
supervision. They are usually provided in a rule-based format as templates of sequences of
actions, and FATF’s indicators inform national and institutional guidance. A list was published
in 2020 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and complemented in 2021 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].4 In some countries, these templates are named
anomaly indicators [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In data science, anomaly detection consists of processing data to
pinpoint events significantly diferent from the dataset [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The concept can also be analyzed
from a regulatory perspective, and in compliance technology the two viewpoints merge.
      </p>
      <p>
        Indeed, risk indicators are the basis of transaction monitoring solutions, whose hits are
generated through a process of rule-matching. In other words, operations are screened in
real-time to detect anomalous activities in an automated way and the tools usually rely on
customizable rules – i.e., alerts are produced if a transaction meets predefined standards of
suspicion. Accordingly, transaction monitoring solutions were defined as “predominantly
rulesbased thresholding protocols tuned for volume and velocity of transactions with tiered
escalation procedures” [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. This means that the preliminary review of a flagged transfer
usually relies on suspiciousness heuristics such as political exposure, geographical dynamics,
transaction type and properties, behavioral logic [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], as enshrined by risk indicators. Examples
2Identification is based on data from a reliable and independent source, which includes means of electronic
identification such as the eIDAS framework.
3The privacy motive was to obtain fungibility. If the history of transfers can be traced, a given unit is tainted by
previous actions. If the transaction history is obfuscated, each unit is equal, just as physical coins and banknotes
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
4It outlines indicators pertaining to transaction types and features, transaction patterns, anonymity, features of
senders/recipients, specifics of source of funds/wealth, geographic risks. Anonymity-related indicators include
cases of obfuscation (e.g., privacy coins) and disintermediation (e.g., self-hosted wallets).
of types of rules are: (a) high risk or non-permitted jurisdiction -&gt; alert rule: transfers from/to
the jurisdiction, based on the IP address; (b) transfers above EUR 1,000 -&gt; alert rule: transfers
above the aggregated value within a time frame; (c) transfers unusual for a specific customer
-&gt; customized alert rule: transfers exceeding by 30% the average transaction pattern of the
customer. If the system finds a match with a rule, the transfer is flagged accordingly. In this
context, a considerable efort in terms of time and human resources is dedicated to reviewing
the alerts generated by the rule-matching process. To this end, regulated entities have internal
procedures according to which multiple layers of analysts decide whether to escalate the alert.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Blockchain Forensics and Network Analysis</title>
      <p>
        While new techniques of anonymization were developed, the private sector and law
enforcement agencies (LEAs) started tracing crypto transfers through blockchain forensics or analysis.5
Indeed, even if the set of publicly accessible data in (certain) blockchain systems ofers great
material to investigators, a specialized knowledge is needed for a useful interpretation. This is
because the details of the various networks usually translate into misleading pieces of
information to non-expert eyes [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Furthermore, there are often preliminary activities of acquisition or
extraction of private keys, public addresses and wallet files [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Forensic techniques determine
the likelihood of linking a real-world identity to a (set of) transaction(s), and the degree of
success depends on their efectiveness vis-à-vis privacy enhancements.
      </p>
      <p>The presence of these two sets of actors pushing towards higher peaks of obfuscation and more
eficient accountability generates mutual influences. Indeed, the implementation of innovative
cryptographic techniques led to new investigative strategies. This, in turn, spurred increasingly
sophisticated cryptographic methods in a race that seems never ending. Meanwhile, various
analytic strategies leveraged the fact that transactions consist of flow relationship between
entities and can be organized and visualized in the form of a network. These methods of analysis
focus, primarily, on reusing an account for multiple transactions or co-using multiple accounts
for a single transaction to match multiple accounts to the same user/service.</p>
      <p>
        One should consider that the Bitcoin blockchain, but also IOTA’s Tangle, employs a type of
address-based data representation based on unspent transaction outputs (UTXOs).6 This means
there are no accounts at the protocol level, and transaction representation is based on inputs,
amounts spent on a transaction, and outputs, amounts received. A wallet’s balance equals to
the outputs not yet spent. When making a transfer, the whole amount of coins of an UTXO
corresponding to an address must be spent. The ‘change’, if any, is transferred to an address
owned by the sender [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Thus, usually one of a transaction’s outputs is the ‘change’ address.
