{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:02:27Z","timestamp":1775815347658,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2016YFB1000101"],"award-info":[{"award-number":["2016YFB1000101"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973325"],"award-info":[{"award-number":["61973325"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["17lgpy120"],"award-info":[{"award-number":["17lgpy120"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2019B020214006"],"award-info":[{"award-number":["2019B020214006"]}]},{"name":"Macao Science and Technology Development Fund under Macao Funding Scheme","award":["0025\/2019\/AKP"],"award-info":[{"award-number":["0025\/2019\/AKP"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/ojcs.2020.2990458","type":"journal-article","created":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T20:00:16Z","timestamp":1588708816000},"page":"95-106","source":"Crossref","is-referenced-by-count":201,"title":["XBlock-ETH: Extracting and Exploring Blockchain Data From Ethereum"],"prefix":"10.1109","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4897-9276","authenticated-orcid":false,"given":"Peilin","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240728"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980255"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980823"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954380"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.14"},{"key":"ref37","first-page":"1317","article-title":"teether: Gnawing at ethereum to automatically exploit smart contracts","author":"krupp","year":"0","journal-title":"27th USENIX Secur Symp Secur"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.2019010102"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453106"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00045"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.11"},{"key":"ref2","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref22","first-page":"95","article-title":"Monoxide: Scale out blockchains with asynchronous consensus zones","author":"wang","year":"0","journal-title":"Proc 11th USENIX Symp Networked Syst Des Implement"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183546"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1609\/icwsm.v11i1.14871","article-title":"Online human-bot interactions: Detection, estimation, and characterization","author":"varol","year":"2017","journal-title":"Proc of Intl AAAI Conf on Web and Social Media"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00137"},{"key":"ref53","article-title":"Blocksci: Design and applications of a blockchain analysis platform","author":"kalodner","year":"2017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55699-4_34"},{"key":"ref10","article-title":"Kybernetwork: A trustless decentralized exchange and payment service","author":"luu","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3386\/w24774"},{"key":"ref13","article-title":"A token airdrop may not spare you from securities regulation","author":"valkenburgh","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1126\/science.159.3810.56"},{"key":"ref15","article-title":"Measurement and analysis of the bitcoin networks: A view from mining pools","author":"wang","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"ref17","article-title":"Ethereum gas price analysis","author":"s","year":"2018"},{"key":"ref18","article-title":"Simply explained: Ethereum gas","author":"majuri","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref4","article-title":"Erc20 token standard","author":"buterin","year":"2015"},{"key":"ref3","article-title":"Ethereum white paper","author":"buterin","year":"2013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"ref8","article-title":"The idea of smart contracts","volume":"6","author":"szabo","year":"1997"},{"key":"ref49","first-page":"15","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"0","journal-title":"Proc 9th USENIX Conf Networked Syst Design Implementation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref9","article-title":"Cryptokitties mania overwhelms ethereum network's processing","author":"kharif","year":"2017","journal-title":"Bloomberg"},{"key":"ref46","first-page":"1","article-title":"Cryptocurrency price prediction using news and social media sentiment","volume":"1","author":"lamon","year":"2017","journal-title":"SMU Data Science Review"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96661-8_45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2018.07.011"},{"key":"ref47","first-page":"1","article-title":"Cryptocurrency price prediction using tweet volumes and sentiment analysis","volume":"1","author":"abraham","year":"2018","journal-title":"SMU Data Science Review"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905769"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_8"},{"key":"ref43","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","author":"torres","year":"0","journal-title":"Proc 28th USENIX Security Symp"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782664\/8821528\/09086439.pdf?arnumber=9086439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T18:35:36Z","timestamp":1696098936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9086439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2020.2990458","relation":{},"ISSN":["2644-1268"],"issn-type":[{"value":"2644-1268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}