2020
DOI: 10.1007/978-981-15-9213-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Detection on Ethereum via Learning Representation of Transaction Subgraphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(33 citation statements)
references
References 17 publications
0
26
0
Order By: Relevance
“…Wu et al [19] redesigned the walking strategy by using transaction volume, timestamps, and multiedges features to make their embedding framework more suitable for this task. Subsequently, Yuan et al [15] extracted the subgraphs for each target account and embedded their transaction topology into feature vector via an embedding method named Graph2Vec [25]. Besides, they introduced the line graph [26] to further enhance the network structure embedding.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Wu et al [19] redesigned the walking strategy by using transaction volume, timestamps, and multiedges features to make their embedding framework more suitable for this task. Subsequently, Yuan et al [15] extracted the subgraphs for each target account and embedded their transaction topology into feature vector via an embedding method named Graph2Vec [25]. Besides, they introduced the line graph [26] to further enhance the network structure embedding.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the emergence of related research has helped to analyze the transaction pattern and account behavior on the blockchain system, and most of them leverage graph modeling methods. Such as evolution analysis of market via the on-chain transaction graph [8][9][10][11][12], transaction patterns recognition via graph topology and motifs [13,14], detection of abnormal users or transactions via graph embedding or graph neural network [15,16], etc. Among them, identity inference, which can be regarded as a de-anonymization process, is particularly important in blockchain data mining.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…One can see that these methods mentioned above mainly built phishing account detection as a node classification task, which can not capture more potential global structural features for phishing accounts. Yuan et al [24] built phishing identification problem as the graph classification task, which used line graph to enhance the Graph2Vec method and achieved good performance. However, Yuan et al only consider the structural features obtained from line graphs, ignoring the direction information, which plays a significant role in phishing scams' identification problem.…”
Section: Phishing Identificationmentioning
confidence: 99%
“…However, along with the rapid development of blockchain technology, various types of cybercrimes have arisen endlessly and thus Ethereum has become a hotbed of various cybercrimes [3,4,5]. Due to the anonymity of the blockchain, criminals attempt to evade supervision and engage in illegal activities by injecting funds into the blockchain system.…”
Section: Introductionmentioning
confidence: 99%