2021
DOI: 10.3390/s21196417
|View full text |Cite
|
Sign up to set email alerts
|

Improving Ponzi Scheme Contract Detection Using Multi-Channel TextCNN and Transformer

Abstract: With the development of blockchain technologies, many Ponzi schemes disguise themselves under the veil of smart contracts. The Ponzi scheme contracts cause serious financial losses, which has a bad effect on the blockchain. Existing Ponzi scheme contract detection studies have mainly focused on extracting hand-crafted features and training a machine learning classifier to detect Ponzi scheme contracts. However, the hand-crafted features cannot capture the structural and semantic feature of the source code. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(10 citation statements)
references
References 57 publications
0
10
0
Order By: Relevance
“…To address the problems of account transaction-based illegal transaction detection methods, researchers [28,29] have used smart contract code-based Ponzi detection methods, which can detect Ponzi schemes before the smart contract code is first released. Chen et al [30], for example, explore contract trading rules by analysing currency flow graphs, smart contract creation and smart contract invocation for transactions on Ethereum.…”
Section: A Smart Contract Code Based Approach To Illegal Transaction ...mentioning
confidence: 99%
“…To address the problems of account transaction-based illegal transaction detection methods, researchers [28,29] have used smart contract code-based Ponzi detection methods, which can detect Ponzi schemes before the smart contract code is first released. Chen et al [30], for example, explore contract trading rules by analysing currency flow graphs, smart contract creation and smart contract invocation for transactions on Ethereum.…”
Section: A Smart Contract Code Based Approach To Illegal Transaction ...mentioning
confidence: 99%
“…When checking the top 20% LOC according to the predicted result of the EADP model, the software testing team inspects n software modules and finds p actual defective modules with q defects. In our experiments, we utilise several evaluation measures that are commonly adopted in both the software engineering [92][93][94] and machine learning [95][96][97][98][99][100]. Precision@20% is the ratio between the number of actual defective modules and the number of predicted defective modules in the top 20% LOC.…”
Section: Effort-aware Evaluation Metricsmentioning
confidence: 99%
“…In our empirical study, we use the three threshold-dependent evaluation metrics (Precision, Recall, and F-measure (F1)) and one threshold-independent evaluation metric (Matthews correlation coefficient, MCC) to evaluate the performance of CSD models. The metrics are widely used in both software engineering studies [64][65][66][67][68][69][70][71] and artificial intelligence researches. [72][73][74][75] In the binary classification problem, these four evaluation metrics can be calculated according to a confusion matrix, as shown in Table 4.…”
Section: Performance Measuresmentioning
confidence: 99%