{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:23:57Z","timestamp":1774365837441,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":44,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"STINT initiation grant for international collaboration","award":["IB2017-6978"],"award-info":[{"award-number":["IB2017-6978"]}]},{"name":"the National Natural Science Foundation of China","award":["61722214 61472338 61773410"],"award-info":[{"award-number":["61722214 61472338 61773410"]}]},{"name":"the Program for Guangdong Introducing Innovative and Enterpreneurial Teams","award":["2016ZT06D211"],"award-info":[{"award-number":["2016ZT06D211"]}]},{"name":"the National Key Research and Development Program","award":["2016YFB1000101"],"award-info":[{"award-number":["2016YFB1000101"]}]},{"name":"the Pearl River S&#38;T Nova Program of Guangzhou","award":["201710010046"],"award-info":[{"award-number":["201710010046"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3186046","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"1409-1418","source":"Crossref","is-referenced-by-count":341,"title":["Detecting Ponzi Schemes on Ethereum"],"prefix":"10.1145","author":[{"given":"Weili","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Jiahui","family":"Cui","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Edith","family":"Ngai","sequence":"additional","affiliation":[{"name":"Uppsala University, Uppsala, Sweden"}]},{"given":"Peilin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Yuren","family":"Zhou","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3178876.3186046-1","doi-asserted-by":"crossref","unstructured":"Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Proceedings of International Conference on Financial Cryptography and Data Security. Springer, 34--51.","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"key-10.1145\/3178876.3186046-2","doi-asserted-by":"crossref","unstructured":"Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A Survey of Attacks on Ethereum Smart Contracts (SoK) Proceedings of International Conference on Principles of Security and Trust. Springer, 164--186.","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"key-10.1145\/3178876.3186046-3","unstructured":"Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia. 2017. Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. (2017). showeprint[arxiv]1703.03779"},{"key":"key-10.1145\/3178876.3186046-4","unstructured":"Vitalik Buterin et almbox.. 2014. A next-generation smart contract and decentralized application platform. Ethereum white paper (2014)."},{"key":"key-10.1145\/3178876.3186046-5","doi-asserted-by":"crossref","unstructured":"Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A scalable tree boosting system. In Proceedings of International Conference on Knowledge Discovery and Data Mining. ACM, 785--794.","DOI":"10.1145\/2939672.2939785"},{"key":"key-10.1145\/3178876.3186046-6","doi-asserted-by":"crossref","unstructured":"Ting Chen, Xiaoqi Li, Xiapu Luo, and Xiaosong Zhang. 2017. Under-optimized smart contracts devour your money. In Proceedings of International Conference on Software Analysis, Evolution and Reengineering. IEEE Computer Society, 442--446.","DOI":"10.1109\/SANER.2017.7884650"},{"key":"key-10.1145\/3178876.3186046-7","doi-asserted-by":"crossref","unstructured":"Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. IEEE Access Vol. 4 (2016), 2292--2303.","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"key-10.1145\/3178876.3186046-8","doi-asserted-by":"crossref","unstructured":"Nicolas Christin. 2013. Traveling the silk road: A measurement analysis of a large anonymous online marketplace. In Proceedings of International World Wide Web Conference. International World Wide Web Conferences Steering Committee \/ ACM, 213--224.","DOI":"10.1145\/2488388.2488408"},{"key":"key-10.1145\/3178876.3186046-9","unstructured":"CoinDesk. 2017. Understanding Ethereum-blockchain research report. (2017). deftempurl%www.coindesk.com\/research\/understanding-ethereum-report\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-10","unstructured":"Marco Conoscenti, Antonio Vetro, and Juan Carlos De Martin. 