• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Bitcoin Address Multi-Classification Mechanism Based on Bipartite Graph-Based Maximization Consensus

    2024-01-20 13:02:12LejunZhangJunjieZhangKentarohToyodaYuanLiuJingQiuZhihongTianandRanGuo

    Lejun Zhang ,Junjie Zhang ,Kentaroh Toyoda ,Yuan Liu ,Jing Qiu ,Zhihong Tian and Ran Guo

    1College of Information Engineering,Yangzhou University,Yangzhou,225127,China

    2Cyberspace Institute Advanced Technology,Guangzhou University,Guangzhou,510006,China

    3Research and Development Center for E-Learning,Ministry of Education,Beijing,100039,China

    4Institute of High Performance Computing(IHPC),Agency for Science,Technology and Research(A*STAR),Singapore,138632,Singapore

    5School of Physics and Materials Science,Guangzhou University,Guangzhou,510006,China

    ABSTRACT Bitcoin is widely used as the most classic electronic currency for various electronic services such as exchanges,gambling,marketplaces,and also scams such as high-yield investment projects.Identifying the services operated by a Bitcoin address can help determine the risk level of that address and build an alert model accordingly.Feature engineering can also be used to flesh out labeled addresses and to analyze the current state of Bitcoin in a small way.In this paper,we address the problem of identifying multiple classes of Bitcoin services,and for the poor classification of individual addresses that do not have significant features,we propose a Bitcoin address identification scheme based on joint multi-model prediction using the mapping relationship between addresses and entities.The innovation of the method is to(1)Extract as many valuable features as possible when an address is given to facilitate the multi-class service identification task.(2)Unlike the general supervised model approach,this paper proposes a joint prediction scheme for multiple learners based on address-entity mapping relationships.Specifically,after obtaining the overall features,the address classification and entity clustering tasks are performed separately,and the results are subjected to graph-based maximization consensus.The final result is made to baseline the individual address classification results while satisfying the constraint of having similarly behaving entities as far as possible.By testing and evaluating over 26,000 Bitcoin addresses,our feature extraction method captures more useful features.In addition,the combined multi-learner model obtained results that exceeded the baseline classifier reaching an accuracy of 77.4%.

    KEYWORDS Bitcoin;multi-service classification;graph maximization consensus;data security

    1 Introduction

    In recent years,Bitcoin[1]has gained popularity worldwide as the most valuable cryptographic digital currency currently on the market.Fig.1 shows the price change of Bitcoin from its launch to the present day.As Fig.1 shows,the price of Bitcoin has not changed significantly for a long time since its launch,however,with the widespread use of blockchain and the emergence of various e-services,electronic currencies are gradually gaining respect and the price of Bitcoin has peaked in the past few years.

    Figure 1:USD/BTC exchange rates(Source:Blockchain.info)

    Tasca et al.[2] have analyzed the evolution of the Bitcoin economy and summarized three distinguishable economic regimes as the Bitcoin economy has developed and matured.Bitcoin’s early phase was dominated by mining and proof-of-concept without much substantial economic activity.Followed by a period of criminal growth,when early participants were attracted to the unique properties of cryptocurrencies,hence the proliferation of“criminal”enterprises(HYIP,dark markets,etc.)under this phase.The third stage is led by legitimate exchanges,which are businesses that convert digital currencies into fiat currency to cover costs and avoid price fluctuations.They found that different commercial categories populate the various stages of Bitcoin’s development and that each commercial category has its different transaction flow patterns.

    Bitcoin has so many commercial categories because it has properties that traditional currencies do not have.Bitcoin has a decentralized nature,it is not controlled by governments or financial institutions,and it can even be traded directly across borders.Besides,openness,transparency,immutability and anonymity are its key characteristics.Everyone can see all the transactions that have taken place,which makes Bitcoin transactions open and transparent.Blockchain utilizes cryptography and consensus mechanisms so that all blocks retain the hash of their previous block,and if one block is changed,then all subsequent blocks must be changed,so that transaction information cannot be tampered with.The addresses involved in Bitcoin transactions are obtained as pseudonyms through layers of cryptographic calculations with the user’s public key and do not contain any identifiers to verify their identity,so the user has a certain degree of anonymity.While all these features are guaranteed to improve blockchain security,the fact is that transactions on the blockchain are not secure.Zhang et al.[3]investigated that only a small percentage of blockchain platforms can achieve a set of security goals in practice.Xu et al.[4]argued that blockchain can prevent only a portion of fraudulent and malicious activities and remains vulnerable to attacks.They suggested appropriate defensive measures and called for further research to combat malicious activities associated with blockchain.

    Recently,the website blockchain.info[5]classified the existing mainstream Bitcoin cryptocurrency services in terms of risk levels with respect to their risk factors,as shown in Fig.2.Due to the lack of regulation and investigation by law enforcement,many services come with a certain amount of risk.For example,with high-risk exchanges and coin-mixing companies,sometimes we have no way of knowing whether they are providing a legitimate service or engaging in illegal fundraising,while lost virtual currency property is difficult to retrieve without credentials.In traditional anti-fraud or anti-money laundering efforts,the government monitors the behavior of suspicious people through financial services institutions that must verify the identity of customers before providing financial services,at which point the government can accurately track down suspicious people based on perfect knowledge of the user’s identity.In contrast,Bitcoin’s users are difficult to identify,with no real identity information embedded in any participant’s address,and worse,new addresses can be generated at will,which increases user anonymity and allows illegal activities and financial crimes to flourish,making it difficult to guarantee the security of legal user transactions.To secure user transactions,M?ser et al.[6]have attempted to create a blacklisting policy for dangerous addresses in Bitcoin to enable transaction recipients to identify low-reputation addresses to avoid risk as much as possible,but the technique relies too heavily on transparent and authoritative tagging data,which may be accompanied by implications such as disinformation,information explosion and difficulty in recovering reputation,and it is difficult to implement in the anonymous Bitcoin network of flood propagation.Therefore,it is advisable to use the behavioural features of the target address to complete the identification of its possible identity prior to the transaction in order to avoid transaction risks and help the blockchain ecosystem grow in a healthy way.

    Figure 2:The types and risk levels of cryptocurrency services(Source:Blockchain.info)

    The rest of the paper is structured as follows.Section 2 will briefly introduce the work related to address clustering and address classification in Bitcoin,as well as the innovation points of this paper.Section 3 will introduce the general steps and specifics of the model.Section 4 will describe the experimental process of this paper,organize and evaluate the experimental results,and Section 5 will conclude the whole paper.

    2 Related Work

    This section first introduces the fundamentals of trading,then leads to related work on address clustering and address classification,pointing out the problems with existing research as well as stating the motivation and innovation of this paper’s proposal.