      </p>
      <p>
        Clustering algorithms enable statistical evaluations, especially to determine if a given address
belongs to a specific identified cluster, such as an exchange, to a (yet) unidentified cluster, or
to no cluster. They are often proprietary and owned by analytic companies. They allow to
5Blockchain forensics was defined as the use of science and technology in the investigation and establishment of
facts in court, dealing primarily with recovering and analyzing evidence generated by transacting on the blockchain
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
6Other blockchains use an account-based system. Forensic techniques have been mostly tested on UTXO-based
networks, but data-exploitation methods have been deployed on Ethereum [
        <xref ref-type="bibr" rid="ref25 ref26 ref4">4, 25, 26</xref>
        ] and other networks [
        <xref ref-type="bibr" rid="ref27 ref28 ref29">27, 28,
29</xref>
        ].
visualize the flow of funds between identified clusters instead of between individual addresses.
This leads to inferences about the type of entities involved and, when the algorithm is applied
to huge datasets, about the degree of receiving and sending relationships between clusters. This
is of great value in risk-sensitive assessments performed by regulated entities. In particular,
when it comes to evaluating a specific exposure vis-à-vis their risk appetite.
      </p>
      <p>
        A set of clustering methods are based on heuristics [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ], and aim to link more addresses
to an identity [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], under the assumption that users can be associated with addresses through
heuristics [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. Clustering can focus on similar behavioural patterns, co-spending or sources
other than the transaction history [
        <xref ref-type="bibr" rid="ref30 ref34">34, 30</xref>
        ], gathered through web-scraping and open source
intelligence tools to find correlation between transactions and public user profiles [
        <xref ref-type="bibr" rid="ref16 ref35">35, 16</xref>
        ].
Other methods focus on mixers [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ], and on cross-chain transactions [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ].
      </p>
      <p>
        The network generated by transaction flows can be visualized as a graph – i.e., a mathematical
model comprising a set of nodes and a set of edges connecting nodes’ couples. In blockchains,
nodes can be (groups of) accounts and edges transaction between accounts. This means that
specific methods can be applied to infer intelligence [
        <xref ref-type="bibr" rid="ref35 ref37">35, 37</xref>
        ] and the graph structure helps spot
illicit transactions by exploring the network characteristics. Given a transaction t, it is possible
to collect all connected transactions and recursively search for other ones up to a certain depth
level. Within the connected graph, neighbouring transactions and their classified value aid the
classification of t – i.e., each transaction has neighbours that influence its classification.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Machine Learning Applications</title>
      <p>
        Indicators aim to provide a structure and clear benchmarks regarding AML/CFT/CPF risks. Often,
however, rule-based indicators can be for the most part descriptive and distant from industry
best practices. Although interpretability is an advantage, the simplicity of rule-based systems
produces false positives estimated at around 95–98are massive, dynamic, high dimensional,
non-linear, as well as often fragmented, inaccurate, incomplete, or inconsistent. The dificulty
to automate synthesis from various data streams leaves the task up to human analysts. This
generates a vicious circle of over-reporting due to the cost asymmetry between false positives
and false negatives [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The insuficiency of rule-based systems suggested to automate several
processes. Some machine learning-based methodologies are deployed and investigated not
only to detect anomalies and optimize alerts, but also to draw intelligence from transaction
and cluster classification. The underlying idea is that building models able to infer patterns
from historical data increases detection rates and decreases false positives [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ], while some
approaches pursue to map and predict illicit transactions [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]. A main distinction in machine
learning is between supervised methods, where labelled datasets are used to train algorithms,
and unsupervised techniques, where the model works on its own to discover patterns and
information previously undetected. Supervised learning needs an initial training dataset tagged
and annotated.7 These techniques are generally regarded as good for making predictions and
they are used for transaction classification.
