<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>chta</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Chaos Theory and Applications</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2687-4539</issn>
                                                                                            <publisher>
                    <publisher-name>Akif AKGÜL</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.51537/chaos.1880488</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Finance and Investment (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Finans ve Yatırım (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Chaotic Dynamics in Bitcoin Money Laundering: A Recurrence Quantification Analysis</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-2110-7571</contrib-id>
                                                                <name>
                                    <surname>Şahin</surname>
                                    <given-names>Eyyüp Ensari</given-names>
                                </name>
                                                                    <aff>NIGDE UNIVERSITY, FACULTY OF ECONOMICS AND ADMINISTRATIVE SCIENCES</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260328">
                    <day>03</day>
                    <month>28</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>1</issue>
                                        <fpage>56</fpage>
                                        <lpage>65</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20260202">
                        <day>02</day>
                        <month>02</month>
                        <year>2026</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260323">
                        <day>03</day>
                        <month>23</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2019, Chaos Theory and Applications</copyright-statement>
                    <copyright-year>2019</copyright-year>
                    <copyright-holder>Chaos Theory and Applications</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Money laundering in cryptocurrency networks poses persistent challenges for financial intelligence units due to the pseudo-anonymous architecture of blockchain systems and the limited effectiveness of conventional rule-based detection methods. This study introduces chaos theory and recurrence quantification analysis (RQA) as a novel framework for characterizing temporal behavioral dynamics in Bitcoin money laundering transactions. Analyzing 46,564 labeled transactions from the Elliptic Bitcoin Dataset spanning 2009-2018, we construct aggregate time series for illicit and licit transaction volumes across 49 discrete temporal steps, corresponding to the dataset’s inherent graph-based snapshot structure, and apply phase space reconstruction techniques to compute three RQA metrics: determinism (DET), laminarity (LAM), and entropy (ENTR). Results reveal paradoxically higher determinism in illicit transactions (38.24% vs. 16.67% for licit), substantially elevated laminarity (35.80% vs. 0.00%), and greater entropy (0.45 vs. 0.00%), indicating that sophisticated obfuscation strategies inadvertently introduce detectable deterministic signatures. Augmenting conventional graph-based features with RQA metrics significantly enhances Random Forest classification performance, reaching near-optimal levels (F1 = 1.000, AUC = 1.000) within the evaluated dataset environment, with entropy emerging as the single most discriminative predictor. While these exceptional results reflect the high fidelity of chaos-based features in capturing structured laundering patterns from this period, they serve as a benchmark for the theoretical potential of nonlinear analysis in blockchain forensics. These findings demonstrate that temporal complexity features offer a powerful diagnostic tool for real-time monitoring and detection of systemic financial crime in evolving cryptocurrency ecosystems.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Recurrence quantification analysis</kwd>
                                                    <kwd>  Blockchain forensics</kwd>
                                                    <kwd>  Chaos theory</kwd>
                                                    <kwd>  Explainable artificial intelligence.</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Adadi, A. and M. Berrada, 2018 Peeking inside the black-box: A
survey on explainable artificial intelligence (xai). IEEE Access 6:
52138–52160.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Akcora, C. G., Y. Li, Y. R. Gel, and M. Kantarcioglu, 2021 Bitcoinheist:
Topological data analysis for ransomware detection on the
bitcoin blockchain. IEEE Transactions on Information Forensics
and Security 16: 1966–1980.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Al-Yahyaee, K. H.,W. Mensi, H. U. Ko, S. M. Yoon, and S. H. Kang,
2018 Efficiency, multifractality, and the long-memory property
of the bitcoin market. Physica A 502: 127–134.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Bartoletti, M., B. Pes, and S. Serusi, 2018 Data mining for detecting
bitcoin ponzi schemes. In 2018 Crypto Valley Conference on
Blockchain Technology, pp. 75–84.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Breiman, L., 2001 Random forests. Machine Learning 45: 5–32.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Chainalysis, 2024 The 2024 crypto crime report.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Chen, Z., E. N. Teoh, A. Nazir, E. K. Karuppiah, and K. S. Lam,
2021 Machine learning techniques for anti-money laundering
(aml) solutions in suspicious transaction detection: A review.
