{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:53:52Z","timestamp":1775066032540,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873274"],"award-info":[{"award-number":["61873274"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, a surge of criminal activities with cross-cryptocurrency trades have emerged in Ethereum, the second-largest public blockchain platform. Most of the existing anomaly detection methods utilize the traditional machine learning with feature engineering or graph representation learning technique to capture the information in transaction network. However, these methods either ignore the timestamp information and the transaction flow direction information in transaction network or only consider single transaction network, the cross-cryptocurrency trading patterns in Ethereum are usually ignored. In this paper, we introduce a Multi-layer Temporal Transaction Anomaly Detection (MT<jats:inline-formula><jats:alternatives><jats:tex-math>$$^2$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:msup>\n                    <mml:mrow\/>\n                    <mml:mn>2<\/mml:mn>\n                  <\/mml:msup>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>AD) model in Ethereum network with graph neural network. Specifically, for a given Ethereum token transaction network, we first extract its initial features including the structure subgraph and edge\u2019s feature. Then, we model the temporal information in subgraph as a series of network snapshots according to the timestamp on each edge and time window. To capture the cross-cryptocurrency trading patterns, we combine the snapshots from multiple token transactions at a given timestamp, and we consider it as a new combined graph. We further use the graph convolution encoder with attention mechanism and pooling operation on this new graph to obtain the graph-level embedding, and we transform the anomaly detection on dynamic multi-layer Ethereum transaction networks as a graph classification task with these graph-level embeddings. MT<jats:inline-formula><jats:alternatives><jats:tex-math>$$^2$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:msup>\n                    <mml:mrow\/>\n                    <mml:mn>2<\/mml:mn>\n                  <\/mml:msup>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>AD can integrate the transaction structure feature, edge\u2019s feature and cross-cryptocurrency trading patterns into a framework to perform the anomaly detection with graph neural networks. Experiments on three real-world multi-layer transaction networks show that the proposed MT<jats:inline-formula><jats:alternatives><jats:tex-math>$$^2$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:msup>\n                    <mml:mrow\/>\n                    <mml:mn>2<\/mml:mn>\n                  <\/mml:msup>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>AD (0.8789 Precision, 0.9375 Recall, 0.4987 FbMacro and 0.9351 FbWeighted) can achieve the best performance on most evaluation metrics in comparison with some competing approaches, and the effectiveness in consideration of multiple tokens is also demonstrated.<\/jats:p>","DOI":"10.1007\/s40747-023-01126-z","type":"journal-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T08:02:27Z","timestamp":1690790547000},"page":"613-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["MT$$^2$$AD: multi-layer temporal transaction anomaly detection in ethereum networks with GNN"],"prefix":"10.1007","volume":"10","author":[{"given":"Beibei","family":"Han","sequence":"first","affiliation":[]},{"given":"Yingmei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Qingyong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Francesco Maria De","family":"Collibus","sequence":"additional","affiliation":[]},{"given":"Claudio J.","family":"Tessone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,31]]},"reference":[{"key":"1126_CR1","first-page":"1","volume":"15","author":"Z Wang","year":"2021","unstructured":"Wang Z, Jin H, Dai W, Choo K-KR, Zou D (2021) Ethereum smart contract security research: survey and future research opportunities. Front Comp Sci 15:1\u201318","journal-title":"Front Comp Sci"},{"issue":"3","key":"1126_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391195","volume":"53","author":"H Chen","year":"2020","unstructured":"Chen H, Pendleton M, Njilla L, Xu S (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv 53(3):1\u201343","journal-title":"ACM Comput Surv"},{"key":"1126_CR3","unstructured":"Xu J, Livshits B (2019) The anatomy of a cryptocurrency pump-and-dump scheme. In: Proceedings of the 28th USENIX conference on security symposium. SEC\u201919. USENIX Association, USA, pp 1609\u20131625"},{"key":"1126_CR4","doi-asserted-by":"crossref","unstructured":"Li S, Gou G, Liu C, Hou C, Li Z, Xiong G (2022) Ttagn: temporal transaction aggregation graph network for ethereum phishing scams detection. In: Proceedings of the ACM Web conference 2022. WWW \u201922. Association for Computing Machinery, New York, NY, USA, pp. 661\u2013669","DOI":"10.1145\/3485447.3512226"},{"issue":"1","key":"1126_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398071","volume":"21","author":"L Chen","year":"2020","unstructured":"Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020) Phishing scams detection in ethereum transaction network. ACM Trans Internet Technol 21(1):1\u201316","journal-title":"ACM