    2.1 Trading Fundamentals

    Bitcoin is a decentralised cryptocurrency that works in a P2P (peer-to-peer) network [1].Fig.3 shows two examples of Bitcoin transactions.As shown in Fig.3,Bitcoins are transferred between Bitcoin addresses via a message format called a transaction.For the second Bitcoin transaction shown in this figure,the sender and receiver of Bitcoins are identified as the input and output,respectively.The private and public keys are generated by a pair of elliptic curve encryption algorithms,but it is not possible to work backwards through the public key to get the private key.The purpose of the public key is to encrypt a message using one’s own private key when dealing with the other side,who then decrypts it using their own public key to obtain the original message,this process is commonly known as a signature.As the public key is too long to use in a transaction,an algorithmic encryption of the public key hash is performed to generate the address.When a user creates a transaction to send a certain number of Bitcoins to a specific Bitcoin address,a message signature that can be calculated from their paired private keys is required.In Bitcoin,the private key signature is used to verify that the identity of the person sending the message is the person transferring the money in the transaction,and the message is confirmed if the message is decrypted.

    The transaction is sent to the P2P network and checked for validity,e.g.,whether the input to the transaction has not been previously spent and the additional signature is verified by the participating nodes.When a transaction is determined to be valid,it will be agreed by every participant in Bitcoin via flood propagation and stored permanently in the Bitcoin blockchain.In Bitcoin,a set of approved transactions is stored in a block in the form of a Merkle tree,and newly created blocks are periodically distributed among all nodes of the P2P network.However,due to its decentralised nature,Bitcoin lacks a trusted body to manage blocks.If a block is abandoned,the bitcoins already spent may be reused,resulting in what is known as“double spend”.In fact,Bitcoin avoids double spending by rewarding bitcoins to rational nodes as an incentive.In Bitcoin,blocks are created by solving an intractable but easily checked computational puzzle.More specifically,nodes commonly referred to as miners need to lower a specified target value in the result of a(SHA-256)hash as well as the set of references to the previous block and unapproved transactions.The first miner to identify such a random number can acquire newly minted Bitcoins through a so-called coinbase transaction,shown in the first transaction in Fig.4,and all transaction fees are included in the block.This leads to a growing chain of blocks so called the blockchain,as the previous block is needed to create the next block.It is worth noting that valid transactions agreed by the nodes as part of the block creation process are also stored permanently in the block and are not modified in any way.

    Due to its credible advantages,blockchain has a wide range of applications in many areas,especially in data storage.For example,Tian et al.[7]proposed a secure digital evidence framework based on block-chain(Block-DEF)with a loosely coupled structure that allows evidence and evidentiary information to be maintained separately,alleviating the tension between evidence traceability and privacy.Wang et al.[8] addressed the serious centralization problem in DNS architecture and management by improving the consensus algorithm in blockchain to implement a blockchain-based DNS storage and retrieval system with fast consensus and low traffic.Su et al.[9] implemented a decentralized name resolution system for IoT based on blockchain architecture to ensure that IoT names cannot be maliciously tampered with.

    Figure 3:Details of an example transaction

    Figure 4:An example of address clustering

    2.2 Bitcoin Address Clustering

    In the Bitcoin system,any entity can manage more than one Bitcoin address.The deanonymization of addresses is a key issue in analyzing addresses and a focus on the detection of illegal activities such as anti-money laundering.This technology not only helps with the task of illegal entity detection,but also with the tracking of accomplice addresses of certain illegal addresses.Several deanonymization techniques,often called address clustering algorithms,have emerged.Androulaki et al.[10] showed that despite not knowing the true identity of the owner: there are two heuristics to associate a Bitcoin address with its owner,theMulti-inputtransactionsheuristicand the“shadow”addressesheuristic,respectively.The first heuristic states that all transaction addresses in a transaction belong to the same user entity.The second heuristic is that only when the output address is two if one of the addresses appears in the blockchain for the first time,it is a change address automatically generated by the system for the user and therefore belongs to the same entity as all the input addresses.Fig.4 shows an example of address clustering,where transactionBand transactionCcorrespond to the “shadow”addressesheuristicand theMulti-inputtransactionsheuristic,respectively.

    Initially,these two address clustering methods were able to cope with most bitcoin address analysis efforts,but the consequent creation of coin mixer has somewhat impacted this approach[11].The main idea of the mixed coin service is that multiple users transfer coins to the same transaction at the same time,rendering the multi-input heuristic rule ineffective.Some research on anti-mixed coins has also been carried out,Wu et al.[12]analyzed mixed coin transactions in Bitcoin,and they found that there are two main types of mixed coin transactions,exchange,and obfuscation,and designed heuristic rules to detect mixed coin transactions.In summary,the main limitation in identifying the controlling entity behind Bitcoin addresses is that they do not involve any identifying information linking them to the owner,and even if multiple addresses were known to be controlled by one person or one entity,it would still be unable to determine their true identity.Nevertheless,address clustering techniques can often bring a different analysis from a more macro perspective,e.g.,Meiklejohn et al.[13]studied the usage of Bitcoin transactions through address clustering-based transaction graph analysis,and they showed that different clustered entities correspond to various services such as mining pools,wallets,exchanges,gambling,and money laundering,among others.For the identification work of multiple services of Bitcoin addresses,obtaining some feature information of the entity where the address is located helps to enrich the features of the address and thus improve the classification.As the“shadow”addressesheuristicis more likely to compose too large clusters and suffer cluster crashes.In this paper we only use theMulti-inputtransactionsheuristicfor address clustering to obtain the entity where the address is located and other addresses of that entity.

    2.3 Address Service Classification

    Learning behavioural features on Bitcoin addresses to train machine learning models and identify the security factor of the target address before the transaction is completed is a reliable solution to avoid risk and secure transactions.Several studies have been conducted on the service category identification problem,which can be broadly divided into two directions,classification of addresses and classification of entities (using heuristic clustering),respectively.They usually start with feature extraction of the dataset addresses or entities,and subsequently,put the features and labeled data into the classifier for model training and result validation.For example,Akcora et al.[14]proposed a novel and effective prediction framework for ransom transactions that can automatically predict emerging ransom transactions in a limited amount of relevant historical transaction data.Jourdan et al.[15]defined some new features related to the characteristics of entities on the Bitcoin blockchain and studied their efficacy in practice.Toyoda et al.[16]summarized the historical transactions of addresses and computed the features to train the model from both address and entity perspectives,concluding that the classification results were better with entities as samples,possibly due to the greater randomness of selecting individual addresses,which made the classification results lower.Unlike Toyoda’s extracting features separately for addresses and entities,Zola et al.[17]used cascaded machine learning to characterize entities,and they used the classification results of addresses within entities to vote and enriched the features of entities with the voting results as new features so that the classification results of entities followed the results of most of the addresses within them to achieve good classification results.Kanemura et al.[18] proposed a voting-based approach to identify addresses in darknet marketplaces,where all addresses within an entity are classified as darknet addresses if the addresses above a given threshold are detected to be consistent with darknet transactions,and experimental results show that the voting-based approach outperforms the non-voting-based approach in all aspects.

