{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:31:45Z","timestamp":1770226305930,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72025104"],"award-info":[{"award-number":["72025104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JBK2103009"],"award-info":[{"award-number":["JBK2103009"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Financial Innovation Center, SWUFE"},{"name":"SWUFE Jiaozi Institute of Fintech Innovation"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00500-022-07661-0","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T12:06:07Z","timestamp":1670241967000},"page":"3707-3719","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Early-stage phishing detection on the Ethereum transaction network"],"prefix":"10.1007","volume":"27","author":[{"given":"Yun","family":"Wan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3412-5816","authenticated-orcid":false,"given":"Feng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Dapeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"issue":"4","key":"7661_CR1","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.elerap.2012.02.005","volume":"11","author":"W-H Chang","year":"2012","unstructured":"Chang W-H, Chang J-S (2012) An effective early fraud detection method for online auctions. Electron Commer R A 11(4):346\u2013360","journal-title":"Electron Commer R A"},{"issue":"1","key":"7661_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398071","volume":"21","author":"L Chen","year":"2020","unstructured":"Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020a) Phishing scams detection in ethereum transaction network. ACM Trans Internet Techn 21(1):1\u201316","journal-title":"ACM Trans Internet Techn"},{"issue":"2","key":"7661_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3381036","volume":"20","author":"T Chen","year":"2020","unstructured":"Chen T, Li Z, Zhu Y, Chen J, Luo X, Lui JC-S, Lin X, Zhang X (2020b) Understanding ethereum via graph analysis. ACM Trans Internet Techn 20(2):1\u201332. https:\/\/doi.org\/10.1145\/3381036","journal-title":"ACM Trans Internet Techn"},{"key":"7661_CR4","doi-asserted-by":"crossref","unstructured":"Chen W, Guo X, Chen Z, Zheng Z, Lu Y (2020c) Phishing scam detection on ethereum towards financial security for blochchain ecosystem. In: Proceedings of the twenty-ninth international joint conference on artificial intelligence","DOI":"10.24963\/ijcai.2020\/621"},{"key":"7661_CR5","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330","journal-title":"J Mach Learn Res"},{"key":"7661_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1002\/cpe.5493","volume":"32","author":"S Ferretti","year":"2019","unstructured":"Ferretti S, D\u2019Angelo G (2019) On the Ethereum blockchain structure: A complex networks theory perspective. Concurr Comp-Pract E 32:12. https:\/\/doi.org\/10.1002\/cpe.5493","journal-title":"Concurr Comp-Pract E"},{"issue":"5","key":"7661_CR7","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.3390\/s20051452","volume":"20","author":"M Gao","year":"2020","unstructured":"Gao M, Ma L, Liu H, Zhang Z, Ning Z, Xu J (2020) Malicious network traffic detection based on deep neural networks and association analysis. Sensors-Basel 20(5):1452","journal-title":"Sensors-Basel"},{"key":"7661_CR8","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. KDD","DOI":"10.1145\/2939672.2939754"},{"key":"7661_CR9","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ins.2019.04.013","volume":"492","author":"D Guo","year":"2019","unstructured":"Guo D, Dong J, Wang K (2019) Graph structure and statistical properties of Ethereum transaction relationships. Inform Sci 492:58\u201371. https:\/\/doi.org\/10.1016\/j.ins.2019.04.013","journal-title":"Inform Sci"},{"issue":"1","key":"7661_CR10","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1):389\u2013422","journal-title":"Mach Learn"},{"issue":"15","key":"7661_CR11","doi-asserted-by":"publisher","first-page":"11861","DOI":"10.1016\/j.eswa.2012.02.020","volume":"39","author":"W Han","year":"2012","unstructured":"Han W, Cao Y, Bertino E, Yong J (2012) Using automated individual white-list to protect web digital identities. Expert Syst Appl 39(15):11861\u201311869","journal-title":"Expert Syst Appl"},{"issue":"6","key":"7661_CR12","doi-asserted-by":"publisher","first-page":"1783","DOI":"10.1007\/s12652-017-0616-z","volume":"9","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018) Two-level authentication approach to protect from phishing attacks in real time. J Amb Intel Hum Comp 9(6):1783\u20131796","journal-title":"J Amb Intel Hum Comp"},{"issue":"4","key":"7661_CR13","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/surv.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091\u20132121. https:\/\/doi.org\/10.1109\/surv.2013.032213.00009","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"7661_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10462-007-9052-3","volume":"26","author":"SB Kotsiantis","year":"2006","unstructured":"Kotsiantis SB, Zaharakis ID, Pintelas PE (2006) Machine learning: a review of classification and combining techniques. Artif Intell Rev 26(3):159\u2013190","journal-title":"Artif Intell Rev"},{"issue":"1","key":"7661_CR15","first-page":"119","volume":"95","author":"KR Lakhani","year":"2017","unstructured":"Lakhani KR, Iansiti M (2017) The truth about blockchain. Harvard Bus Rev 95(1):119\u2013127","journal-title":"Harvard Bus Rev"},{"key":"7661_CR16","doi-asserted-by":"crossref","unstructured":"Lee XT, Khan A, Sen Gupta S, Ong YH, Liu X (2020) Measurements, analyses, and insights on the entire