Who is who on Ethereum? Account labeling using heterophilic graph convolutional network
To combat cybercrimes and maintain financial security for the blockchain ecosystem,“know
your customer”(KYC) is an essential and also challenging process due to the pseudonymity …
your customer”(KYC) is an essential and also challenging process due to the pseudonymity …
Defining user spectra to classify Ethereum users based on their behavior
Purpose In this paper, we define the concept of user spectrum and adopt it to classify
Ethereum users based on their behavior. Design/methodology/approach Given a time …
Ethereum users based on their behavior. Design/methodology/approach Given a time …
Ethereum fraud detection with heterogeneous graph neural networks
While transactions with cryptocurrencies such as Ethereum are becoming more prevalent,
fraud and other criminal transactions are not uncommon. Graph analysis algorithms and …
fraud and other criminal transactions are not uncommon. Graph analysis algorithms and …
Defi and nfts hinder blockchain scalability
Many classical blockchains are known to have an embarrassingly low transaction
throughput, down to Bitcoin's notorious seven transactions per second limit. Various …
throughput, down to Bitcoin's notorious seven transactions per second limit. Various …
CT-GCN: A phishing identification model for blockchain cryptocurrency transactions
B Fu, X Yu, T Feng - International Journal of Information Security, 2022 - Springer
With the widespread application of blockchain technology, the cyberspace security issue of
phishing has also appeared in the emerging blockchain cryptocurrency ecosystem. Because …
phishing has also appeared in the emerging blockchain cryptocurrency ecosystem. Because …
CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification
B Fu, Y Wang, T Feng - Cybersecurity, 2024 - Springer
Due to the anonymous and contract transfer nature of blockchain cryptocurrencies, they are
susceptible to fraudulent incidents such as phishing. This poses a threat to the property …
susceptible to fraudulent incidents such as phishing. This poses a threat to the property …
RiskSEA: A Scalable Graph Embedding for Detecting On-chain Fraudulent Activities on the Ethereum Blockchain
A Agarwal, L Lu, A Maheswaran, V Mahadevan… - arxiv preprint arxiv …, 2024 - arxiv.org
Like any other useful technology, cryptocurrencies are sometimes used for criminal
activities. While transactions are recorded on the blockchain, there exists a need for a more …
activities. While transactions are recorded on the blockchain, there exists a need for a more …
TGEditor: Task-Guided Graph Editing for Augmenting Temporal Financial Transaction Networks
Recent years have witnessed a growth of research interest in designing powerful graph
mining algorithms to discover and characterize the structural pattern of interests from …
mining algorithms to discover and characterize the structural pattern of interests from …
Surveys on the Security of Ethereum and Hyperledger Fabric Blockchain Platforms
NNMSN Mohd, S Afiqah, S Khadeja… - … on Perceptive and …, 2025 - journals.iium.edu.my
Ethereum and Hyperledger are two popular and well-known block chain platforms which
represent two kinds of application differentiation. Ethereum is a decentralized platform that …
represent two kinds of application differentiation. Ethereum is a decentralized platform that …
Multi-channel walk embedding based ethereum phishing scam detection method
J Li, H Li, N Cheng, W Zhang, Y Xu… - 2022 IEEE 28th …, 2023 - ieeexplore.ieee.org
With the prevalent adoption of blockchain in the financial system, there has been an
increase in phishing scams on cryptocurrency platforms such as Ethereum, and an effective …
increase in phishing scams on cryptocurrency platforms such as Ethereum, and an effective …