    There is indeed cross information between the address and the entity in which it is located.The methods based on the idea of voting that have been studied do improve the results of classifying entities,however,classifying all addresses within an entity is too computationally intensive.Also,transactions are often sent to individual addresses rather than entities,and the analysis of individual addresses is the main basis for prompting transactions to be completed.So we endeavoured to solve the following question:Can the entity information of this address be used to correct the classification results of a single address in order to improve the classification accuracy of a single address? A voting strategy may not solve this problem because entities may participate in multiple services and it cannot simply be determined that all addresses within an entity participate in the same service,and the voting policy consumes a lot of computing resources.To solve the above problems,we were inspired by the article by Gao et al.[19]which combines heterogeneous source information to correct the original classification results.This paper proposes a consensus method for maximizing the consensus of address and entity classification results.Firstly,we ensure high prediction accuracy by extracting a large number of address features,secondly,we cluster highly similar entities using a small number of features of the entity where the address is located so that entities exhibiting similarity appears in the same clusters,and finally,we perform consensus on the classification results and clustering results at the output level to counteract the randomness of individual address features and optimize the classification results of individual addresses to improve the accuracy.

    2.4 Motivation and Contribution

    Yang et al.[20] used a Gaussian distribution unsupervised clustering method to cluster Bitcoin entities into six clusters,representing six groups of users exhibiting different features.It is not rigorous to use unsupervised clustering alone to obtain class labels for addresses within clusters,but we can gain some insight that entities within the same cluster do have similar features.The similarity of entities in the same service is more obvious,and if using it as a constraint on the classification results of individual addresses,individual addresses that do not match the service performance can be corrected,thus improving the accuracy of the overall prediction.Note that we should still focus on the classification results of individual addresses,and the entity label correction only serves as a constraint.To implement the above ideas,the open and transparent nature of Bitcoin and the existing mature machine learning methods can be of good help,however,two efforts remain to improve the accuracy of the predictions as much as possible.(1)How to accurately describe the behavior patterns of addresses through the transaction history of individual addresses?In this paper,based on previous research,the historical transactions of Bitcoin addresses and the complex structure of the inter-address transaction graph are described,and both explicit and implicit features are summarized,fully exploit the features of addresses that contain specific semantics.(2)How to choose a machine learning model?In this paper,we use the current best ensemble learning models Random Forest and Gradient Boosting as the comparison models and use their outputs as the input for the consensus model.In contrast,unsupervised clustering uses spectral clustering,as it is suitable for dealing with sparse data with low dimensionality and a small number.The contribution of this paper can be summarized as follows:

    1.In this paper,we summarize previous research and conduct comprehensive mining of features based on a single address.110 features are extracted in this paper,including explicit features based on address transaction history and implicit features describing connections between addresses.

    2.In this paper,we propose a consensus scheme for correcting address supervised classification results with entity unsupervised clustering results,which,to our knowledge,is the first scheme to combine multivariate model joint prediction with the Bitcoin multi-class service detection problem.

    3.In this paper,the features mined are comprehensively analysed and the proposed method is compared and analysed with advanced machine learning methods to demonstrate the effectiveness of the solution.

    3 Proposed Method

    The address service identification approach proposed in this paper can be summarized in four steps: 1) retrieving and preprocessing historical transactions of addresses,2) feature extraction,3)training baseline models,and 4)consensus of results at the output level.

    3.1 Transaction Retrieval and Pre-Processing

    In this paper,we use the labeled address dataset[21]published in the article[16].There are a total of 26,309 addresses and labels,of which the labels are divided into seven categories,namely Exchange,Faucet,Gambling,HYIP,Market,Mixer,and Mining Pool.The descriptions for the services are shown in Table 1.We first retrieve the full history of transactions for the address and pre-process the transaction information using sampling and exchange rate conversion.Sampling was used to retrieve historical transactions because we found that some addresses had even more than 400,000 transactions,which would be wasteful for analysing the behaviour of that address and would significantly increase the time for feature extraction,which is not conducive to training a timely and usable model,so we randomly sampled no more than 500 transactions for each address.The conversion of the exchange rate is mainly due to the high volatility of the BTC price,as shown in Fig.1,the extracted features related to the value will be unstable,thus having a negative impact on the classifier,so we use the API provided by coindesk[22]to import the exchange rate of USD and Bitcoin to ensure the stability of the value features.

    Table 1: A list of the main services operated with Bitcoin

    3.2 Feature Extraction

    This paper mines address features from two perspectives,which can be broadly divided into explicit features that summarize historical transactions and implicit features that describe relationships between addresses.Among them,the explicit feature extraction method retrieves all historical transactions of an address to get single features such as balance,lifetime,the total number of transactions,etc.In addition,we also summarize the historical transactions of an address,bring together data such as the amount of each transaction into a list,and obtain its statistical features such as maximum and minimum values,mean value,variance,standard deviation,etc.In this paper,92 explicit features are extracted.

    The implicit feature is then extracted based on [23],as shown in Fig.5,where we make the following definition.The black circle represents the addressAto be analyzed.Taking a set of transactions as an example,whenAis used as the output of a transaction,all input addresses of that transaction are called ancestor addresses of that address,i.e.,the address connected by the blue line in the figure.And so on,the addresses connected by yellow,green,and red are output sibling address,input sibling address,and successor address,respectively.The figure describes only two transactions in which the target address is involved,and we collect the neighbouring addresses of all its transactions and compute 12 quantity-related features by means of a merge set operation on the neighbouring addresses.The transaction patterns in Fig.5 can then be summarised by means of Fig.6,where the number of occurrences of six transaction patterns can be computed in a 2-motifs graph.The final total of 18 implied features is obtained.The descriptions of all extracted features are shown in Table 2.And finally,a small number of computationally convenient entity features used to normalise the results were extracted:numberofaddresseswithinanentity,entitylifetime,andnumberofentitytransactions,respectively.

    Figure 5: Diagram of the neighborhood address in the Bitcoin directed hypergraph

    Figure 6: Trading patterns in the 2-motifs diagram

    Table 2: The list of features extracted in this paper

    3.3 Results Consensus Model

    The inclusion of unsupervised clustering models in the classification combination can increase the diversity of the models,thus improving the accuracy and robustness of the predictions[19].This paper considers the similarity of entity behaviors of the same services and proposes a scheme to correct the supervised classification results of address with the unsupervised clustering results of the entity.The method is a good remedy for the shortcomings of supervised or unsupervised learning only.For supervised learning,since Bitcoin addresses are generated without cost,some addresses that are used only a few times do not match the features of their participating services and thus are inevitably misclassified,while entities are representational as mappings of real participants that are not easily generated or discarded.For unsupervised learning,clustering methods can only obtain the indexes of clusters,not the labels directly,and it is too absolute to simply group the addresses within a cluster into one category.However,the entities within the clusters obtained by unsupervised clustering have some correlation,which can be exploited for joint prediction in combination with supervised learning classifiers,and the entities are the ties that associate address objects of the same service.The ensemble problem can be viewed as an optimization problem on a bipartite graph,where the misclassified addresses in the entities are corrected by iterative propagation of probability estimates between neighboring entities.Achieving this optimization problem requires two things:First,the labels of the predictions should be consistent with the baseline of the supervised learning results as much as possible,which can be achieved by penalizing deviations from the predictions provided by supervised learning in an abstract bipartite graph optimization problem.Second,the unsupervised constraint needs to be satisfied to the maximum extent possible,and stable entity features replace their internally fluctuating address features for iterative propagation of probability estimates until they are stable and finally,a smooth prediction result is obtained.