ethereum blockchain network. In: Proceedings of the web conference","DOI":"10.1145\/3366423.3380103"},{"key":"7661_CR17","doi-asserted-by":"crossref","unstructured":"Li Y, Akcora UIC, Smirnova E, Gel YR, Kantarcioglu M (2020) Dissecting ethereum blockchain analytics what we learn from topology and geometry of the ethereum graph. In: Proceedings of the 2020 SIAM international conference on data mining","DOI":"10.1137\/1.9781611976236.59"},{"issue":"11","key":"7661_CR18","doi-asserted-by":"publisher","first-page":"2737","DOI":"10.1109\/tcsii.2020.2968376","volume":"67","author":"D Lin","year":"2020","unstructured":"Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding Ethereum transaction records via a complex network approach. IEEE Trans Circuits-II 67(11):2737\u20132741. https:\/\/doi.org\/10.1109\/tcsii.2020.2968376","journal-title":"IEEE Trans Circuits-II"},{"key":"7661_CR19","unstructured":"Narayanan A, Chandramohan M, Chen L, Liu Y, Saminathan S (2016) subgraph2vec: learning distributed representations of rooted sub-graphs from large graphs. arXiv:1606.08928"},{"issue":"1","key":"7661_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.3390\/s20010147","volume":"20","author":"B Podgorelec","year":"2019","unstructured":"Podgorelec B, Turkanovi\u0107 M, Karakati\u010d S (2019) A machine learning-based method for automated blockchain transaction signing including personalized anomaly detection. Sensors-Basel 20(1):147","journal-title":"Sensors-Basel"},{"key":"7661_CR21","doi-asserted-by":"crossref","unstructured":"Ramzan Z (2010) Phishing attacks and countermeasures. In: Handbook of information and communication security, pp 433\u2013448","DOI":"10.1007\/978-3-642-04117-4_23"},{"key":"7661_CR22","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz OK, Buber E, Demir O, Diri B (2019) Machine learning based phishing detection from URLs. Expert Syst Appl 117:345\u2013357","journal-title":"Expert Syst Appl"},{"key":"7661_CR23","doi-asserted-by":"crossref","unstructured":"Sharifi M, Siadati S H (2008) A phishing sites blacklist generator. In: 2008 IEEE\/ACS international conference on computer systems and applications","DOI":"10.1109\/AICCSA.2008.4493625"},{"issue":"5","key":"7661_CR24","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.3390\/s21051594","volume":"21","author":"B Stojanovi\u0107","year":"2021","unstructured":"Stojanovi\u0107 B, Bo\u017ei\u0107 J, Hofer-Schmitz K, Nahrgang K, Weber A, Badii A, Sundaram M, Jordan E, Runevic J (2021) Follow the trail: machine learning for fraud detection in Fintech applications. Sensors-Basel 21(5):1594","journal-title":"Sensors-Basel"},{"key":"7661_CR25","unstructured":"Van der Merwe A, Loock M, Dabrowski M (2005) Characteristics and responsibilities involved in a phishing attack. In: Proceedings of the 4th international symposium on information and communication technologies"},{"key":"7661_CR26","doi-asserted-by":"crossref","unstructured":"Victor F, L\u00fcders B K (2019) Measuring ethereum-based ERC20 token networks. In: International conference on financial cryptography and data security","DOI":"10.1007\/978-3-030-32101-7_8"},{"key":"7661_CR27","doi-asserted-by":"crossref","unstructured":"Wang J, Chen P, Yu S, Xuan Q (2021) TSGN transaction subgraph networks for identifying Ethereum phishing accounts. arXiv:2104.08767","DOI":"10.1007\/978-981-16-7993-3_15"},{"issue":"6684","key":"7661_CR28","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019networks. Nature 393(6684):440\u2013442","journal-title":"Nature"},{"key":"7661_CR29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biometrics 1:80\u201383","journal-title":"Biometrics"},{"issue":"1","key":"7661_CR30","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3390\/jmse10010112","volume":"10","author":"K Wolsing","year":"2022","unstructured":"Wolsing K, Roepert L, Bauer J, Wehrle K (2022) Anomaly detection in maritime ais tracks: a review of recent approaches. J Mar Sci Eng 10(1):112","journal-title":"J Mar Sci Eng"},{"key":"7661_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2020.3016821","author":"J Wu","year":"2020","unstructured":"Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? Phishing scam detection on Ethereum via network embedding. IEEE Trans Syst Man Cybern Syst A. https:\/\/doi.org\/10.1109\/tsmc.2020.3016821","journal-title":"IEEE Trans Syst Man Cybern Syst A"},{"key":"7661_CR32","doi-asserted-by":"crossref","unstructured":"Yuan Q, Huang B, Zhang J, Wu J, Zhang H, Zhang X (2020) Detecting phishing scams on ethereum based on transaction records. In: IEEE international symposium on circuits and systems (ISCAS)","DOI":"10.1109\/ISCAS45731.2020.9180815"},{"key":"7661_CR33","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/OJCS.2020.2990458","volume":"1","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zheng Z, Wu J, Dai H-N (2020) Xblock-ETH: Extracting and exploring blockchain data from Ethereum. IEEE Open J Comp Soc 1:95\u2013106","journal-title":"IEEE Open J Comp Soc"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07661-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07661-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07661-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T10:28:15Z","timestamp":1678789695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07661-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":33,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["7661"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07661-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"3 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}