Trans Internet Technol"},{"issue":"2","key":"1126_CR6","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TSMC.2020.3016821","volume":"52","author":"J Wu","year":"2022","unstructured":"Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2022) Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Trans Syst Man Cybernet Syst 52(2):1156\u20131166","journal-title":"IEEE Trans Syst Man Cybernet Syst"},{"key":"1126_CR7","unstructured":"Yousaf H, Kappos G, Meiklejohn S (2019) Tracing transactions across cryptocurrency ledgers. In: Proceedings of the 28th USENIX conference on security symposium. SEC\u201919. USENIX Association, USA, pp 837\u2013850"},{"key":"1126_CR8","doi-asserted-by":"publisher","first-page":"568","DOI":"10.3389\/fphy.2021.720708","volume":"9","author":"FM De Collibus","year":"2021","unstructured":"De Collibus FM, Partida A, Pi\u0161korec M, Tessone CJ (2021) Heterogeneous preferential attachment in key ethereum-based cryptoassets. Front Phys 9:568","journal-title":"Front Phys"},{"key":"1126_CR9","unstructured":"Kipf TN, Welling M (2017) Semi-supervised classification with graph convolutional networks. In: 5th International conference on learning representations, ICLR 2017, Toulon, France, April 24\u201326, 2017, conference track proceedings"},{"key":"1126_CR10","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/11786986_24","volume-title":"Automata, languages and programming","author":"V Vassilevska","year":"2006","unstructured":"Vassilevska V, Williams R, Yuster R (2006) Finding the smallest h-subgraph in real weighted graphs and related problems. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds) Automata, languages and programming. Springer, Berlin, pp 262\u2013273"},{"key":"1126_CR11","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1007\/978-3-030-86486-6_48","volume-title":"Machine learning and knowledge discovery in databases research track","author":"D Ofori-Boateng","year":"2021","unstructured":"Ofori-Boateng D, Dominguez IS, Akcora C, Kantarcioglu M, Gel YR (2021) Topological anomaly detection in dynamic multilayer blockchain networks. In: Oliver N, P\u00e9rez-Cruz F, Kramer S, Read J, Lozano JA (eds) Machine learning and knowledge discovery in databases research track. Springer, Cham, pp 788\u2013804"},{"key":"1126_CR12","unstructured":"Velickovic P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y (2018) Graph attention networks. In: 6th International conference on learning representations, ICLR"},{"key":"1126_CR13","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) Node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201916. Association for Computing Machinery, New York, NY, USA, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"1126_CR14","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"1126_CR15","doi-asserted-by":"crossref","unstructured":"Wei L, He Z, Zhao H, Yao Q (2023) Search to capture long-range dependency with stacking gnns for graph classification. In: Proceedings of the ACM Web conference 2023. WWW \u201923. Association for Computing Machinery, New York, NY, USA, pp 588\u2013598","DOI":"10.1145\/3543507.3583486"},{"key":"1126_CR16","unstructured":"Zhang B, Luo S, Wang L, He D (2023) Rethinking the expressive power of GNNs via graph biconnectivity. In: The Eleventh international conference on learning representations"},{"key":"1126_CR17","unstructured":"Chamberlain BP, Shirobokov S, Rossi E, Frasca F, Markovich T, Hammerla NY, Bronstein MM, Hansmire M (2023) Graph neural networks for link prediction with subgraph sketching. In: The eleventh international conference on learning representations"},{"issue":"3","key":"1126_CR18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0279604","volume":"18","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Huo H, Hou Z, Bu F (2023) A deep graph convolutional neural network architecture for graph classification. PLoS One 18(3):e0279604","journal-title":"PLoS One"},{"key":"1126_CR19","unstructured":"Hamilton WL, Ying R, Leskovec J (2017) Inductive representation learning on large graphs. In: Proceedings of the 31st international conference on neural information processing systems. NIPS\u201917. Curran Associates Inc., Red Hook, NY, USA, pp 1025\u20131035"},{"key":"1126_CR20","unstructured":"Ying C, Cai T, Luo S, Zheng S, Ke G, He D, Shen Y, Liu T-Y (2021) Do transformers really perform badly for graph representation? In: Thirty-fifth conference on neural information processing systems"},{"key":"1126_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPDS.2022.3151895","volume":"33","author":"J Chen","year":"2022","unstructured":"Chen J, Gao J, Chen Y, Oloulade BM, Lyu T, Li Z (2022) Auto-gnas: a parallel graph neural architecture search framework. IEEE Trans Parall Distrib Syst 33:1\u20131","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"1126_CR22","doi-asserted-by":"crossref","unstructured":"Hashemi F, Behrouz A, Hajidehi MR (2023) Cs-tgn: community search via temporal graph neural networks. arXiv preprint arXiv:2303.08964","DOI":"10.1145\/3543873.3587654"},{"issue":"1","key":"1126_CR23","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1093\/bioinformatics\/btac759","volume":"39","author":"M R\u00e9au","year":"2023","unstructured":"R\u00e9au M, Renaud N, Xue LC, Bonvin AM (2023) Deeprank-gnn: a graph neural network framework to learn patterns in protein-protein interfaces. Bioinformatics 