    In this paper,we use the following identifiers to denote the important parameters in the algorithm,the set of addresses to be predicted isX=x1,x2,...,xn,the addresses participate incservice categories.A total ofmmodels are involved in joint prediction,wherermodels are supervised models that provide prediction data and the remainingm-runsupervised models provide clusteringidsfor the addresses.In a Bitcoin address multi-classification task,each model divides the data points into groups,so there will be a total ofv=m*cgroups.The supervised learning model divides the addresses intos=r*cgroups with the same predictive labels,while the unsupervised model divides the addresses intov-sgroups with similar behavior.Note that the clusteridnumberzmay not be the same as the categoryzbecause clusteridonly distinguishes between different clusters to provide category constraints,and does not represent a specific service classification.In this paper,then×mmatrix is denoted byBn×m,andbijdenotes the elements in rowiand columnjof the matrix.denote the vectors of thei-throw andj-thcolumn,respectively.Ifxiis assigned to groupgjby one of the algorithms thenaij=1,otherwise 0.The matrixAn×vformed byaijis called the affinity matrix.

    Our goal is to compute the conditional probabilityuizthat each address nodexibelongs to categoryzand the conditional probabilityqjzthat each group nodegjbelongs to categoryz.The conditional probability matrix consisting of these two conditional probabilities is denoted asUn×candQv×c,respectively.Since the first s groups are obtained from the supervised learning model and they have some initial class label estimates,we useyjz=1 to indicate that the group nodegjbelongs to the classzand 0 otherwise,and the matrix consisting ofyjzis denoted asYv×c.Finally,the number of categories assigned to each group is denoted askjandkj=Table 3 summarizes the important notations.

    Table 3: Description of symbols

    To reach a consensus among all models,an optimization problem is defined in a bipartite graph with an objective function that penalizes deviations from the base classifier predictions and differences in predicted class labels between nearby nodes.As Eq.(1)is shown,where|·|and||·||denote the L1 and L2 paradigms of the vector,respectively.

    The optimisation method consists of two parts:The first part of the formula is to ensure that if an address objectxiis assigned to the groupgjby one of the classification algorithms,i.e.,whenaij=1,their conditional probability estimates must be close to each other.That is,the group conditional probability of an address is similar to that of the entity to which it belongs,and this condition corrects the classification results of supervised learning and reduces the number of misclassified addresses.The second part is the constraint that the consensus class label estimate for the groupgjshould not deviate significantly from its initial class label predictionyj.This means that the address-corrected group conditional probabilities must not deviate too much from the initial predicted labels,so that only a small number of obviously misclassified addresses are modified,which ensures that the algorithm is dominated by the classification results.In this formula,αis the penalty for violating that constraint,The group nodegjparticipates in the constraint only ifj=1,...,s,because it is generated by the classifier withkj=1,and the group node generated by unsupervised clustering does not participate in this constraint.Finally,are probability vectors,so each component must be greater than or equal to 0 and sum to 1.

    This optimisation problem can be solved using coordinate descent.The basic idea is to transform the optimisation problem of a multivariate function into an optimisation problem of multiple univariate functions,so that each variable is solved individually for optimality,and iterations are repeated until convergence to the optimal solution of the function.In Eq.(1),at thetth iteration,If the value ofUis fixed,the objective function is a summation ofvquadratic components with respect toIt is strictly convex and(Q,U(t-1))=0 gives the unique global minimum of the cost function with respect to

    Similarly,fixingQ,the unique global minimum with respect tois also obtained:

    The updated formula for the matrix is shown in Algorithm 1.The algorithm demonstrates a correction to the original probability estimation matrix(containing supervised learning results).The block coordinate descent is used to solve this optimisation problem.The basic idea is to transform the optimisation problem of a multivariate function into an optimisation problem of multiple univariate functions so that each variable is solved individually for optimality,and iterations are repeated until convergence to the optimal solution of the function.

    In this algorithm,Dv=diagandDn=diagact as the normalization factor,which maps the matrix after generating a change to a standard range.Kv=diagindicates the existence of constraints on the group nodes,and parameterαcan change the strength of this constraint.Andtdenotes the number of iterations.In the tth iteration,the probability estimation matrix of a group node (i.e.,Q) combines the information of its neighbouring object nodes and its initial valueY.And when updating the consensus resultU,it propagates its updated probability estimate back to its neighbouring object nodes.The results converge when‖Ut-Ut-1‖≤ε,at which point the loop ends.Andboth converge to the stationary point of the optimization problem.Reference[24]showed a simple example and intermediate results for matrix transformations.

    4 Experiment and Evaluation

    In this paper,we use Bitcoin-core[25]to obtain Bitcoin block information and use the Blocksci library [26] to process and retrieve historical Bitcoin transactions.The experimental code is written in python 3.7 and mainly uses the blocksci,pandas,numpy,and scikit-learn libraries.In this section,we evaluate the feature contribution,model accuracy,resulting confusion matrix and distribution of feature values across the service,respectively.

    4.1 Comparison of Feature Extraction Methods

    In this section,we experiment on the accuracy of the model under the use of two types of feature extraction methods,we divide the tests into accuracy comparisons using only explicit features,using only implicit features,and using all features.Random Forest was chosen as the machine learning algorithm,and the number of estimators was set to 100.Due to the imbalance in the number of addresses in the different categories in the dataset,we sampled the same number of addresses from each category in each of the following classification experiments,i.e.,100 addresses were extracted from each category of data to form the dataset,so that the size of the dataset at each round of evaluation was 700.Each round of experiments uses the triple cross validation method,i.e.,2/3 of the data is used for training and 1/3 of the data is used for testing,and each round will produce three results.The experimental results are highly correlated with the division of the dataset,and the larger the share of the test set,the higher the accuracy.However,if the proportion of the training set is too large,it will lose its reference value,so this experiment uses the triple cross validation method.The rest of the experiments were carried out as described above.

    To better show the difference,we repeated the accuracy assessment 100 times and plotted the accuracy as a line graph and the final result is shown in Fig.7.Since the sample set of addresses is randomly sampled in each round,the accuracy rate fluctuates,and the average accuracy results are 0.754,0.73,and 0.691 in that order.The high accuracy rate can be obtained with a small number of features using only implicit features,which indicates that the inter-address transaction relationship is an important factor.Fig.8 shows the top 10 contributed features.As can be seen from this figure,the addresslifetimeis the most contributed feature and implicit features also occupy an important place.

