{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:41:17Z","timestamp":1769578877991,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609567","type":"print"},{"value":"9789819609574","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_17","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:33:54Z","timestamp":1738272834000},"page":"277-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving the\u00a0Accuracy of\u00a0Transaction-Based Ponzi Detection on\u00a0Ethereum"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3854-3820","authenticated-orcid":false,"given":"Phuong Duy","family":"Huynh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2276-017X","authenticated-orcid":false,"given":"Son Hoang","family":"Dau","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0346-1526","authenticated-orcid":false,"given":"Xiaodong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7821-295X","authenticated-orcid":false,"given":"Phuc","family":"Luong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5861-2873","authenticated-orcid":false,"given":"Emanuele","family":"Viterbo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"How blockchain technologies impact your business model: Bus. Horiz. 62(3), 295\u2013306 (2019). https:\/\/doi.org\/10.1016\/j.bushor.2019.01.009","DOI":"10.1016\/j.bushor.2019.01.009"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on ethereum: identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259\u2013277 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR3","unstructured":"BiAn: a source code level code obfuscation tool developed for solidity smart contract (2022). https:\/\/github.com\/xf97\/BiAn"},{"key":"17_CR4","unstructured":"Chainalysis: Crypto Crime Series: Decoding Ethereum Scams (2019). https:\/\/blog.chainalysis.com\/reports\/ethereum-scams\/"},{"key":"17_CR5","unstructured":"Chainalysis: The Chainalysis 2021 Crypto Crime Report (2021). https:\/\/go.chainalysis.com\/2021-Crypto-Crime-Report.html"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on ethereum: towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp. 1409\u20131418 (2018)","DOI":"10.1145\/3178876.3186046"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"37575","DOI":"10.1109\/ACCESS.2019.2905769","volume":"7","author":"W Chen","year":"2019","unstructured":"Chen, W., Zheng, Z., Ngai, E.C.H., Zheng, P., Zhou, Y.: Exploiting blockchain data to detect smart Ponzi schemes on ethereum. IEEE Access 7, 37575\u201337586 (2019)","journal-title":"IEEE Access"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., et al.: SADPonzi: detecting and characterizing Ponzi schemes in Ethereum smart contracts. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 5, no. 2, pp. 1\u201330 (2021)","DOI":"10.1145\/3460093"},{"key":"17_CR10","unstructured":"Coinmarketcap: Market Cap (2023). https:\/\/coinmarketcap.com\/charts\/"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"17_CR12","unstructured":"Etherscan: Transaction fee (2022). https:\/\/etherscan.io\/chart\/avg-txfee-usd"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Fan, S., Fu, S., Xu, H., Zhu, C.: Expose your mask: smart Ponzi schemes detection on blockchain. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20137. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9207143"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Han, H., Wang, W.Y., Mao, B.H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: International Conference on Intelligent Computing, pp. 878\u2013887. Springer (2005)","DOI":"10.1007\/11538059_91"},{"issue":"4","key":"17_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Appl."},{"key":"17_CR16","unstructured":"Huynh, P.D., Dau, S.H., Li, X., Luong, P., Viterbo, E.: Improving the accuracy of transaction-based ponzi detection on ethereum. arXiv:2308.16391 (2023)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Ibba, G., Pierro, G.A., Di\u00a0Francesco, M.: Evaluating machine-learning techniques for detecting smart Ponzi schemes. In: 2021 IEEE\/ACM 4th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 34\u201340. IEEE (2021)","DOI":"10.1109\/WETSEB52558.2021.00012"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Jung, E., Le\u00a0Tilly, M., Gehani, A., Ge, Y.: Data mining-based ethereum fraud detection. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 266\u2013273. IEEE (2019)","DOI":"10.1109\/Blockchain.2019.00042"},{"key":"17_CR19","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Sun, W., Xu, G., Yang, Z., Chen, Z.: Early detection of smart Ponzi scheme contracts based on behavior forest similarity. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security, pp. 297\u2013309. IEEE (2020)","DOI":"10.1109\/QRS51102.2020.00047"},{"issue":"6","key":"17_CR21","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik, V., Liaw, A., Tong, C., Culberson, J.C., Sheridan, R.P., Feuston, B.P.: Random forest: a classification and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 43(6), 1947\u20131958 (2003)","journal-title":"J. Chem. Inf. Comput. Sci."},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"107312","DOI":"10.1016\/j.knosys.2021.107312","volume":"228","author":"L Wang","year":"2021","unstructured":"Wang, L., Cheng, H., Zheng, Z., Yang, A., Zhu, X.: Ponzi scheme detection via oversampling-based long short-term memory for smart contracts. Knowl.-Based Syst. 228, 107312 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"17_CR23","unstructured":"XBlock: XBlock: Ethereum On-chain Data (2022). https:\/\/xblock.pro\/xblock-eth.html"},{"key":"17_CR24","unstructured":"Zhou, Y., Kumar, D., Bakshi, S., Mason, J., Miller, A., Bailey, M.: Erays: reverse engineering ethereum\u2019s opaque smart contracts. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1371\u20131385 (2018)"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:04Z","timestamp":1738272844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}