39(1):759","journal-title":"Bioinformatics"},{"issue":"5","key":"1126_CR24","first-page":"2538","volume":"69","author":"Y Xia","year":"2022","unstructured":"Xia Y, Liu J, Wu J (2022) Phishing detection on ethereum via attributed ego-graph embedding. IEEE Trans Circuits Syst II Express Briefs 69(5):2538\u20132542","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"1126_CR25","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado G, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Proceedings of the 26th international conference on neural information processing systems\u2014volume 2. NIPS\u201913, Red Hook, NY, USA, pp 3111\u20133119"},{"key":"1126_CR26","doi-asserted-by":"crossref","unstructured":"Wang J, Chen P, Yu S, Xuan Q (2021) Tsgn: transaction subgraph networks for identifying ethereum phishing accounts. In: International conference on blockchain and trustworthy systems. Springer, pp 187\u2013200","DOI":"10.1007\/978-981-16-7993-3_15"},{"key":"1126_CR27","unstructured":"Ma X, Wu J, Xue S, Yang J, Zhou C, Sheng Q, Xiong H, Akoglu L (2021) A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans Knowl Data Eng:1\u20131"},{"key":"1126_CR28","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1613\/jair.1.13225","volume":"72","author":"G Nikolentzos","year":"2022","unstructured":"Nikolentzos G, Siglidis G, Vazirgiannis M (2022) Graph kernels: a survey. J Artif Intell Res 72:943\u20131027","journal-title":"J Artif Intell Res"},{"key":"1126_CR29","doi-asserted-by":"crossref","unstructured":"Rozemberczki B, Sarkar R (2020) Characteristic functions on graphs: birds of a feather, from statistical descriptors to parametric models. In: Proceedings of the 29th ACM international conference on information & knowledge management","DOI":"10.1145\/3340531.3411866"},{"key":"1126_CR30","unstructured":"Narayanan A, Chandramohan M, Venkatesan R, Chen L, Liu Y, Jaiswal S (2017) Graph2vec: learning distributed representations of graphs. In: 13th International workshop on mining and learning with graphs (MLGWorkshop 2017)"},{"key":"1126_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-36718-3_1","volume-title":"Neural information processing","author":"H Chen","year":"2019","unstructured":"Chen H, Koga H (2019) Gl2vec: graph embedding enriched by line graphs with edge features. In: Gedeon T, Wong KW, Lee M (eds) Neural information processing. Springer, Cham, pp 3\u201314"},{"key":"1126_CR32","unstructured":"Ying R, You J, Morris C, Ren X, Hamilton WL, Leskovec J (2018) Hierarchical graph representation learning with differentiable pooling. In: Proceedings of the 32nd international conference on neural information processing systems. NIPS\u201918. Curran Associates Inc., Red Hook, NY, USA, pp 4805\u20134815"},{"key":"1126_CR33","unstructured":"Lee J, Lee I, Kang J (2019) Self-attention graph pooling. In: Proceedings of the 36th international conference on machine learning, pp 3734\u20133743"},{"key":"1126_CR34","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1861\/1\/012045","volume":"1861","author":"H Zhao","year":"2021","unstructured":"Zhao H, Zhang C (2021) Gau-nets: graph attention u-nets for image classification. J Phys Conf Ser 1861:012045","journal-title":"J Phys Conf Ser"},{"issue":"9","key":"1126_CR35","first-page":"4948","volume":"44","author":"H Gao","year":"2022","unstructured":"Gao H, Ji S (2022) Graph u-nets. IEEE Trans Pattern Anal Mach Intell 44(9):4948\u20134960","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1126_CR36","first-page":"171","volume":"33","author":"W Zhaohui","year":"2022","unstructured":"Zhaohui W, Huawei S, Qi Cao XC (2022) Survey on graph classification. J Softw 33:171\u2013192","journal-title":"J Softw"},{"issue":"4","key":"1126_CR37","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U (2006) Complex networks: structure and dynamics. Phys Rep 424(4):175\u2013308","journal-title":"Phys Rep"},{"key":"1126_CR38","first-page":"2220","volume":"33","author":"D Mesquita","year":"2020","unstructured":"Mesquita D, Souza A, Kaski S (2020) Rethinking pooling in graph neural networks. Adv Neural Inf Process Syst 33:2220\u20132231","journal-title":"Adv Neural Inf Process Syst"},{"key":"1126_CR39","doi-asserted-by":"crossref","unstructured":"von\u00a0der Malsburg C (1986) Frank rosenblatt: Principles of neurodynamics: perceptrons and the theory of brain mechanisms. Brain Theory:245\u2013248","DOI":"10.1007\/978-3-642-70911-1_20"},{"key":"1126_CR40","unstructured":"Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: Proceedings of the 31st international conference on international conference on machine learning\u2014volume 32. ICML\u201914"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01126-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01126-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01126-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T22:22:46Z","timestamp":1707603766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01126-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1126"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01126-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,31]]},"assertion":[{"value":"29 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"No conflict of financial interests or personal relationships exit in the submission of this manuscript, and it is approved by all authors for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}