{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:31:15Z","timestamp":1776443475944,"version":"3.51.2"},"reference-count":72,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493255","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-14","source":"Crossref","is-referenced-by-count":33,"title":["Don\u2019t Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams"],"prefix":"10.1109","author":[{"given":"Pengcheng","family":"Xia","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"The University of Queensland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gang","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuanzhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref72","article-title":"DAppTotal","year":"2020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"ref70","article-title":"Koodous","year":"2020"},{"key":"ref39","article-title":"Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic","author":"lallie","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-76550-z"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2020.4683"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1148\/radiol.2020200490"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2020.2565"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169433"},{"key":"ref37","article-title":"Covid-19 screening on chest x-ray images using deep learning based anomaly detection","author":"zhang","year":"2020"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.31234\/osf.io\/s5jkh","article-title":"Sociological and psychological insights behind predicted changes as a result of covid-19","author":"nelson","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0956797620939054"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2020.4783"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.045"},{"key":"ref62","article-title":"CryptoScamDB","year":"2020"},{"key":"ref61","article-title":"Ponzi Scheme","year":"2020"},{"key":"ref63","article-title":"StopScamFraud","year":"2020"},{"key":"ref28","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","author":"torres","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref64","article-title":"Etherscan","year":"2020"},{"key":"ref27","article-title":"An examination of the cryptocurrency pump and dump ecosystem","author":"hamrick","year":"2018","journal-title":"Available at SSRN 3303365"},{"key":"ref65","article-title":"URLScan","year":"2020"},{"key":"ref66","first-page":"191","article-title":"The long &#x201C;taile&#x201D; of typosquatting domain names","author":"szurdi","year":"2014","journal-title":"Proceedings of the 23rd USENIX Conference on Security Symposium ser SEC&#x2019;14"},{"key":"ref29","article-title":"Who are the phishers? phishing scam detection on ethereum via network embedding","author":"wu","year":"2019"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"ref68","article-title":"RiskIQ","year":"2020"},{"key":"ref2","article-title":"Threat Intel &#x2014; Cyber Attacks Leveraging the COVID-19\/CoronaVirus Pandemic","year":"2020"},{"key":"ref69","article-title":"VirusTotal","year":"2020"},{"key":"ref1","article-title":"Facing down the myriad threats tied to COVID-19","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254420"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3320884"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921087"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmoneco.2017.12.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3072298"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3303365"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737364"},{"key":"ref50","article-title":"Consumer Information Blog","year":"2020"},{"key":"ref51","article-title":"AlienVault","year":"2020"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"ref58","article-title":"THE STATE OF RANSOMWARE 2020","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"ref56","article-title":"Major US Twitter accounts hacked in Bitcoin scam","year":"2020"},{"key":"ref55","article-title":"CoronaCoin More drama, third exit scam and discord deleted","year":"2020"},{"key":"ref54","article-title":"CoronaCoin: crypto developers seize on coronavirus for new, morbid token","year":"2020"},{"key":"ref53","article-title":"How Cryptocurrency Pump-and-Dump Scams Work","year":"2020"},{"key":"ref52","article-title":"COVID-19 MISP Project","year":"2020"},{"key":"ref10","article-title":"All Cryptocurrencies &#x2014; CoinMarketCap","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref40","article-title":"Cybersecurity pros warn&#x2013;covid-19 pandemic as a tool","author":"mathew","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380215"},{"key":"ref13","article-title":"Year in review: biggest cryptocurrency scams of 2019","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref18","first-page":"101","article-title":"Analyzing the bitcoin ponzi scheme ecosystem","author":"vasek","year":"2018","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00050"},{"key":"ref4","article-title":"Phishing Activity Trends Reports","year":"2020"},{"key":"ref3","article-title":"Beyond the virus: A first look at coronavirus-themed mobile malware","author":"he","year":"2020"},{"key":"ref6","article-title":"FBI Expects a Rise in Scams Involving Cryptocurrency Related to the COVID-19 Pandemic","year":"2020"},{"key":"ref5","article-title":"Americans lost $77 million to Covid-19 fraud","year":"2020"},{"key":"ref8","article-title":"CovidLock: Mobile Coronavirus Tracking App Coughs Up Ransomware","year":"2020"},{"key":"ref7","year":"2020","journal-title":"Scammers Impersonate World Health Organization to Steal BTC COVID-19 Donations"},{"key":"ref49","article-title":"BitcoinAbuse","year":"2020"},{"key":"ref9","article-title":"Corona Coin - Another Exit Scam, Yes, It Is The Third Time!","year":"2020"},{"key":"ref46","article-title":"Year in review: biggest cryptocurrency scams of 2019","year":"2020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_17"},{"key":"ref48","article-title":"Bitcointalk","year":"2020"},{"key":"ref47","article-title":"McAfee","year":"2020"},{"key":"ref42","article-title":"What covid-19 can teach us about cyber resilience","author":"kallberg","year":"2020","journal-title":"The Fifth Domain"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3604825"},{"key":"ref44","article-title":"Vetting security and privacy of global covid-19 contact tracing applications","author":"sun","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3568830"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493255.pdf?arnumber=9493255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T17:51:14Z","timestamp":1672941074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493255","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}