      </p>
      <p>Meanwhile, unsupervised methods are usually deployed if there is label scarcity. In the
crypto sphere, there is a considerable shortage of annotated datasets, due to the scale of the
7Some examples are Decision Trees, Random Forests, Boosting Algorithms, and Logistic Regression.
phenomena, the timing of investigations, and the cost of manual labelling. Therefore, analytic
companies assume a crucial role in labelling datasets, where a transaction can be tagged as
licit or illicit based on investigations, public information, or proprietary data. The resulting
annotated dataset can be used to train algorithms. To mitigate the issue of label scarcity and the
drawbacks of unsupervised methods, one can pursue alternative paths such as generating fully
or partially synthetic datasets or improving algorithm performance by organizing the training
data diferently. Datasets of blockchain transactions can be organized in the form of a graph.</p>
      <p>
        Graph analytics fits well the AML/CFT/CPF sphere because transactions involve relationships
between entities that can be represented in graph structures. For instance, graph convolutional
networks aim to learn a function of features on a dataset structured as a graph. The key idea is
that each node receives and aggregates features from its neighbors to represent and compute its
local state [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ]. Further, graph attention networks give diferent importance to each node’s edge
by using attention coeficients [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ]. Both models seem promising in predicting illicit transactions
and the type of entity to which an unidentified one belongs. They combine transaction features
with ‘close’ graph data. However, some labelling is required, and it is still challenging to state if
there are specific graph patterns that suggest suspicious activities.
      </p>
      <p>
        The researchers in [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] collaborated with Chainalysis to deploy a supervised approach to
predict the type of entities yet not identified, concluding it is possible to predict if a cluster belongs
to predefined categories such as exchange, gambling, shufling. Further, [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] benchmarked
graph convolutional networks against supervised methods, while [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] extended the work to a
non-blockchain context with the aim to reduce false alerts through supervised methods, where
the produced score enables alert suppression or prioritization. The GuiltyWalker [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ] leverages
random walks on a cryptocurrency graph to characterize distances to previous suspicious
activity. With transaction graphs modelling illicit activity over time, however, it is dificult
to apply methods that are eficient and whose results can be understood by humans. Indeed,
literature is still lacking research into explainable AI techniques for anomaly detection [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
      <p>
        Analytics is largely deployed in intermediated contexts. This is not surprising, since AML/
CFT/CPF explicitly does not apply to person-to-person transfers, and about 80% of crypto
transfers go through centralized exchanges [
        <xref ref-type="bibr" rid="ref44 ref45">44, 45</xref>
        ]. Nonetheless, transfers enabled by unhosted
wallets and decentralised finance (DeFi) are increasingly popular and require specific techniques
to meet specific monitoring needs. A clear example of the tension between forensics and
disintermediation can be found in the debate on the ‘crypto travel rule’, which mandates
regulated entities to guarantee the traceability of crypto transfers. The rule expands the scope
of application of measures concerning wire transfers, as required by the FATF. In the EU, it was
implemented by recasting Regulation (EU) 2015/847, and CASPs/financial institutions have to
collect, hold, submit and share specific data on originators and beneficiaries of crypto transfers.
However, wallets hosted by providers (typically regulated entities) are not the only way to store
and transfer cryptoassets. Using self-hosted/unhosted wallets, users can have full control over
their funds and transfer/receive them to/from another unhosted wallet or, if regulation allows
it, to/from a hosted one. The EU recast regulates unhosted wallets only when they interact with
hosted ones. Notably, transfers of EUR 1,000 or more are allowed only if the unhosted wallet
is controlled by the customer. This poses the challenge of obtaining proof of control from the
customer and verifying it. Meanwhile, the industry denounced the absence of standards and
technical solutions to efectively and afordably comply [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ].
