2023 4th International Conference on Intelligent Engineering and Management (ICIEM) 2023
DOI: 10.1109/iciem59379.2023.10166745
|View full text |Cite
|
Sign up to set email alerts
|

Neural network based approach for Ethereum fraud detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Most research uses supervised machine learning techniques to classify addresses, but with the exception of Akcora et al [1] and Paquet-Clouston et al [42], researchers do not have access to quality labelled datasets. Instead, researchers use synthetic and fake data: Ashfaq et al [2] use a synthetic dataset; Rabieinejad et al [44] generate fake labels; Dahiya et al [11] use an unverified Kaggle dataset; Pham and Lee [43] use unverified labels for "30 thieves" of unknown provenance; Sankar Roy et al [47] use the same Pham and Lee dataset. Or researchers use very simple heuristics (such as node degree patterns, see Weber et al [55] and Lorenz et al [34] who use the Weber et al dataset) or slightly more complex heuristics (like motifs, see Wu et al [58]) and assume that such patterns are evidence of complex criminal behaviour, like money laundering.…”
Section: Defining Sybils and Deanonymizing Social Networkmentioning
confidence: 99%
“…Most research uses supervised machine learning techniques to classify addresses, but with the exception of Akcora et al [1] and Paquet-Clouston et al [42], researchers do not have access to quality labelled datasets. Instead, researchers use synthetic and fake data: Ashfaq et al [2] use a synthetic dataset; Rabieinejad et al [44] generate fake labels; Dahiya et al [11] use an unverified Kaggle dataset; Pham and Lee [43] use unverified labels for "30 thieves" of unknown provenance; Sankar Roy et al [47] use the same Pham and Lee dataset. Or researchers use very simple heuristics (such as node degree patterns, see Weber et al [55] and Lorenz et al [34] who use the Weber et al dataset) or slightly more complex heuristics (like motifs, see Wu et al [58]) and assume that such patterns are evidence of complex criminal behaviour, like money laundering.…”
Section: Defining Sybils and Deanonymizing Social Networkmentioning
confidence: 99%