    Figure 7:Comparison of prediction accuracy under different categories of features

    Figure 8:Feature importance

    4.2 Model Accuracy Evaluation

    In this experiment,BGCM is compared with the two best result algorithms,random forest and gradient boosting,to test the accuracy improvement.The number of estimators in the compared algorithms both set to 100,and the rest of the parameters are set to default values.These two results are used as inputs for the first two supervised learning results in the BGCM algorithm,and the rest of the unsupervised clustering inputs are generated by spectral clustering.The alpha parameter in the BGCM algorithm is set to 3,and the number of iterations is 30.Table 4 shows the accuracy,recall,and F1-score under different methods.Our method can obtain better classification results and can successfully correct the few addresses that are misclassified because they do not match the service features,thus improving the overall accuracy.In addition,our algorithm is somewhat pervasive and can be applied to other anonymous transaction situations similar to Bitcoin.

    Table 4: Performance comparison of different algorithms

    4.3 Confusion Matrix

    Table 5 shows only the confusion matrix of classification results based on the BGCM algorithm,where each row of the table represents the actual service,while each column represents the predicted service.

    Table 5: Confusion matrix of the BGCM scheme

    It is easy to see that exchanges and gambling have the lowest detection accuracy,which may be due to the high number of addresses in the dataset for these two services,resulting in a wide distribution of their features and uneven sampling.Furthermore,there are many similarities between the addresses in these two categories,with 12%of exchange addresses being misclassified as gambling and 11%of gambling addresses being misclassified as exchanges,an acceptable result as both services transact with a large number of users and with variable transaction values.To further distinguish between exchanges and gambling services,more detailed features would need to be extracted.Nevertheless,our method still shows some improvement in classification effectiveness.

    4.4 Distribution of Feature Values Across Services

    To more visually see how these features differ by service,we selected the top six contributed features to plot their distribution by service using a box plot.The box plot is a good way to see the distribution of features by service.The top and bottom of the box and the horizontal lines inside the box represent the interquartile range.Two lines are drawn vertically from the top and bottom of the box,with the edges of the lines and black dots indicating unusual outliers.Thus,if the box is‘squashed’or if the box is short in length,it means that the feature values of the service are relatively specific,while if the box is large,it means that the feature values of the service are widely distributed and there is no clear pattern.The box plot reflects the distribution of features in a single dimension.

    Fig.9 shows a box plot of the most contributed features by service,with the red line representing the 50th percentile,the green triangle representing the mean,and the black origin representing the outliers.Fig.9a shows the lifetime box plot distribution of addresses by different services.It is obvious that exchanges,gambling,marketplaces and faucets have longer address lifetime,especially exchanges,as exchange addresses provide trading services for a long time.Conversely,HYIP,mixer and mining pool addresses have a shorter lifetime.In the case of HYIP addresses,which are inherently risky and illegal to trade,most addresses within the IQR follow the use-and-discard principle of using one-time addresses for scams to reduce the risk of being traced,and it is evident that entities offering such services are very cautious.Although HYIP addresses mostly have a short lifetime,a certain amount of time exists as entities need time to crowdfund.In contrast,a coin mixer address is a true onetime use address,which is related to the nature of the coin mixing service.To add a greater degree of confusion,coin mixer services typically use many temporary addresses that are only used for a single transaction and which are not directly linked to the user’s real identity or other transaction addresses.By using one-time addresses,coin mixers break the correlation between the original address and the final destination address.This makes transactions more difficult to trace and increases the privacy and anonymity of the user’s transactions.The distribution of address lifetime for the “mining pool service”is rather peculiar,with the average of the mining pool address lifecycle being at the top of the box,i.e.,most addresses have a short lifecycle,but a few“old miners”with a long lifecycle pull up the average.Our guess is that the pool model is now the mainstay of mining due to the increased difficulty of mining.The pools recruit miners on a temporary basis and reward them based on the power they contribute,so the majority of miners are now temporary miners with a short lifetime.But most of the old miners are still fighting on.

    Fig.9b reflects the distribution of the number of repeat successors across the different services.The meaning of this feature is that when the address is being used as a sending address,the number of times the address is repeated in the received address for all transactions.An interesting phenomenon emerges from the graph,where there is a large number of repeated successors to the faucet address.We suspect that in order to receive this modest reward,the participants actively participate and accumulate more.In contrast,coin mixers hardly ever have repeated transaction addresses for the purpose of user privacy protection.Differences in features between services can distinguish well between the services offered by addresses,and these features are often not directly related to the value of money,which requires mining deeper features of the relationship between addresses.This paper provides a clearer picture of the nature of each service by analysing the distribution of features by service.

    Figure 9:Boxplots of contributed features by services

    5 Conclusion

    In this paper,we propose a new approach to improve the prediction accuracy of Bitcoin address service classes by combining the features of addresses and the features of the entities they are located in to identify address services.Identifying address involved services has many benefits,such as dangerous transaction prevention and statistical analysis of Bitcoin services.Specifically,we show how a multimodel maximization consensus mechanism can be combined with Bitcoin addresses and entities to obtain better classification performance.With the tri-fold crossvalidation method,we can obtain a global average accuracy of 77.4%.In addition,up to 110 features with specific semantics are extracted,and the experimental results show that,in addition to addressing lifetime and transaction interval,the implicit features describing the transaction relationship between addresses are better for distinguishing different services.We select the features with the highest contribution and interpret and analyse the experimental results by combining their semantic information and their distribution by services.We believe that analysing the features of each Bitcoin service can help us better understand the trends of Bitcoin changes.In future work,we would like to focus our work on studying the detection of suspicious addresses using unsupervised learning algorithms,because in real life,most Bitcoin addresses or transactions are made by normal users and it is difficult to obtain labels,using supervised learning algorithms tends to generate a large number of false positive addresses,so our idea is to use outlier detection algorithms to filter out a large number of normal nodes,and further perform outlier nodes for fraud category detection to minimize the number of misclassified users.Nevertheless,in this paper,we were able to classify the seven classes of addresses that have been tagged for services with high accuracy,and we believe that this research can help investigate crimes and assist law enforcement agencies in detecting illegal activities in the Bitcoin network.

    Acknowledgement:The authors are thankful to the previous contributors of machine learning technology that used in this research.