      </p>
      <p>
        From a related perspective, unhosted-to-unhosted wallet transfers may be used to elude
traceability and cash limits. This challenges the eficacy of the approach and shows how
regulation has yet to capture P2P transfers. Meanwhile, the evolution of DeFi has displaced
illicit activities. The total value of these projects reportedly amounted to USD 1 billion in January
2020, USD 27 billion in January 2021, USD 60 billion April 2021, and USD 40 billion in November
2022. Accordingly, the use of DeFi platforms for laundering increased by 1.964between 2020
and 2021. They received 17% of funds originating from illicit addresses in 2021 (vs 2% in 2020),
and in 2021 funds derived from crypto thefts were increasingly sent to DeFi platforms (51%) or
risky services (25%), while only 15% went to centralized exchanges [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>7. Final Remarks</title>
      <p>This paper addressed the role of machine learning to gather AML/CFT/CPF insights, and
argued that the use of these methods can improve the eficiency of forensics. Considering the
evolution of the crypto space, regulated entities and LEAs will increasingly analyze a large
number of transactions whose transparency is obfuscated. While the use of unhosted wallets
and decentralized platforms mean the lack of regulated counterparties, the industry denounces
dificulties in complying with rules to ensure traceability. Complex solutions of compliance
technology, however, are not enough, and they must be considered in an interdisciplinary
fashion: it is pivotal to heed the relationship between any implemented approach and the regulatory
environment. For instance, the efectiveness of an algorithm largely depends on the extent to
which it generates useful alerts. Although the quantity of transaction data suggest machine
learning will continue to be key, synergies between public and private stakeholders are needed
to put forward innovative compliance tools and safeguard interpretability and explainability.
The fact that labelled transaction datasets are currently proprietary in large part cannot help
but impact also supervisory activities. Hence, it is crucial to establish multistakeholder dialogue
to position blockchain analytic experimentation within initiatives that consider AML/CFT/CPF
from a socio-technical, operational, and regulatory viewpoint.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nakamoto</surname>
          </string-name>
          ,
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System, www</article-title>
          .bitcoin.org (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ally</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dwivedi</surname>
          </string-name>
          , et al.,
          <article-title>The state of play of blockchain technology in the financial services sector: A systematic literature review</article-title>
          ,
          <source>International Journal of Information Management</source>
          <volume>54</volume>
          (
          <year>2020</year>
          )
          <fpage>102199</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Akhgar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gercke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vrochidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gibson</surname>
          </string-name>
          , Dark Web Investigation,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>McTighe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Seres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bax</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Puebla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mendez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Carrone</surname>
          </string-name>
          , T. De Mattey,
          <string-name>
            <given-names>H. O.</given-names>
            <surname>Demaestri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nicolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fontana</surname>
          </string-name>
          ,
          <article-title>Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash (</article-title>
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>FATF</surname>
          </string-name>
          ,
          <source>Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing</source>
          ,
          <year>2020</year>
          . URL: http://www.fatf-gafi.org/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] FATF, Virtual Assets and Virtual Asset Service Providers - Updated Guidance for a RiskBased Approach (</article-title>
          <year>2021</year>
          ).
          <article-title>URL: www.fatf-gafi</article-title>
          .org.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>FATF</surname>
          </string-name>
          ,
          <source>International Standards on Combating Money Laundering and the Financing of Terrorism &amp; Proliferation: FATF Recommendations</source>
          ,
          <year>2012</year>
          . URL: https://www.fatf-gafi.org/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Schrepel</surname>
          </string-name>
          ,
          <article-title>Smart Contracts and the Digital Single Market Through the Lens of a 'Law +</article-title>
          <source>Technology' Approach</source>
          ,
          <year>2021</year>
          . URL: https://papers.ssrn.com/abstract=3947174.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Campajola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cristodaro</surname>
          </string-name>
          ,
          <string-name>
            <surname>F. M. De Collibus</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Vallarano</surname>
            ,
            <given-names>C. J.</given-names>
          </string-name>
          <string-name>
            <surname>Tessone</surname>
          </string-name>
          ,
          <source>The Evolution Of Centralisation on Cryptocurrency Platforms</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>CipherTrace</surname>
          </string-name>
          , Cryptocurrency Crime and
          <string-name>
            <surname>Anti-Money Laundering</surname>
            <given-names>Report</given-names>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Chainalysis</surname>
            <given-names>Team</given-names>
          </string-name>
          ,
          <source>The 2022 Crypto Crime Report</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>ITU-T Focus</surname>
          </string-name>
          Group on DLT,
          <source>Technical Report FG DLT D1</source>
          .
