2022
DOI: 10.1109/tsmc.2020.3016821
|View full text |Cite
|
Sign up to set email alerts
|

Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 182 publications
(90 citation statements)
references
References 31 publications
0
89
0
Order By: Relevance
“…Embeddings are usually constructed by network representation learning, i.e., an endto-end training method that automatically transforms a network structure into a low-dimensional space. Early network representation methods include deepwalk [116], node2vec [117], or other customized biased random walks [118]. These methods capture the similarity between nodes as the overlap of neighbor nodes found by a random walk.…”
Section: B Transaction Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Embeddings are usually constructed by network representation learning, i.e., an endto-end training method that automatically transforms a network structure into a low-dimensional space. Early network representation methods include deepwalk [116], node2vec [117], or other customized biased random walks [118]. These methods capture the similarity between nodes as the overlap of neighbor nodes found by a random walk.…”
Section: B Transaction Featuresmentioning
confidence: 99%
“…Network structure-based features, such as centrality [145], neighbors' identities [72], [183], and motifs [170] are proven to have prediction power. Network embedded feature selection methods, when used alone, can also achieve reasonable performance compared to hand-picked features [118], [138], [179]. As for learning algorithms, decision tree-based methods, especially random forests, achieved the highest performance in most of the tasks.…”
Section: Learning Tasks Using Transaction Features Address Identitmentioning
confidence: 99%
“…In the proposed model, the behavior was quantified to 'candidates' suspicion level of emails, 'candidates' capability to differentiate between phishing and non-phishing emails, and the extent of bias in their decision to the recent past emails. In [12], the authors proposed an approach to reveal the phishing accruing on Ethereum through its transaction records' mining processes. They conducted a crawling of phishing addresses of two websites and remodeled the network of transactions.…”
Section: Related Workmentioning
confidence: 99%
“…Vasek and Moore [64] surveyed the presence of Bitcoin scams, including Ponzi schemes, mining scams, scam wallets, and fraudulent exchanges. After that, some other studies have characterized various scams including Ponzi schemes [25,26,33,35,62,63,65], scam Initial Coin Offerings (ICOs) [37,49,53,72], market manipulation of cryptocurrencies [32,33,[41][42][43], blockchain honeypots [61], and phishing scams [57,69,70].…”
Section: Blockchain Scamsmentioning
confidence: 99%