    Funding Statement:This work is sponsored by the National Natural Science Foundation of China Nos.62172353,62302114 and U20B2046.Future Network Scientific Research Fund Project No.FNSRFP-2021-YB-48.Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education No.1221045.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design: Lejun Zhang,Junjie Zhang,Ran Guo;data collection: Kentaroh Toyoda;analysis and interpretation of results:Junjie Zhang,Yuan Liu,Zhihong Tian;draft manuscript preparation:Lejun Zhang,Junjie Zhang,Jing Qiu.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The datasets used and analysed during the current study are available from the corresponding author on reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲成人一二三区av| 国产爱豆传媒在线观看| 97超碰精品成人国产| 国产午夜精品一二区理论片| 黄色欧美视频在线观看| 久久精品国产鲁丝片午夜精品| 精品亚洲成a人片在线观看 | 欧美精品一区二区大全| 全区人妻精品视频| 久久女婷五月综合色啪小说| 亚洲中文av在线| 国产爱豆传媒在线观看| 中文字幕av成人在线电影| 国产女主播在线喷水免费视频网站| 男人舔奶头视频| 久久精品久久久久久噜噜老黄| av播播在线观看一区| 最新中文字幕久久久久| 欧美区成人在线视频| 亚洲成色77777| 日本免费在线观看一区| 国产黄色免费在线视频| 只有这里有精品99| 日本午夜av视频| 九九久久精品国产亚洲av麻豆| 国产亚洲欧美精品永久| 国产精品欧美亚洲77777| 我要看日韩黄色一级片| 久久久久视频综合| 爱豆传媒免费全集在线观看| 爱豆传媒免费全集在线观看| 啦啦啦在线观看免费高清www| 97超视频在线观看视频| 国产一区二区在线观看日韩| 国产一区二区在线观看日韩| 久久久久视频综合| 日韩强制内射视频| 校园人妻丝袜中文字幕| 欧美xxxx黑人xx丫x性爽| 最近2019中文字幕mv第一页| 国产人妻一区二区三区在| 国产无遮挡羞羞视频在线观看| 久久精品久久久久久久性| 国产精品麻豆人妻色哟哟久久| 国产成人午夜福利电影在线观看| 国产av一区二区精品久久 | 国产黄色免费在线视频| 欧美bdsm另类| 一区二区三区精品91| 美女国产视频在线观看| 99热网站在线观看| 午夜激情久久久久久久| 九色成人免费人妻av| 噜噜噜噜噜久久久久久91| 成人特级av手机在线观看| 91精品伊人久久大香线蕉| 国精品久久久久久国模美| 91久久精品国产一区二区成人| 夜夜骑夜夜射夜夜干| 热99国产精品久久久久久7| 久久精品夜色国产| 啦啦啦啦在线视频资源| 老熟女久久久| 另类亚洲欧美激情| 看免费成人av毛片| 成人高潮视频无遮挡免费网站| 欧美精品一区二区大全| 欧美xxⅹ黑人| 国产成人精品一,二区| 人人妻人人看人人澡| 亚洲丝袜综合中文字幕| 国产在线视频一区二区| 在线精品无人区一区二区三 | 国国产精品蜜臀av免费| 一区在线观看完整版| 亚洲欧美成人综合另类久久久| 一本色道久久久久久精品综合| 久久久久久九九精品二区国产| 国产欧美亚洲国产| 国产一区有黄有色的免费视频| 麻豆乱淫一区二区| 国语对白做爰xxxⅹ性视频网站| 久久久久人妻精品一区果冻| 亚洲综合色惰| 国产欧美亚洲国产| 亚洲性久久影院| av.在线天堂| 五月伊人婷婷丁香| 国产亚洲欧美精品永久| 精品少妇久久久久久888优播| 亚洲欧美清纯卡通| 在线亚洲精品国产二区图片欧美 | av免费在线看不卡| 一区二区三区四区激情视频| 免费看av在线观看网站| av视频免费观看在线观看| 99精国产麻豆久久婷婷| 国产精品一区二区性色av| 91午夜精品亚洲一区二区三区| 又大又黄又爽视频免费| 免费久久久久久久精品成人欧美视频 | 日韩欧美精品免费久久| 亚洲,一卡二卡三卡| 春色校园在线视频观看| 中文字幕亚洲精品专区| 久久久精品免费免费高清| 国产av精品麻豆| av国产免费在线观看| 国产视频首页在线观看| 久久午夜福利片| 国产91av在线免费观看| 久久精品国产亚洲av涩爱| 婷婷色麻豆天堂久久| 爱豆传媒免费全集在线观看| 女人十人毛片免费观看3o分钟| 最近2019中文字幕mv第一页| 九九爱精品视频在线观看| 小蜜桃在线观看免费完整版高清| 国产av精品麻豆| 亚洲天堂av无毛| 国产精品一及| 国产高清三级在线| 国产日韩欧美在线精品| 国产淫语在线视频| av天堂中文字幕网| 91aial.com中文字幕在线观看| 一级片'在线观看视频| 国产免费一区二区三区四区乱码| 性色av一级| 久久精品熟女亚洲av麻豆精品| 波野结衣二区三区在线| 亚洲美女黄色视频免费看| 欧美少妇被猛烈插入视频| 最近手机中文字幕大全| 欧美高清性xxxxhd video| 大香蕉久久网| 日韩大片免费观看网站| 亚洲欧美日韩另类电影网站 | 精品久久久久久久久亚洲| 欧美日韩国产mv在线观看视频 | 超碰av人人做人人爽久久| 欧美成人精品欧美一级黄| 国产男女超爽视频在线观看| 伦理电影免费视频| 亚洲av不卡在线观看| 最近中文字幕2019免费版| 高清av免费在线| 99热这里只有是精品在线观看| 亚洲欧美日韩东京热| 亚洲av.av天堂| 亚洲国产精品成人久久小说| 精品酒店卫生间| 一本色道久久久久久精品综合| 熟女人妻精品中文字幕| 成人免费观看视频高清| 成人特级av手机在线观看| 女的被弄到高潮叫床怎么办| 国产免费福利视频在线观看| 91在线精品国自产拍蜜月| 精品亚洲成国产av| 亚洲精品视频女| 亚洲,一卡二卡三卡| 