          <article-title>2 - Distributed ledger technology overview, concepts</article-title>
          ,
          <source>ecosystem</source>
          ,
          <year>2019</year>
          . URL: https://www.itu.int/.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wang</surname>
          </string-name>
          , P. De Filippi,
          <article-title>Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion, Frontiers in Blockchain 2 (</article-title>
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Quiniou</surname>
          </string-name>
          ,
          <article-title>Blockchain: the advent of disintermediation</article-title>
          ,
          <source>ISTE Ltd</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pfitzmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <article-title>A terminology for talking about privacy by data minimization: Anonymity, Unlinkability</article-title>
          , Undetectability, Unobservability, Pseudonymity, and Identity Management, Technical University Dresden (
          <year>2010</year>
          )
          <fpage>1</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>N.</given-names>
            <surname>Amarasinghe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Boyen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>McKague, A Survey of Anonymity of Cryptocurrencies</article-title>
          , in: ACM International Conference Proceeding Series, Sydney,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Grijpink</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Prins</surname>
          </string-name>
          ,
          <article-title>Digital anonymity on the Internet: New rules for anonymous electronic transactions? An exploration of the private law implications of digital anonymity</article-title>
          ,
          <source>Computer Law and Security Report</source>
          <volume>17</volume>
          (
          <year>2001</year>
          )
          <fpage>379</fpage>
          -
          <lpage>389</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Harvey</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Branco-Illodo, Why Cryptocurrencies Want Privacy: A Review of Political Motivations and Branding Expressed in “Privacy Coin” Whitepapers</article-title>
          ,
          <source>Journal of Political Marketing</source>
          <volume>19</volume>
          (
          <year>2020</year>
          )
          <fpage>107</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <article-title>Bank of Italy, Provvedimento recante gli indicatori di anomalia per gli intermediari</article-title>
          ,
          <year>2010</year>
          . URL: https://uif.bancaditalia.it/.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kamišalić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kramberger</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Fister</surname>
          </string-name>
          ,
          <article-title>Synergy of blockchain technology and data mining techniques for anomaly detection</article-title>
          ,
          <source>Applied Sciences (Switzerland) 11</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Suzumura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pareja</surname>
          </string-name>
          , T. Ma, H. Kanezashi,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Leiserson</surname>
          </string-name>
          , T. B.
          <string-name>
            <surname>Schardl</surname>
          </string-name>
          ,
          <article-title>Scalable Graph Learning for Anti-Money Laundering: A First Look (</article-title>
          <year>2018</year>
          ). arXiv:
          <year>1812</year>
          .00076.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>T.</given-names>
            <surname>Phan</surname>
          </string-name>
          , Exploring Blockchain Forensics,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>D.</given-names>
            <surname>Silva Ramalho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Igreja</given-names>
            <surname>Matos</surname>
          </string-name>
          ,
          <article-title>What we do in the (digital) shadows: anti-money laundering regulation and a bitcoin-mixing criminal problem</article-title>
          ,
          <source>ERA Forum 22</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>N.</given-names>
            <surname>Furneaux</surname>
          </string-name>
          , Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence, Wiley,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bartoletti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Carta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Cimoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Saia</surname>
          </string-name>
          ,
          <article-title>Dissecting Ponzi schemes on Ethereum: Identiifcation, analysis, and impact</article-title>
          ,
          <source>Future Generation Computer Systems</source>
          <volume>102</volume>
          (
          <year>2020</year>
          )
          <fpage>259</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ferretti</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>D'Angelo, On the ethereum blockchain structure: A complex networks theory perspective</article-title>
          ,
          <source>Concurrency and Computation: Practice and Experience</source>
          <volume>32</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tennant</surname>
          </string-name>
          ,
          <article-title>Improving the Anonymity of the IOTA Cryptocurrency (</article-title>
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . URL: https://laurencetennant.com/papers/anonymity-iota.
