{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T19:45:59Z","timestamp":1772567159273,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811679926","type":"print"},{"value":"9789811679933","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7993-3_19","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T17:18:47Z","timestamp":1638465527000},"page":"241-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Blockchain Phishing Scam Detection via Multi-channel Graph Classification"],"prefix":"10.1007","author":[{"given":"Dunjie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jinyin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaosong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"1","key":"19_CR1","first-page":"118","volume":"95","author":"M Iansiti","year":"2017","unstructured":"Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95(1), 118\u2013127 (2017)","journal-title":"Harv. Bus. Rev."},{"issue":"9","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TSMC.2018.2854904","volume":"48","author":"Y Yuan","year":"2018","unstructured":"Yuan, Y., Wang, F.Y.: Blockchain and cryptocurrencies: model, techniques, and applications. IEEE Trans. Syst. Man Cybern. Syst. 48(9), 1421\u20131428 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"19_CR3","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, no. 2014, pp. 1\u201332 (2014)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: 2018 Proceedings of the 2018 World Wide Web Conference, pp. 1409\u20131418 (2018)","DOI":"10.1145\/3178876.3186046"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259\u2013277 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"19_CR6","unstructured":"EtherScamDB: Etherscamdb. https:\/\/blog.chainalysis.com\/reports\/therise-of-cybercrime-on-ethereum"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32, 4\u201324 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"19_CR9","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: International Conference on Learning Representations, Toulon, France (2017)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhu, M., Bo, D., Cui, P., Shi, C., Pei, J.: AM-GCN: adaptive multi-channel graph convolutional networks. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3394486.3403177"},{"key":"19_CR11","unstructured":"Ying, R., You, J., Morris, C., Ren, X., Hamilton, W.L., Leskovec, J.: Hierarchical graph representation learning with differentiable pooling. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems, ser. NIPS 2018, p. 4805C4815. Curran Associates Inc., Red Hook, NY, USA (2018)"},{"issue":"1","key":"19_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TKDE.2016.2616305","volume":"29","author":"H Wang","year":"2016","unstructured":"Wang, H., et al.: Incremental subgraph feature selection for graph classification. IEEE Trans. Knowl. Data Eng. 29(1), 128\u2013142 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"19_CR13","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TKDE.2017.2730207","volume":"29","author":"L Duan","year":"2017","unstructured":"Duan, L., Ma, S., Aggarwal, C., Ma, T., Huai, J.: An ensemble approach to link prediction. IEEE Trans. Knowl. Data Eng. 29(11), 2402\u20132416 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2018.2801854","volume":"30","author":"C Fu","year":"2018","unstructured":"Fu, C., et al.: Link weight prediction using supervised learning methods and its application to yelp layered network. IEEE Trans. Knowl. Data Eng. 30(8), 1507\u20131518 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR15","unstructured":"Wu, J., Lin, D., Zheng, Z., Yuan, Q.: T-edge: temporal weighted multidigraph embedding for Ethereum transaction network analysis. arXiv preprint arXiv:1905.08038 (2019)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Wu, J., et al.: Who are the phishers? Phishing scam detection on Ethereum via network embedding. IEEE Trans. Syst. Man Cybern. Syst. (2020)","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Pareja, A., et al.: EvolveGCN: evolving graph convolutional networks for dynamic graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 04, pp. 5363\u20135370 (2020)","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y.: Phishing scam detection on Ethereum: towards financial security for blockchain ecosystem. In: International Joint Conferences on Artificial Intelligence Organization, pp. 4506\u20134512 (2020)","DOI":"10.24963\/ijcai.2020\/621"},{"key":"19_CR19","unstructured":"Handason Tam, D.S., et al.: Identifying illicit accounts in large scale e-payment networks-a graph representation learning approach. arXiv arXiv:1906.05546 (2019)"},{"key":"19_CR20","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: graph2vec: learning distributed representations of graphs. arXiv preprint arXiv:1707.05005 (2017)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Yanardag, P., Vishwanathan, S.: Deep graph kernels. In: 2015 Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1365\u20131374 (2015)","DOI":"10.1145\/2783258.2783417"},{"key":"19_CR22","first-page":"1201","volume":"11","author":"SVN Vishwanathan","year":"2010","unstructured":"Vishwanathan, S.V.N., Schraudolph, N.N., Kondor, R., Borgwardt, K.M.: Graph kernels. J. Mach. Learn. Res. 11, 1201\u20131242 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR23","unstructured":"Lee, J., Lee, I., Kang, J.: Self-attention graph pooling. In: International Conference on Machine Learning, pp. 3734\u20133743 (2019)"},{"key":"19_CR24","unstructured":"Ma, T., Chen, J.: Unsupervised learning of graph hierarchical abstractions with differentiable coarsening and optimal transport. arXiv preprint arXiv:1912.11176 (2019)"},{"key":"19_CR25","unstructured":"Khasahmadi, A.H., Hassani, K., Moradi, P., Lee, L., Morris, Q.: Memory-based graph networks. arXiv preprint arXiv:2002.09518 (2020)"},{"issue":"2","key":"19_CR26","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1021\/jm00106a046","volume":"34","author":"AK Debnath","year":"1991","unstructured":"Debnath, A.K., Lopez de Compadre, R.L., Debnath, G., Shusterman, A.J., Hansch, C.: Structure-activity relationship of mutagenic aromatic and heteroaromatic nitro compounds. Correlation with molecular orbital energies and hydrophobicity. J. Med. Chem. 34(2), 786\u2013797 (1991)","journal-title":"J. Med. Chem."},{"issue":"10","key":"19_CR27","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1093\/bioinformatics\/btg130","volume":"19","author":"H Toivonen","year":"2003","unstructured":"Toivonen, H., Srinivasan, A., King, R.D., Kramer, S., Helma, C.: Statistical evaluation of the predictive toxicology challenge 2000\u20132001. Bioinformatics 19(10), 1183\u20131193 (2003)","journal-title":"Bioinformatics"},{"issue":"Suppl 1","key":"19_CR28","doi-asserted-by":"publisher","first-page":"i47","DOI":"10.1093\/bioinformatics\/bti1007","volume":"21","author":"KM Borgwardt","year":"2005","unstructured":"Borgwardt, K.M., Ong, C.S., Sch\u00f6nauer, S., Vishwanathan, S., Smola, A.J., Kriegel, H.-P.: Protein function prediction via graph kernels. Bioinformatics 21(Suppl 1), i47\u2013i56 (2005)","journal-title":"Bioinformatics"},{"issue":"9","key":"19_CR29","first-page":"2539","volume":"12","author":"N Shervashidze","year":"2011","unstructured":"Shervashidze, N., Schweitzer, P., Van Leeuwen, E.J., Mehlhorn, K., Borgwardt, K.M.: Weisfeiler-Lehman graph kernels. J. Mach. Learn. Res. 12(9), 2539\u20132561 (2011)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7993-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T17:30:21Z","timestamp":1638466221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7993-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811679926","9789811679933"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7993-3_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}