{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:31:22Z","timestamp":1772199082378,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_21","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:59:33Z","timestamp":1760363973000},"page":"409-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AccountCatcher: Anomaly Blockchain Account Detection Based on\u00a0Hybrid Graph-Based Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8029-096X","authenticated-orcid":false,"given":"Wenkuan","family":"Xiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4604-1142","authenticated-orcid":false,"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5257-9335","authenticated-orcid":false,"given":"Wenbo","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6199-5673","authenticated-orcid":false,"given":"Sipeng","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9548-8306","authenticated-orcid":false,"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"21_CR1","unstructured":"Ethereum. https:\/\/ethereum.org\/. Accessed 29 May 2025"},{"key":"21_CR2","unstructured":"Solana. https:\/\/solana.com\/. Accessed 29 May 2025"},{"key":"21_CR3","unstructured":"BNB Chain. https:\/\/www.bnbchain.org\/. Accessed 29 May 2025"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/TSC.2022.3192166","volume":"16","author":"K Gai","year":"2023","unstructured":"Gai, K., Zhang, Y., Qiu, M., Thuraisingham, B.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Serv. Comput. 16(3), 1673\u20131685 (2023). https:\/\/doi.org\/10.1109\/TSC.2022.3192166","journal-title":"IEEE Trans. Serv. Comput."},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"JA Jaoude","year":"2019","unstructured":"Jaoude, J.A., Saad\u00e9, R.G.: Blockchain applications - usage in different domains. IEEE Access 7, 45360\u201345381 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2902501","journal-title":"IEEE Access"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Babel, K., Daian, P., Kelkar, M., Juels, A.: Clockwork finance: automated analysis of economic security in smart contracts. In: 44th IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 2499\u20132516. IEEE (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10179346","DOI":"10.1109\/SP46215.2023.10179346"},{"key":"21_CR7","unstructured":"CoinGecko: Global Cryptocurrency Market Cap. https:\/\/www.coingecko.com\/en\/global-charts. Accessed 29 May 2025"},{"key":"21_CR8","unstructured":"Chainalysis: 2025 Crypto Crime Report. https:\/\/go.chainalysis.com\/2025-Crypto-Crime-Report.html. Accessed 29 May 2025"},{"key":"21_CR9","unstructured":"The DAO Hack. https:\/\/www.gemini.com\/cryptopedia\/the-dao-hack-makerdao. Accessed 29 May 2025"},{"key":"21_CR10","unstructured":"How Did the Bybit Hack 2025 Happen. https:\/\/techpoint.africa\/guide\/bybit-hack-2025\/. Accessed 29 May 2025"},{"key":"21_CR11","unstructured":"SlowMist Hacked Database. https:\/\/hacked.slowmist.io\/. Accessed 29 May 2025"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 254\u2013269. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), pp. 653\u2013663. ACM (2018). https:\/\/doi.org\/10.1145\/3274694.3274743","DOI":"10.1145\/3274694.3274743"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 67\u201382. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243780","DOI":"10.1145\/3243734.3243780"},{"key":"21_CR15","unstructured":"Wang, W., et al.: Automated inference on financial security of ethereum smart contracts. In: Calandrino, J.A., Troncoso, C. (eds.) 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, pp. 3367\u20133383. USENIX Association (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/wang-wansen"},{"key":"21_CR16","unstructured":"Sun, T., He, N., Xiao, J., Yue, Y., Luo, X., Wang, H.: All your tokens are belong to us: demystifying address verification vulnerabilities in solidity smart contracts. In: Balzarotti, D., Xu, W. (eds.) 33rd USENIX Security Symposium (USENIX Security 2024), Philadelphia, PA, USA, pp. to appear. USENIX Association (2024). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/sun-tianle"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, L., et al.: SoK: decentralized finance (DeFi) attacks. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2444\u20132461. IEEE (2023). https:\/\/arxiv.org\/abs\/2208.13035","DOI":"10.1109\/SP46215.2023.10179435"},{"issue":"5","key":"21_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.3390\/a17050201","volume":"17","author":"C Cholevas","year":"2024","unstructured":"Cholevas, C., Angeli, E., Sereti, Z., Mavrikos, E., Tsekouras, G.E.: Anomaly detection in blockchain networks using unsupervised learning: a survey. Algorithms 17(5), 201 (2024). https:\/\/doi.org\/10.3390\/a17050201","journal-title":"Algorithms"},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Rai, G.S., Goyal, S.B., Chatterjee, P.: Anomaly detection in blockchain using machine learning. In: Chatterjee, P., Pamucar, D., Yazdani, M., Panchal, D. (eds.) Computational Intelligence for Engineering and Management Applications: Select Proceedings of CIEMA 2022, Lecture Notes in Electrical Engineering, vol. 984, pp. 487\u2013499. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-8493-8_37","DOI":"10.1007\/978-981-19-8493-8_37"},{"key":"21_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113318","volume":"150","author":"S Farrugia","year":"2020","unstructured":"Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the ethereum blockchain. Expert Syst. Appl. 150, 113318 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2020.113318","journal-title":"Expert Syst. Appl."},{"key":"21_CR21","doi-asserted-by":"publisher","unstructured":"Ibrahim, R.F., Elian, A.M., Ababneh, M.: Illicit account detection in the ethereum blockchain using machine learning. In: 2021 International Conference on Information Technology (ICIT), pp. 488\u2013493. IEEE (2021). https:\/\/doi.org\/10.1109\/ICIT52682.2021.9491653","DOI":"10.1109\/ICIT52682.2021.9491653"},{"issue":"1","key":"21_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-020-00338-3","volume":"6","author":"R Agarwal","year":"2020","unstructured":"Agarwal, R., Barve, S., Shukla, S.K.: Detecting malicious accounts in permissionless blockchains using temporal graph properties. Appl. Netw. Sci. 6(1), 1\u201330 (2020). https:\/\/doi.org\/10.1007\/s41109-020-00338-3","journal-title":"Appl. Netw. Sci."},{"issue":"2","key":"21_CR23","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TSMC.2020.3016821","volume":"52","author":"J Wu","year":"2022","unstructured":"Wu, J., et al.: Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Trans. Syst. Man Cybern. Syst. 52(2), 1156\u20131166 (2022). https:\/\/doi.org\/10.1109\/TSMC.2020.3016821","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"21_CR24","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017). http:\/\/arxiv.org\/abs\/1710.10903"},{"key":"21_CR25","unstructured":"Rug Pulln. https:\/\/coinmarketcap.com\/academy\/glossary\/rug-pull. Accessed 29 May 2025"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Lin, D., Wu, J., Yuan, Q., Zheng, Z.: Modeling and understanding ethereum transaction records via a complex network approach. IEEE Trans. Circuits Syst. II: Express Briefs 67(11), 2737\u20132741 (2020). https:\/\/doi.org\/10.1109\/TCSII.2020.2968376","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 701\u2013710. ACM (2014). https:\/\/doi.org\/10.1145\/2623330.2623732","DOI":"10.1145\/2623330.2623732"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Li, P., Xie, Y., Xu, X., Zhou, J., Xuan, Q.: Phishing fraud detection on ethereum using graph neural network. In: Dai, H.N., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds.) Blockchain and Trustworthy Systems. Communications in Computer and Information Science, vol. 1593, pp. 362\u2013375. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-8043-5_26","DOI":"10.1007\/978-981-19-8043-5_26"},{"issue":"3","key":"21_CR29","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSS.2022.3164719","volume":"10","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Liu, Z., Xu, J., Yan, W.: Heterogeneous network representation learning approach for ethereum identity identification. IEEE Trans. Comput. Soc. Syst. 10(3), 890\u2013899 (2022). https:\/\/doi.org\/10.1109\/TCSS.2022.3164719","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"21_CR30","doi-asserted-by":"publisher","unstructured":"Wu, C., et al.: TokenScout: early detection of ethereum scam tokens via temporal graph learning. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 956\u2013970. ACM (2024). https:\/\/doi.org\/10.1145\/3658644.3690234","DOI":"10.1145\/3658644.3690234"},{"key":"21_CR31","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"21_CR32","doi-asserted-by":"publisher","unstructured":"Chen, L., Peng, J., Liu, Y., Li, J., Xie, F., Zheng, Z.: Phishing scams detection in ethereum transaction network. ACM Trans. Internet Technol. 21(1), 10:1\u201310:16 (2021). https:\/\/doi.org\/10.1145\/3398071","DOI":"10.1145\/3398071"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:12Z","timestamp":1772196492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}