Knowledge and Information Systems 63: 245–285.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Cohen, J., 1988 Statistical Power Analysis for the Behavioral Sciences.
Lawrence Erlbaum Associates, second edition.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Fanusie, Y. and T. Robinson, 2018 Bitcoin laundering: An analysis
of illicit flows into digital currency services.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Fawcett, T., 2006 An introduction to roc analysis. Pattern Recognition
Letters 27: 861–874.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Foley, S., J. R. Karlsen, and T. J. Putnins, 2019 Sex, drugs, and
bitcoin: How much illegal activity is financed through cryptocurrencies?
The Review of Financial Studies 32: 1798–1853.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Lahmiri, S., S. Bekiros, and A. Salvi, 2018 Long-range memory,
distributional variation and randomness of bitcoin volatility.
Chaos, Solitons &amp; Fractals 107: 43–48.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Lorenz, J., M. I. Silva, D. Aparicio, J. T. Ascensao, and P. Bizarro,
2020 Machine learning methods to detect money laundering in
the bitcoin blockchain in the presence of label scarcity. In Proceedings
of the First ACM International Conference on AI in Finance.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Mann, H. B. and D. R. Whitney, 1947 On a test of whether one of
two random variables is stochastically larger than the other. The
Annals of Mathematical Statistics 18: 50–60.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Marwan, N., M. C. Romano, M. Thiel, and J. Kurths, 2007 Recurrence
plots for the analysis of complex systems. Physics Reports
438: 237–329.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Monamo, P., V. Marivate, and B. Twala, 2016 Unsupervised learning
for robust bitcoin fraud detection. In Information Security for
South Africa.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Paquet-Clouston, M., B. Haslhofer, and B. Dupont, 2019 Ransomware
payments in the bitcoin ecosystem. Journal of Cybersecurity
5.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Pedregosa, F. e. a., 2011 Scikit-learn: Machine learning in python.
Journal of Machine Learning Research 12: 2825–2853.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Pham, T. and S. Lee, 2016 Anomaly detection in bitcoin network
using unsupervised learning methods. arXiv preprint
arXiv:1611.03941 .</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Rawald, T., M. Sips, N. Marwan, and D. Dransch, 2017 Fast computation
of recurrences in long time series. In Discovery Science.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Rossi, E., B. Chamberlain, F. Frasca, D. Eynard, F. Monti, et al., 2020
Temporal graph networks for deep learning on dynamic graphs.
arXiv preprint arXiv:2006.10637 .</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Strozzi, F., J. M. Zaldivar, and J. P. Zbilut, 2002 Application of nonlinear
time series analysis techniques to high-frequency currency
exchange data. Physica A 312: 520–538.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Takaishi, T., 2018 Statistical properties and multifractality of bitcoin.
Physica A 506: 507–519.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Takens, F., 1981 Detecting strange attractors in turbulence. In Dynamical
Systems and Turbulence, Warwick 1980.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Wallot, S. and D. Monasterio, 2018 Calculation of average mutual
information (ami) and false-nearest neighbors (fnn). Frontiers in
Psychology 9: 1679.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Webber, C. L. and J. P. Zbilut, 2005 Recurrence quantification analysis
of nonlinear dynamical systems. In Tutorials in Contemporary
Nonlinear Methods for the Behavioral Sciences, edited by M. A. Riley
and G. C. Van Orden, pp. 26–94, National Science Foundation.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Weber, M. e. a., 2019 Anti-money laundering in bitcoin: Experimenting
with graph convolutional networks for financial forensics.
In KDD ’19 Workshop on Anomaly Detection in Finance.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Xu, D., C. Ruan, E. Korpeoglu, S. Kumar, and K. Achan, 2020 Inductive
representation learning on temporal graphs. In International
Conference on Learning Representations (ICLR).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Zunino, L., M. Zanin, B. M. Tabak, D. G. Perez, and O. A. Rosso,
2010 Complexity-entropy causality plane: A useful approach to
quantify the stock market inefficiency. Physica A 389: 1891–1901.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