          <source>pdf.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ince</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. Zhang,</surname>
          </string-name>
          <article-title>Adding confidential transactions to cryptocurrency IOTA with bulletproofs</article-title>
          , volume
          <volume>11058</volume>
          LNCS, Springer International Publishing,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Moreno-Sanchez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zafar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kate</surname>
          </string-name>
          ,
          <article-title>Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network</article-title>
          ,
          <source>Proceedings on PETs</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lischke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Fabian</surname>
          </string-name>
          ,
          <article-title>Analyzing the bitcoin network: The First Four Years, Future Internet 8 (</article-title>
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .3390/fi8010007.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>E.</given-names>
            <surname>Androulaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. O.</given-names>
            <surname>Karame</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Roeschlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Scherer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Capkun</surname>
          </string-name>
          ,
          <source>Evaluating user privacy in Bitcoin, Lecture Notes in Computer Science</source>
          <volume>7859</volume>
          (
          <year>2013</year>
          )
          <fpage>34</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>H.</given-names>
            <surname>Al Jawaheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Al</given-names>
            <surname>Sabah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Boshmaf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Erbad</surname>
          </string-name>
          ,
          <article-title>Deanonymizing Tor hidden service users through Bitcoin transactions analysis</article-title>
          ,
          <source>Computers and Security</source>
          <volume>89</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Meiklejohn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pomarole</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Jordan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Levchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>McCoy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Voelker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Savage</surname>
          </string-name>
          ,
          <article-title>A fistful of Bitcoins: Characterizing payments among men with no names</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>59</volume>
          (
          <year>2016</year>
          )
          <fpage>86</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>H. H. S.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Langenheldt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Harlev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Mukkamala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vatrapu</surname>
          </string-name>
          , Regulating Cryptocurrencies:
          <article-title>A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain</article-title>
          ,
          <source>Journal of Management Information Systems</source>
          <volume>36</volume>
          (
          <year>2019</year>
          )
          <fpage>37</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fleder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Kester</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pillai</surname>
          </string-name>
          ,
          <string-name>
            <surname>Bitcoin Transaction Graph Analysis</surname>
          </string-name>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . arXiv:
          <volume>1502</volume>
          .
          <fpage>01657</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>J. Wu</surname>
            , J. Liu,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , Detecting Mixing Services via
          <article-title>Mining Bitcoin Transaction Network with Hybrid Motifs</article-title>
          ,
          <source>Journal of Latex Class Files</source>
          <volume>14</volume>
          (
          <year>2020</year>
          ). arXiv:
          <year>2001</year>
          .05233.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>M.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Domeniconi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K. I.</given-names>
            <surname>Weidele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bellei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Robinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Leiserson</surname>
          </string-name>
          ,
          <article-title>Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics (</article-title>
          <year>2019</year>
          ). arXiv:
          <year>1908</year>
          .02591.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Eddin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bono</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Aparício</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Polido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Ascensão</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bizarro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <article-title>Antimoney laundering alert optimization using machine learning with graphs</article-title>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          . 48550/ARXIV.2112.07508.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          ,
          <article-title>Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity</article-title>
          ,
          <source>Ph.D. thesis</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Kipf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Welling</surname>
          </string-name>
          ,
          <article-title>Semi-supervised classification with graph convolutional networks</article-title>
          ,
          <source>arXiv:1609.02907</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>P.</given-names>
            <surname>Veličković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Cucurull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Casanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bengio</surname>
          </string-name>
          ,
          <article-title>Graph attention networks</article-title>
          ,
          <source>arXiv:1710.10903</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>C.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Torres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Aparício</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Ascensão</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bizarro</surname>
          </string-name>
          , Guiltywalker:
          <article-title>Distance to illicit nodes in the bitcoin network</article-title>
          ,
          <source>arXiv:2102.05373</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Kute</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pradhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alamri</surname>
          </string-name>
          ,
          <article-title>Deep learning and explainable artificial intelligence techniques applied for detecting money laundering-a critical review</article-title>
          ,
          <source>IEEE Access</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44] BCB Group,
          <article-title>Centralized vs</article-title>
          .
          <source>Decentralized Exchanges</source>
          ,
          <year>2022</year>
          . URL: https://www.bcbgroup. com/centralized-vs
          <string-name>
            <surname>-</surname>
          </string-name>
          decentralized-exchanges/.
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <surname>The</surname>
            <given-names>Block</given-names>
          </string-name>
          , DEX to CEX Spot Trade Volume,
          <year>2022</year>
          . URL: https://www.theblock.co
          <article-title>/data/ decentralized-finance/dex-non-custodial/dex-to-cex-spot-trade-volume.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>C. R.</given-names>
            <surname>Goforth</surname>
          </string-name>
          , Crypto Assets :
          <string-name>
            <given-names>A Fintech</given-names>
            <surname>Forecast</surname>
          </string-name>
          (
          <year>2020</year>
          )
          <fpage>5</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>