{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:41:58Z","timestamp":1761000118112,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535422"},{"type":"electronic","value":"9789819535439"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3543-9_19","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T11:03:35Z","timestamp":1760871815000},"page":"347-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EAGLE: Ensemble Adaptive Graph Learning for\u00a0Enhanced Ethereum Fraud Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2316-0664","authenticated-orcid":false,"given":"Befoum Stephane","family":"Richard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7014-6417","authenticated-orcid":false,"given":"Jianbin","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2245-2588","authenticated-orcid":false,"given":"Qi","family":"Xia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0259-8135","authenticated-orcid":false,"given":"Kombou","family":"Victor","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9381-941X","authenticated-orcid":false,"given":"Eyezo\u2019o Benjamin","family":"Fabien","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2084-8912","authenticated-orcid":false,"given":"Mulenga Mukupa","family":"Rossini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-64322-8_1","volume-title":"Financial Cryptography and Data Security","author":"K Qin","year":"2021","unstructured":"Qin, K., Zhou, L., Livshits, B., Gervais, A.: Attacking the DeFi ecosystem with flash loans for fun and profit. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12674, pp. 3\u201332. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64322-8_1"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Futur. Gener. Comput. Syst. 107, 841\u2013853 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-51280-4_11","volume-title":"Financial Cryptography and Data Security","author":"A Moin","year":"2020","unstructured":"Moin, A., Sekniqi, K., Sirer, E.G.: SoK: a classification framework for stablecoin designs. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 174\u2013197. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_11"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"4147","DOI":"10.1109\/TDSC.2023.3346888","volume":"21","author":"S Wu","year":"2024","unstructured":"Wu, S., et al.: DeFiRanger: detecting DeFi price manipulation attacks. IEEE Trans. Dependable Secure Comput. 21(4), 4147\u20134161 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCSS.2022.3228122","volume":"11","author":"B Wang","year":"2024","unstructured":"Wang, B., et al.: DeFiScanner: spotting DeFi attacks exploiting logic vulnerabilities on blockchain. IEEE Trans. Comput. Soc. Syst. 11(2), 1577\u20131588 (2024)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIFS.2023.3234895","volume":"18","author":"N Ivanov","year":"2023","unstructured":"Ivanov, N., Yan, Q., Kompalli, A.: TxT: real-time transaction encapsulation for ethereum smart contracts. IEEE Trans. Inf. Forensics Secur. 18, 1141\u20131155 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1109\/TIFS.2024.3359000","volume":"19","author":"J Liu","year":"2024","unstructured":"Liu, J., Chen, J., Wu, J., Wu, Z., Fang, J., Zheng, Z.: Fishing for fraudsters: uncovering ethereum phishing gangs with blockchain data. IEEE Trans. Inf. Forensics Secur. 19, 3038\u20133050 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1186\/s42400-024-00237-5","volume":"7","author":"C Yan","year":"2024","unstructured":"Yan, C., Han, X., Zhu, Y., Du, D., Lu, Z., Liu, Y.: Phishing behavior detection on different blockchains via adversarial domain adaptation. Cybersecurity 7(1), 45 (2024)","journal-title":"Cybersecurity"},{"issue":"6","key":"19_CR9","doi-asserted-by":"publisher","first-page":"3727","DOI":"10.1109\/TSC.2024.3411449","volume":"17","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Sui, H., Sun, X., Ge, C., Zhou, L., Susilo, W.: GrabPhisher: phishing scams detection in ethereum via temporally evolving GNNs. IEEE Trans. Serv. Comput. 