{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T00:42:02Z","timestamp":1778373722677,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Emerging Interdisciplinary Project of CUFE"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602536"],"award-info":[{"award-number":["61602536"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773415"],"award-info":[{"award-number":["61773415"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672104"],"award-info":[{"award-number":["61672104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1109\/tcss.2021.3088145","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T19:37:50Z","timestamp":1625859470000},"page":"624-637","source":"Crossref","is-referenced-by-count":66,"title":["Detecting Ethereum Ponzi Schemes Based on Improved LightGBM Algorithm"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6652-2077","authenticated-orcid":false,"given":"Yanmei","family":"Zhang","sequence":"first","affiliation":[{"name":"Engineering Research Center of State Financial Security, Ministry of Education, Central University of Finance and Economics, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3865-1856","authenticated-orcid":false,"given":"Wenqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of State Financial Security, Ministry of Education, Central University of Finance and Economics, Beijing, China"}]},{"given":"Ziyu","family":"Li","sequence":"additional","affiliation":[{"name":"Engineering Research Center of State Financial Security, Ministry of Education, Central University of Finance and Economics, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4895-9512","authenticated-orcid":false,"given":"Salman","family":"Raza","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Huaihu","family":"Cao","sequence":"additional","affiliation":[{"name":"Engineering Research Center of State Financial Security, Ministry of Education, Central University of Finance and Economics, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"14","article-title":"Hybrid sampling with bagging for class imbalance learning","author":"yang","year":"2016","journal-title":"Proc Pacific&#x2013;Asia Conf Knowl Discovery Data Mining"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2006.1688199"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BIFE.2011.25"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993409"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.756"},{"key":"ref30","first-page":"878","article-title":"Borderline-SMOTE: A new over-sampling method in imbalanced datasets learning","author":"han","year":"2005","journal-title":"Proc Int Conf Adv Intell Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74553-2_28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0087-0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0295-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref29","first-page":"1","article-title":"C4. 5, class imbalance, and cost sensitivity: Why under-sampling beats over-sampling","volume":"11","author":"drummond","year":"2003","journal-title":"Proc ICML Workshop Learn From Imbalanced Datasets II"},{"key":"ref2","author":"buterin","year":"2013","journal-title":"A next-generation smart contract and decentralized application platform"},{"key":"ref1","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.30525\/2256-0742\/2018-4-5-75-81"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864871"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113318"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz121"},{"key":"ref10","author":"higgins","year":"2015","journal-title":"SEC Seizes Assets from Alleged Altcoin Pyramid Scheme"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3016660"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39804-2_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2871167"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"ref15","article-title":"A data science approach for honeypot detection in Ethereum","author":"camino","year":"2019","journal-title":"arXiv 1910 01449"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905769"},{"key":"ref18","first-page":"3149","article-title":"LightGBM: A highly efficient gradient boosting decision tree","author":"ke","year":"2017","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref19","article-title":"Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact","author":"bartoletti","year":"2017","journal-title":"arXiv 1703 03779"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref3","author":"wood","year":"2014","journal-title":"Ethereum A secure decentralized generalized transaction ledger"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21915-8_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978362"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.mathsocsci.2009.05.003"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref9","first-page":"101","article-title":"Analyzing the bitcoin Ponzi scheme ecosystem","author":"vasek","year":"2018","journal-title":"Proc Bitcoin Workshop"},{"key":"ref46","first-page":"479","article-title":"On the margin explanation of boosting algorithms","author":"wang","year":"2008","journal-title":"Proc COLT"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1214\/aos\/1013203451","article-title":"Greedy function approximation: A gradient boosting machine","volume":"29","author":"friedman","year":"2001","journal-title":"Ann Statist"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00042"},{"key":"ref47","author":"witten","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.006"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2009.4938667"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/BF00379115"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/9745986\/09479748.pdf?arnumber=9479748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:16:11Z","timestamp":1652732171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9479748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2021.3088145","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4]]}}}