{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:17Z","timestamp":1775745497508,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_8","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:14:38Z","timestamp":1760555678000},"page":"123-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Smart Contract Ponzi Detection via\u00a0Contract Transaction Graph"],"prefix":"10.1007","author":[{"given":"Yafei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Taiyan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"11","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang, S., Ouyang, L., Yuan, Y., et al.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern.: Syst. 49(11), 2266\u20132277 (2019)","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"issue":"5","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s10796-022-10248-7","volume":"26","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Lu, Y., Bulysheva, L., et al.: Applications of blockchain in industry 4.0: a review. Inf. Syst. Front. 26(5), 1715\u20131729 (2024)","journal-title":"Inf. Syst. Front."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Yang, Y., Chen, Y., Liu, Z., et al.: Verifiable and redactable blockchain for internet of vehicles data sharing. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3483809"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"103699","DOI":"10.1016\/j.csi.2022.103699","volume":"84","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Li, Y., Chen, Q., et al.: Energy trading scheme based on consortium blockchain and game theory. Comput. Stand. Interfaces 84, 103699 (2023)","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"e2255","DOI":"10.1002\/nem.2255","volume":"34","author":"U Agarwal","year":"2024","unstructured":"Agarwal, U., Rishiwal, V., Tanwar, S., et al.: Blockchain and crypto forensics: Investigating crypto frauds. Int. J. Netw. Manage 34(2), e2255 (2024)","journal-title":"Int. J. Netw. Manage"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"302","DOI":"10.59573\/emsj.8(2).2024.25","volume":"8","author":"T Hidajat","year":"2024","unstructured":"Hidajat, T., Atiningsih, S., Khasanah, U.: Ponzi schemes and cryptocurrency: how do they work together? Eur. Mod. Stud. J. 8(2), 302\u2013307 (2024)","journal-title":"Eur. Mod. Stud. J."},{"key":"8_CR7","unstructured":"TRM L.Illicit Crypto Ecosystem Report. https:\/\/www.trmlabs.com\/resources\/reports. Accessed 15 Dec 2024"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1613\/jair.1.11192","volume":"61","author":"A Fern\u00e1ndez","year":"2018","unstructured":"Fern\u00e1ndez, A., Garcia, S., Herrera, F., et al.: SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J. Artif. Intell. Res. 61, 863\u2013905 (2018)","journal-title":"J. Artif. Intell. Res."},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.dcan.2022.04.007","volume":"10","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Yang, X., Li, T., et al.: A blockchain-empowered authentication scheme for worm detection in wireless sensor network. Digit. Commun. Netw. 10(2), 265\u2013272 (2024)","journal-title":"Digit. Commun. Netw."},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"102587","DOI":"10.1016\/j.ipm.2021.102587","volume":"58","author":"S Fan","year":"2021","unstructured":"Fan, S., Fu, S., Xu, H., et al.: Al-SPSD: anti-leakage smart Ponzi schemes detection in blockchain. Inf. Process. Manage. 58(4), 102587 (2021)","journal-title":"Inf. Process. Manage."},{"issue":"5","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571847","volume":"32","author":"Z Zheng","year":"2023","unstructured":"Zheng, Z., Chen, W., Zhong, Z., et al.: Securing the ethereum from smart Ponzi schemes: identification using static features. ACM Trans. Softw. Eng. Methodol. 32(5), 1\u201328 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1109\/TCSS.2021.3088145","volume":"9","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Yu, W., Li, Z., et al.: Detecting ethereum Ponzi schemes based on improved LightGBM algorithm. IEEE Trans. Comput. Soc. Syst. 9(2), 624\u2013637 (2021)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Cui, B., Wang, G.: Ponzi scheme detection based on CNN and BiGRU combined with attention mechanism. In: 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1852\u20131857. IEEE (2024)","DOI":"10.1109\/CSCWD61410.2024.10580692"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"18403","DOI":"10.1038\/s41598-023-45275-0","volume":"13","author":"IJ Onu","year":"2023","unstructured":"Onu, I.J., Omolara, A.E., Alawida, M., Abiodun, O., Alabdultif, A.: Detection of Ponzi scheme on Ethereum using machine learning algorithms. Sci. Rep. 13(1), 18403 (2023)","journal-title":"Sci. Rep."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Dey, I., Pratap, V.: A comparative study of SMOTE, borderline-SMOTE, and ADASYN oversampling techniques using different classifiers. In: 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), pp. 294\u2013302. IEEE (2023)","DOI":"10.1109\/ICSMDI57622.2023.00060"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Li, D., Cheng, M., Yang, Y., et al.: A fast two-stage black-box deep learning network attacking method based on cross-correlation. Comput. Mater. Continua 64(1) (2020)","DOI":"10.32604\/cmc.2020.09800"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00466-023-02434-4","volume":"74","author":"L Herrmann","year":"2024","unstructured":"Herrmann, L., Kollmannsberger, S.: Deep learning in computational mechanics: a review. Comput. Mech. 74(2), 281\u2013331 (2024)","journal-title":"Comput. Mech."},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"8342104","DOI":"10.1155\/2023\/8342104","volume":"2023","author":"UA Bhatti","year":"2023","unstructured":"Bhatti, U.A., Tang, H., Wu, G., et al.: Deep learning with graph convolutional networks: an overview and latest applications in computational intelligence. Int. J. Intell. Syst. 2023(1), 8342104 (2023)","journal-title":"Int. J. Intell. Syst."},{"issue":"6","key":"8_CR19","doi-asserted-by":"publisher","first-page":"7933","DOI":"10.1109\/TPAMI.2022.3225073","volume":"45","author":"C Shen","year":"2022","unstructured":"Shen, C., Wang, Q., Priebe, C.E.: One-hot graph encoder embedding. IEEE Trans. Pattern Anal. Mach. Intell. 45(6), 7933\u20137938 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on ethereum: identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259\u2013277 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"102217","DOI":"10.1016\/j.inffus.2023.102217","volume":"105","author":"K Bayoudh","year":"2024","unstructured":"Bayoudh, K.: A survey of multimodal hybrid deep learning for computer vision: architectures, applications, trends, and challenges. Inf. Fusion 105, 102217 (2024)","journal-title":"Inf. Fusion"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"37575","DOI":"10.1109\/ACCESS.2019.2905769","volume":"7","author":"W Chen","year":"2019","unstructured":"Chen, W., Zheng, Z., Ngai, E.C.H., et al.: Exploiting blockchain data to detect smart Ponzi schemes on ethereum. IEEE Access 7, 37575\u201337586 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:14:41Z","timestamp":1760555681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}