{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:00:22Z","timestamp":1772910022835,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030657444","type":"print"},{"value":"9783030657451","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65745-1_8","type":"book-chapter","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T08:03:25Z","timestamp":1608278605000},"page":"132-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3160-2907","authenticated-orcid":false,"given":"Vatsal","family":"Patel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6559-6736","authenticated-orcid":false,"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"8_CR1","unstructured":"Bai, Q., Zhang, C., Xu, Y., Chen, X., Wang, X.: Evolution of ethereum: a temporal graph perspective. arXiv preprint arXiv:2001.05251 (2020)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Chen, T., et al.: Understanding ethereum via graph analysis. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u2019 2018), pp. 1484\u20131492 (2018)","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"8_CR3","unstructured":"Cheng, Z., et al.: Towards a first step to understand the cryptocurrency stealing attack on ethereum. In: Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u2019 2019), pp. 47\u201360 (2019)"},{"key":"8_CR4","unstructured":"Galke, L., Vagliano, I., Scherp, A.: Incremental training of graph neural networks on temporal graphs under distribution shift. arXiv preprint arXiv:2006.14422 (2020)"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Guo, D., Dong, J., Wang, K.: Graph structure and statistical properties of ethereum transaction relationships. Inf. Sci., 492, 58\u201371 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.04.013, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025519303159","DOI":"10.1016\/j.ins.2019.04.013"},{"issue":"8","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1109\/LGRS.2015.2421813","volume":"12","author":"JA Jablonski","year":"2015","unstructured":"Jablonski, J.A., Bihl, T.J., Bauer, K.W.: Principal component reconstruction error for hyperspectral anomaly detection. IEEE Geosci. Remote Sens. Lett. 12(8), 1725\u20131729 (2015)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"8_CR7","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"8_CR8","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Li, Q., Han, Z., Wu, X.M.: Deeper insights into graph convolutional networks for semi-supervised learning. arXiv preprint arXiv:1801.07606 (2018)","DOI":"10.1609\/aaai.v32i1.11604"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Lin, D., Wu, J., Yuan, Q., Zheng, Z.: Modeling and understanding ethereum transaction records via a complex network approach. Express Briefs, IEEE Trans. Circuits Syst. II (2020)","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Lorenz, J., Silva, M.I., Apar\u00edcio, D., Ascens\u00e3o, J.T., Bizarro, P.: Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity (2020)","DOI":"10.1145\/3383455.3422549"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-23184-1_3","volume-title":"Advances in Data Mining. Applications and Theoretical Aspects","author":"EJ Pauwels","year":"2011","unstructured":"Pauwels, E.J., Ambekar, O.: One class classification for anomaly detection: support vector data description revisited. In: Perner, P. (ed.) ICDM 2011. LNCS (LNAI), vol. 6870, pp. 25\u201339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23184-1_3"},{"key":"8_CR13","unstructured":"Pham, T., Lee, S.: Anomaly detection in bitcoin network using unsupervised learning methods (2016)"},{"key":"8_CR14","unstructured":"Pham, T., Lee, S.: Anomaly detection in the bitcoin system \u2013 a network perspective. arXiv abs\/1611.03942 (2016)"},{"key":"8_CR15","unstructured":"Praitheeshan, P., Pan, L., Yu, J., Liu, J., Doss, R.: Security analysis methods on ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605 (2019)"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Praitheeshan, P., Xin, Y.W., Pan, L., Doss, R.: Attainable hacks on keystore files in ethereum wallets-a systematic analysis. In: Proceedings of the International Conference on Future Network Systems and Security (FNSS\u20192019), pp. 99\u2013117. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-34353-8_7","DOI":"10.1007\/978-3-030-34353-8_7"},{"key":"8_CR17","unstructured":"Puzyrev, V.: Deep convolutional autoencoder for cryptocurrency market analysis. arXiv preprint arXiv:1910.12281 (2019)"},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar, S., Leckie, C., Bezdek, J.C., Palaniswami, M.: Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3), 518\u2013533 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR19","unstructured":"Ruff, L., et al.: Deep one-class classification. In: Proceedings of the International Conference on Machine Learning, pp. 4393\u20134402 (2018)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Sayadi, S., Rejeb, S.B., Choukair, Z.: Anomaly detection model over blockchain electronic transactions. In: Proceedings of the 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC\u2019 2019), pp. 895\u2013900. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax, D.M., Duin, R.P.: Support vector data description. Mach. Learn. 54(1), 45\u201366 (2004)","journal-title":"Mach. Learn."},{"key":"8_CR23","unstructured":"Verma, V., Qu, M., Lamb, A., Bengio, Y., Kannala, J., Tang, J.: Graphmix: Regularized training of graph neural networks for semi-supervised learning (2019)"},{"key":"8_CR24","unstructured":"Wang, X., Du, Y., Cui, P., Yang, Y.: OCGNN: One-class classification with graph neural networks. arXiv preprint arXiv:2002.09594 (2020)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-20074-9_13","volume-title":"Information Security Theory and Practice","author":"BB Zarpel\u00e3o","year":"2019","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Rajarajan, M.: Detection of bitcoin-based botnets using a one-class classifier. In: Blazy, O., Yeun, C.Y. (eds.) WISTP 2018. LNCS, vol. 11469, pp. 174\u2013189. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20074-9_13"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Zheng, P., Zheng, Z., ning Dai, H.: Xblock-eth: Extracting and exploring blockchain data from ethereum (2019)","DOI":"10.1109\/OJCS.2020.2990458"},{"key":"8_CR27","unstructured":"Zhou, Z., Zhang, S., Huang, Z.: Dynamic self-training framework for graph convolutional networks. arXiv preprint arXiv:1910.02684 (2019)"},{"key":"8_CR28","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: Proceedings of the International Conference on Learning Representations (2018)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65745-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T15:45:52Z","timestamp":1697384752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65745-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030657444","9783030657451"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65745-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}