17(6), 3727\u20133741 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"4326","DOI":"10.1109\/TCSS.2023.3349071","volume":"11","author":"H Huang","year":"2024","unstructured":"Huang, H., et al.: PEAE-GNN: phishing detection on ethereum via augmentation ego-graph based on graph neural network. IEEE Trans. Comput. Soc. Syst. 11(3), 4326\u20134339 (2024)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1109\/TNSE.2024.3355089","volume":"11","author":"H Sun","year":"2024","unstructured":"Sun, H., Liu, Z., Wang, S., Wang, H.: Adaptive attention-based graph representation learning to detect phishing accounts on the ethereum blockchain. IEEE Trans. Netw. Sci. Eng. 11(3), 2963\u20132975 (2024)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TSMC.2020.3016821","volume":"52","author":"J Wu","year":"2022","unstructured":"Wu, J., et al.: Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Trans. Syst. Man Cybern. Syst. 52(2), 1156\u20131166 (2022)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"19_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100344","volume":"9","author":"G Tripathi","year":"2023","unstructured":"Tripathi, G., Ahad, M.A., Casalino, G.: A comprehensive review of blockchain technology: underlying principles and historical background with future challenges. Decis. Anal. J. 9, 100344 (2023)","journal-title":"Decis. Anal. J."},{"issue":"6","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1002\/for.2971","volume":"42","author":"J Hao","year":"2023","unstructured":"Hao, J., Feng, Q.Q., Li, J., Sun, X.: A bi-level ensemble learning approach to complex time series forecasting: taking exchange rates as an example. J. Forecast. 42(6), 1385\u20131406 (2023)","journal-title":"J. Forecast."},{"issue":"2","key":"19_CR15","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/TIA.2022.3225516","volume":"59","author":"H Hou","year":"2023","unstructured":"Hou, H., et al.: Load forecasting combining phase space reconstruction and stacking ensemble learning. IEEE Trans. Ind. Appl. 59(2), 2296\u20132304 (2023)","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"5","key":"19_CR16","doi-asserted-by":"publisher","first-page":"2613","DOI":"10.1109\/TCSS.2022.3182375","volume":"10","author":"R Chiong","year":"2023","unstructured":"Chiong, R., Fan, Z., Hu, Z., Dhakal, S.: A novel ensemble learning approach for stock market prediction based on sentiment analysis and the sliding window method. IEEE Trans. Comput. Soc. Syst. 10(5), 2613\u20132623 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"5","key":"19_CR17","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/TAI.2023.3319308","volume":"5","author":"A Fazla","year":"2024","unstructured":"Fazla, A., Aydin, M.E., Kozat, S.S.: Time-aware and context-sensitive ensemble learning for sequential data. IEEE Trans. Artif. Intell. 5(5), 2264\u20132278 (2024)","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"10","key":"19_CR18","doi-asserted-by":"publisher","first-page":"10151","DOI":"10.1109\/TKDE.2023.3265271","volume":"35","author":"T Zheng","year":"2023","unstructured":"Zheng, T., et al.: Temporal aggregation and propagation graph neural networks for dynamic representation. IEEE Trans. Knowl. Data Eng. 35(10), 10151\u201310165 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"12","key":"19_CR19","doi-asserted-by":"publisher","first-page":"10466","DOI":"10.1109\/TPAMI.2024.3443141","volume":"46","author":"M Jin","year":"2024","unstructured":"Jin, M., et al.: A survey on graph neural networks for time series: forecasting, classification, imputation, and anomaly detection. IEEE Trans. Pattern Anal. Mach. Intell. 46(12), 10466\u201310485 (2024)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1109\/TPAMI.2023.3327404","volume":"46","author":"Y Qi","year":"2024","unstructured":"Qi, Y., Wu, J., Xu, H., Guizani, M.: Blockchain data mining with graph learning: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 46(2), 729\u2013748 (2024)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"19_CR21","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TSMC.2023.3329520","volume":"54","author":"D Lin","year":"2024","unstructured":"Lin, D., Wu, J., Huang, T., Lin, K., Zheng, Z.: Who is who on ethereum? Account labeling using heterophilic graph convolutional network. IEEE Trans. Syst. Man Cybern. Syst. 54(3), 1541\u20131553 (2024)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"19_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122156","volume":"240","author":"S Motie","year":"2024","unstructured":"Motie, S., Raahemi, B.: Financial fraud detection using graph neural networks: a systematic review. Expert Syst. Appl. 240, 122156 (2024)","journal-title":"Expert Syst. Appl."},{"key":"19_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102335","volume":"121","author":"B Wu","year":"2024","unstructured":"Wu, B., Chao, K., Li, Y.: Heterogeneous graph neural networks for fraud detection and explanation in supply chain finance. Inf. Syst. 121, 102335 (2024)","journal-title":"Inf. Syst."