一个人免费看片子| 黄片无遮挡物在线观看| 国产精品嫩草影院av在线观看| 久久久精品免费免费高清| 亚洲成人中文字幕在线播放| 亚洲四区av| 成年女人在线观看亚洲视频| 国产综合精华液| 欧美精品国产亚洲| 国产高清有码在线观看视频| 97在线视频观看| 免费观看的影片在线观看| 久久人人爽人人片av| 亚洲第一av免费看| 十八禁网站网址无遮挡 | 乱码一卡2卡4卡精品| 亚洲中文av在线| 国产精品福利在线免费观看| 91久久精品国产一区二区三区| 黄色怎么调成土黄色| 少妇熟女欧美另类| 欧美老熟妇乱子伦牲交| h日本视频在线播放| 交换朋友夫妻互换小说| 国内揄拍国产精品人妻在线| 久久久精品94久久精品| 99久久综合免费| 如何舔出高潮| 免费看日本二区| 日韩欧美一区视频在线观看 | 国产欧美日韩精品一区二区| 免费大片黄手机在线观看| 国产亚洲5aaaaa淫片| 97超视频在线观看视频| 青春草亚洲视频在线观看| 亚洲国产色片| 亚洲久久久国产精品| 午夜日本视频在线| 中文字幕精品免费在线观看视频 | 中文精品一卡2卡3卡4更新| 国产精品国产三级国产专区5o| 亚洲国产精品999| 最近最新中文字幕免费大全7| 我要看黄色一级片免费的| 国产 一区 欧美 日韩| 午夜福利在线在线| 欧美成人a在线观看| av专区在线播放| 亚洲精品久久久久久婷婷小说| 大片免费播放器 马上看| 国产 一区 欧美 日韩| 久久99蜜桃精品久久| 欧美日韩视频高清一区二区三区二| 国产无遮挡羞羞视频在线观看| 高清av免费在线| 卡戴珊不雅视频在线播放| 久久久久网色| 亚洲图色成人| 亚洲人成网站在线观看播放| 中文天堂在线官网| 我要看日韩黄色一级片| 久久午夜福利片| 少妇熟女欧美另类| 国产精品人妻久久久久久| 免费观看av网站的网址| 久久久久精品久久久久真实原创| 久久久国产一区二区| 大片免费播放器 马上看| 男人狂女人下面高潮的视频| 国产成人freesex在线| 亚洲真实伦在线观看| 嫩草影院新地址| 亚洲成人手机| 国产视频首页在线观看| 亚洲国产色片| 国产乱人偷精品视频| 日本-黄色视频高清免费观看| av免费观看日本| 欧美日韩国产mv在线观看视频 | 蜜桃亚洲精品一区二区三区| 99久久精品一区二区三区| 久久久久久九九精品二区国产| 欧美日韩综合久久久久久| 亚洲国产精品专区欧美| 啦啦啦中文免费视频观看日本| 男人爽女人下面视频在线观看| 精品亚洲成a人片在线观看 | 亚洲精品国产色婷婷电影| 春色校园在线视频观看| 久久99热6这里只有精品| 国产大屁股一区二区在线视频| 精品久久久噜噜| 老师上课跳d突然被开到最大视频| 看十八女毛片水多多多| 亚洲激情五月婷婷啪啪| 久久久成人免费电影| 精品久久久久久久末码| 亚洲av不卡在线观看| 黄色一级大片看看| 中国三级夫妇交换| 成人无遮挡网站| 中文字幕久久专区| av在线蜜桃| 一个人看的www免费观看视频| 美女国产视频在线观看| 日韩欧美精品免费久久| 国产欧美日韩一区二区三区在线 | 欧美日韩一区二区视频在线观看视频在线| 久久久久久久久大av| 亚洲精品国产成人久久av| 国产高清有码在线观看视频| 如何舔出高潮| 亚洲,欧美,日韩| 中文字幕av成人在线电影| 91久久精品国产一区二区三区| 久久久久国产精品人妻一区二区| 欧美日本视频| 精品熟女少妇av免费看| 1000部很黄的大片| 国产精品秋霞免费鲁丝片| 国产男女内射视频| 欧美日韩国产mv在线观看视频 | 国产真实伦视频高清在线观看| 一级毛片电影观看| 一级av片app| 国产伦精品一区二区三区四那| 国产av精品麻豆| 色吧在线观看| 天美传媒精品一区二区| 国产黄色视频一区二区在线观看| 另类亚洲欧美激情| 亚洲精品国产av成人精品| 国产色爽女视频免费观看| 日韩av不卡免费在线播放| 久久久成人免费电影| 自拍偷自拍亚洲精品老妇| 国产高清有码在线观看视频| 精品亚洲乱码少妇综合久久| 日本黄大片高清| xxx大片免费视频| av不卡在线播放| 少妇精品久久久久久久| 人妻夜夜爽99麻豆av| 少妇人妻久久综合中文| 免费av中文字幕在线| 观看美女的网站| 日本欧美国产在线视频| 伦理电影免费视频| 婷婷色综合www| 丝袜喷水一区| 纵有疾风起免费观看全集完整版| 少妇裸体淫交视频免费看高清| 高清在线视频一区二区三区| 大陆偷拍与自拍| 久久久精品94久久精品| 超碰97精品在线观看| 黄色配什么色好看| 精品久久久久久久久亚洲| 亚洲综合精品二区| h视频一区二区三区| 亚洲欧洲国产日韩| 高清不卡的av网站| 国产欧美日韩一区二区三区在线 | 男的添女的下面高潮视频| av卡一久久| 国产深夜福利视频在线观看| 亚洲色图av天堂| 亚洲精品色激情综合| 男人爽女人下面视频在线观看| 亚洲国产日韩一区二区| 久久国产乱子免费精品| 搡老乐熟女国产| 中文字幕亚洲精品专区| 黄色一级大片看看| 色哟哟·www| 高清毛片免费看| 国产在线视频一区二区| 亚洲国产av新网站| 美女内射精品一级片tv| 欧美 日韩 精品 国产| 国产探花极品一区二区| 亚洲av国产av综合av卡| 日本猛色少妇xxxxx猛交久久| 嫩草影院新地址| 国产精品国产三级国产专区5o| 国产色婷婷99| 免费观看av网站的网址| 中国三级夫妇交换| 国产精品99久久99久久久不卡 | 中文字幕人妻熟人妻熟丝袜美| 欧美亚洲 丝袜 人妻 在线| 最近2019中文字幕mv第一页| 免费大片黄手机在线观看| 国产黄片视频在线免费观看| 免费看不卡的av| 一级毛片电影观看| 久久婷婷青草| 成人特级av手机在线观看| 精品亚洲成a人片在线观看 | 狂野欧美白嫩少妇大欣赏| 在线看a的网站| 亚洲国产av新网站| 直男gayav资源| av网站免费在线观看视频| 男人爽女人下面视频在线观看| www.av在线官网国产| 欧美性感艳星| 99热这里只有是精品50| 精品久久久久久电影网| 伦理电影大哥的女人| 在线观看国产h片| 亚洲欧美成人精品一区二区| 亚洲av电影在线观看一区二区三区| a级一级毛片免费在线观看| 97超视频在线观看视频| 亚洲人成网站高清观看| 我的女老师完整版在线观看| 在线观看一区二区三区激情| 一区二区av电影网| tube8黄色片| 国产精品国产三级专区第一集| 国产中年淑女户外野战色| 黑丝袜美女国产一区| 久久精品久久精品一区二区三区| 日韩视频在线欧美| 男女国产视频网站| 色5月婷婷丁香| 欧美另类一区| 国产又色又爽无遮挡免| 麻豆国产97在线/欧美| a级一级毛片免费在线观看| 国产精品国产三级国产av玫瑰| 又黄又爽又刺激的免费视频.