2021 5th International Conference on Computing Methodologies and Communication (ICCMC) 2021
DOI: 10.1109/iccmc51019.2021.9418470
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study of Machine Learning Algorithms for Fraud Detection in Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Additionally, NoSQL databases were used to store the data retrieved from the blockchain for easier processing [81], while Drungilas et al [101] tested whether it was better to keep all the data on the chaincode, or to combine the chaincode with the Oracle web service. Another way to store data is using a CSV file [127,149,153] because of its simplicity and ease of further processing.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, NoSQL databases were used to store the data retrieved from the blockchain for easier processing [81], while Drungilas et al [101] tested whether it was better to keep all the data on the chaincode, or to combine the chaincode with the Oracle web service. Another way to store data is using a CSV file [127,149,153] because of its simplicity and ease of further processing.…”
Section: Discussionmentioning
confidence: 99%
“…Peak values can be eliminated by subtracting the column mean and dividing it with the standard deviation [42]. Data can be further normalised [51,105,127,146] and, when working with smart contracts, the operators and operands can be removed from the opcodes [63,117,131]. When working with transactions, if needed, the data can be grouped by user or address [42,77,111,153].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors [78] gives a comprehensive evaluation of different supervised ML algorithms, such as bagging models (RF), boosting models (AdaBoost), and others, to prevent fraud. This research concluded that utilizing AdaBoost and RF classifier produced the best performance result among the other seven algorithms.…”
Section: A An Anomaly In the Aspect Of Cybercrimementioning
confidence: 99%
“…It was observed that the RF algorithm achieved the best results with a detection precision of 85.71. In another study, eight different supervised machine learning techniques were presented and analyzed by Bhowmik et al [26] to investigate illegal transactions on the blockchain network. These include Naive Bayes (NB), LR, MLP, SVM, RF, Ada Boost, etc.…”
Section: Introductionmentioning
confidence: 99%