},{"issue":"4","key":"19_CR24","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1109\/TNSE.2024.3384499","volume":"11","author":"C Jin","year":"2024","unstructured":"Jin, C., Zhou, J., Jin, J., Wu, J., Xuan, Q.: Time-aware metapath feature augmentation for ponzi detection in ethereum. IEEE Trans. Netw. Sci. Eng. 11(4), 3747\u20133758 (2024)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should i trust you?\u201d: explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, pp. 1135\u20131144. Association for Computing Machinery (2016)","DOI":"10.1145\/2939672.2939778"},{"issue":"2","key":"19_CR26","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: automated vulnerability detection models for ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. 8(2), 1133\u20131144 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Singh, G., Meenakshi, Srivastava, V., Dhondiyal, S.A.: Blockchain-enhanced adversarial machine learning for fraud detection and claims automation in the insurance sector. In: 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI), pp. 80\u201386 (2024)","DOI":"10.1109\/ICDICI62993.2024.10810927"},{"issue":"2","key":"19_CR28","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TDSC.2022.3152937","volume":"20","author":"W Fan","year":"2023","unstructured":"Fan, W., et al.: Lightweight and identifier-oblivious engine for cryptocurrency networking anomaly detection. IEEE Trans. Dependable Secure Comput. 20(2), 1302\u20131318 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"19_CR29","first-page":"1968","volume":"34","author":"W Wu","year":"2023","unstructured":"Wu, W., Shi, X., He, L., Jin, H.: TurboMGNN: improving concurrent GNN training on GPU with fine-grained kernel fusion. IEEE Trans. Parallel Distrib. Syst. 34(6), 1968\u20131981 (2023)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"19_CR30","unstructured":"Shamsi, K., Gel, Y.R., Kantarcioglu, M., Akcora, C.G.: Chartalist: labeled graph datasets for UTXO and account-based blockchains. In: Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, pp. 1\u201314 (2022)"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Mounnan, O., Manad, O., Boubchir, L., El Mouatasim, A., Daachi, B.: A review on deep anomaly detection in blockchain. Blockchain Res. Appl. 5(4), 100227 (2024)","DOI":"10.1016\/j.bcra.2024.100227"},{"key":"19_CR32","doi-asserted-by":"publisher","unstructured":"Li, D., Zhang, K., Li, S., Du, G., Zhang, S.: A Geth-based detection system for ERC20 honeypot contract in Ethereum. Discov. Comput. 28(1), 35 (2025). https:\/\/doi.org\/10.1007\/s10791-025-09546-w","DOI":"10.1007\/s10791-025-09546-w"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-981-96-4836-8_10","volume-title":"Ubiquitous Security","author":"H Chen","year":"2025","unstructured":"Chen, H., Peng, T., Zhang, Y., Xie, Z., You, W.: Ghaos: phishing detection on ethereum using opcode sequences with GraphSAGE-attention. In: Wang, G., Yan, Z., Li, K.-C., Wu, Y. (eds.) Ubiquitous Security, pp. 133\u2013144. Springer, Singapore (2025)"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-031-85856-7_37","volume-title":"Data Science","author":"K Ramdass","year":"2025","unstructured":"Ramdass, K., Chano, M., Rahouti, M., Hayajneh, T.: Comprehensive analysis and detection of fraud schemes on the ethereum blockchain using machine learning. In: Stahlbock, R., Arabnia, H.R. (eds.) Data Science, pp. 508\u2013524. Springer, Cham (2025)"},{"issue":"2","key":"19_CR35","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10515-024-00459-4","volume":"31","author":"J Chen","year":"2024","unstructured":"Chen, J., et al.: Angels or demons: investigating and detecting decentralized financial traps on ethereum smart contracts. Autom. Softw. Eng. 31(2), 63 (2024)","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"19_CR36","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s10207-023-00752-5","volume":"23","author":"VK Jain","year":"2024","unstructured":"Jain, V.K., Tripathi, M.: An integrated deep learning model for Ethereum smart contract vulnerability detection. Int. J. Inf. Secur. 23(1), 557\u2013575 (2024)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3543-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:02:45Z","timestamp":1760997765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3543-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535422","9789819535439"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3543-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}