| 少妇被粗大猛烈的视频| 亚洲美女搞黄在线观看| 亚洲欧美精品专区久久| 国产无遮挡羞羞视频在线观看| 亚洲天堂av无毛| 一级黄片播放器| 亚洲欧美精品专区久久| 麻豆乱淫一区二区| 观看av在线不卡| 三级国产精品片| 深夜a级毛片| 国产黄色视频一区二区在线观看| 两个人的视频大全免费| 简卡轻食公司| 欧美三级亚洲精品| 亚洲国产精品成人久久小说| 制服丝袜香蕉在线| 在线免费观看不下载黄p国产| 黑丝袜美女国产一区| 免费观看的影片在线观看| 中国美白少妇内射xxxbb| 国产高清国产精品国产三级 | 黑人猛操日本美女一级片| 男女无遮挡免费网站观看| 少妇人妻久久综合中文| 美女中出高潮动态图| 国产成人免费观看mmmm| 联通29元200g的流量卡| 亚洲av男天堂| 免费人成在线观看视频色| 国产视频首页在线观看| 国产av一区二区精品久久 | 香蕉精品网在线| 国产一区二区在线观看日韩| 晚上一个人看的免费电影| 免费播放大片免费观看视频在线观看| 18禁动态无遮挡网站| 亚洲综合色惰| 久久久久久久亚洲中文字幕| av又黄又爽大尺度在线免费看| 国产欧美日韩精品一区二区| 少妇的逼好多水| 免费看不卡的av| 国产精品人妻久久久影院| 成人一区二区视频在线观看| av一本久久久久| 国产av一区二区精品久久 | 蜜桃久久精品国产亚洲av| 日本vs欧美在线观看视频 | 18+在线观看网站| 有码 亚洲区| 国产伦在线观看视频一区| 色哟哟·www| 国产成人一区二区在线| 我要看日韩黄色一级片| h日本视频在线播放| 王馨瑶露胸无遮挡在线观看| 免费av不卡在线播放| 亚洲av免费高清在线观看| 日本免费在线观看一区| 亚洲国产最新在线播放| 99视频精品全部免费 在线| 丝袜脚勾引网站| 黑丝袜美女国产一区| 中文乱码字字幕精品一区二区三区| 亚洲精品视频女| 国产精品99久久99久久久不卡 | 国产精品人妻久久久久久| 在现免费观看毛片| 亚洲最大成人中文| 亚洲精品久久午夜乱码| 夫妻性生交免费视频一级片| 欧美成人一区二区免费高清观看| 国产免费一级a男人的天堂| 中文字幕精品免费在线观看视频 | 久久精品人妻少妇| 亚洲综合精品二区| 免费看不卡的av| 少妇人妻久久综合中文| 在线 av 中文字幕| 亚洲,欧美,日韩| 一边亲一边摸免费视频| 97精品久久久久久久久久精品| 赤兔流量卡办理| 国产国拍精品亚洲av在线观看| 欧美成人一区二区免费高清观看| 日韩在线高清观看一区二区三区| 九色成人免费人妻av| 日韩一区二区三区影片| 国产在线视频一区二区| 五月玫瑰六月丁香| 欧美极品一区二区三区四区| 黄色日韩在线| 99九九线精品视频在线观看视频| 少妇精品久久久久久久| 亚洲国产精品一区三区| 一个人看的www免费观看视频| 日韩免费高清中文字幕av| 久久久亚洲精品成人影院| 国产美女午夜福利| 久久精品久久久久久噜噜老黄| 涩涩av久久男人的天堂| 自拍欧美九色日韩亚洲蝌蚪91 | 国产av精品麻豆| 国产高清有码在线观看视频| 亚洲欧美一区二区三区黑人 | 欧美极品一区二区三区四区| 又大又黄又爽视频免费| 在线观看免费视频网站a站| 18禁在线播放成人免费| www.av在线官网国产| 亚洲av免费高清在线观看| 国产免费一级a男人的天堂| 亚洲av综合色区一区| 91aial.com中文字幕在线观看| 涩涩av久久男人的天堂| 中国国产av一级| 在线精品无人区一区二区三 | 欧美激情国产日韩精品一区| 欧美成人一区二区免费高清观看| 亚洲精品乱码久久久久久按摩| 亚洲欧美日韩另类电影网站 | 国产精品麻豆人妻色哟哟久久| 黑人猛操日本美女一级片| 日韩在线高清观看一区二区三区| videossex国产| 亚洲精品视频女| 国产高清不卡午夜福利| 91精品国产国语对白视频| 一级毛片电影观看| 国产在线一区二区三区精| 欧美日韩在线观看h| 国产精品久久久久久精品古装| 久久久久久九九精品二区国产| 亚洲国产精品成人久久小说| 国产精品久久久久久久电影| 欧美xxxx黑人xx丫x性爽| 国产成人freesex在线| 免费观看性生交大片5| 欧美高清成人免费视频www| 免费av中文字幕在线| 国产精品麻豆人妻色哟哟久久| 中文精品一卡2卡3卡4更新| 日日啪夜夜爽| 久久久久久伊人网av| 女的被弄到高潮叫床怎么办| 五月伊人婷婷丁香| 成年免费大片在线观看| 婷婷色麻豆天堂久久| 春色校园在线视频观看| 黄色一级大片看看| 青春草亚洲视频在线观看| 国产伦在线观看视频一区| 亚洲国产精品专区欧美| 一个人免费看片子| www.色视频.com| 老师上课跳d突然被开到最大视频| 日本午夜av视频| 国产在线一区二区三区精| 日韩三级伦理在线观看| 人妻制服诱惑在线中文字幕| 久久久久网色| 街头女战士在线观看网站| 免费少妇av软件| 男女边吃奶边做爰视频| 国产男女超爽视频在线观看| 三级国产精品片| 国产一区二区在线观看日韩| 国产av一区二区精品久久 | 毛片女人毛片| 国产乱人视频| av在线app专区| 深爱激情五月婷婷| 成人免费观看视频高清| 韩国av在线不卡| 国产午夜精品久久久久久一区二区三区| 精品久久久精品久久久| 人妻夜夜爽99麻豆av| 熟妇人妻不卡中文字幕| 搡老乐熟女国产| 精品酒店卫生间| 久久人人爽人人片av| 九九久久精品国产亚洲av麻豆| 在线观看一区二区三区激情| 一二三四中文在线观看免费高清| 日韩人妻高清精品专区| 亚洲精品456在线播放app| 少妇的逼好多水| 人人妻人人爽人人添夜夜欢视频 | 免费观看性生交大片5| 纵有疾风起免费观看全集完整版| 久久久久性生活片| xxx大片免费视频| www.av在线官网国产| 99久国产av精品国产电影| 看非洲黑人一级黄片| 内地一区二区视频在线| 一级二级三级毛片免费看| 大话2 男鬼变身卡| a级毛色黄片| 午夜激情久久久久久久| .国产精品久久| 亚洲精品日本国产第一区| 亚洲国产av新网站| 久久久久久久久久成人| 午夜老司机福利剧场| 久久国产乱子免费精品| 国产精品蜜桃在线观看| 日韩中文字幕视频在线看片 | 高清不卡的av网站| av.在线天堂| 久久人人爽人人片av| 国产一区二区三区av在线| 又爽又黄a免费视频| 国产亚洲最大av| 色综合色国产| 亚洲国产最新在线播放| 这个男人来自地球电影免费观看 | 国产女主播在线喷水免费视频网站| 欧美成人午夜免费资源|