2016. Blockchain for the Internet of Things: A systematic literature review Proceedings of International Conference of Computer Systems and Applications. IEEE, 1--6."},{"key":"key-10.1145\/3178876.3186046-11","doi-asserted-by":"crossref","unstructured":"Christian Decker, Jochen Seidel, and Roger Wattenhofer. 2016. Bitcoin meets strong consistency. In Proceedings of International Conference on Distributed Computing and Networking. ACM, 13:1--13:10.","DOI":"10.1145\/2833312.2833321"},{"key":"key-10.1145\/3178876.3186046-12","unstructured":"Craig Kent Elwell, M Maureen Murphy, and Michael V Seitzinger. 2013. Bitcoin: Questions, answers, and analysis of legal issues. (2013). deftempurl%https:\/\/digital.library.unt.edu\/ark:\/67531\/metadc272070\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-13","unstructured":"Jerome H Friedman. 2001. Greedy function approximation: A gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"key-10.1145\/3178876.3186046-14","unstructured":"Hyperledger. 2015. Hyperledger project. (2015). deftempurl%https:\/\/www.hyperledger.org\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-15","doi-asserted-by":"crossref","unstructured":"Ari Juels, Ahmed Kosba, and Elaine Shi. 2016. The ring of Gyges: Investigating the future of criminal smart contracts Proceedings of International Conference on Computer and Communications Security. ACM, 283--295.","DOI":"10.1145\/2976749.2978362"},{"key":"key-10.1145\/3178876.3186046-16","unstructured":"Garrett Keirns. 2017. &#8220;Gemcoin&#8221; Ponzi scheme operator hit with $74 million judgment. (March. 2017). deftempurl%https:\/\/www.coindesk.com\/gemcoin-ponzi-scheme-operator-hit-74-million-judgment\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-17","unstructured":"Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Ppcoin white paper (2012)."},{"key":"key-10.1145\/3178876.3186046-18","doi-asserted-by":"crossref","unstructured":"D&#225;niel Kondor, Istv&#225;n Csabai, J&#225;nos Sz&#252;le, M&#225;rton P&#243;sfai, and G&#225;bor Vattay. 2014 a. Inferring the interplay between network structure and market effects in Bitcoin. New Journal of Physics Vol. 16, 12 (2014), 125003.","DOI":"10.1088\/1367-2630\/16\/12\/125003"},{"key":"key-10.1145\/3178876.3186046-19","doi-asserted-by":"crossref","unstructured":"D&#225;niel Kondor, M&#225;rton P&#243;sfai, Istv&#225;n Csabai, and G&#225;bor Vattay. 2014 b. Do the rich get richer? An empirical analysis of the Bitcoin transaction network. PloS one Vol. 9, 2 (2014), e86197.","DOI":"10.1371\/journal.pone.0086197"},{"key":"key-10.1145\/3178876.3186046-20","unstructured":"D&#225;niel Kondor, M&#225;rton P&#243;sfai, Istv&#225;n Csabai, and G&#225;bor Vattay. 2016. From &#8220;Blockchain Hype&#8221; to a Real Business Case for Financial Markets. Available at SSRN 2760184 (2016)."},{"key":"key-10.1145\/3178876.3186046-21","unstructured":"David Mazieres. 2015. The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation (2015)."},{"key":"key-10.1145\/3178876.3186046-22","doi-asserted-by":"crossref","unstructured":"Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2016. A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM Vol. 59, 4 (2016), 86--93.","DOI":"10.1145\/2896384"},{"key":"key-10.1145\/3178876.3186046-23","unstructured":"Tyler Moore and Nicolas Christin. 2013. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk Proceedings of International Conference on Financial Cryptography and Data Security. Springer, 25--33."},{"key":"key-10.1145\/3178876.3186046-24","unstructured":"Tyler Moore, Jie Han, and Richard Clayton. 2012. The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs Proceedings of International Conference on Financial Cryptography and Data Security, Vol. Vol. 7397. Springer, 41--56."},{"key":"key-10.1145\/3178876.3186046-25","unstructured":"DAVID Z. MORRIS. 2017. The rise of cryptocurrency Ponzi schemes. (May. 2017). deftempurl%https:\/\/www.theatlantic.com\/technology\/archive\/2017\/05\/cryptocurrency-ponzi-schemes\/528624\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-26","unstructured":"Malte Moser, Rainer Bohme, and Dominic Breuker. 2013. An inquiry into money laundering tools in the Bitcoin ecosystem Proceedings of eCrime Researchers Summit (eCRS). IEEE, 1--14."},{"key":"key-10.1145\/3178876.3186046-27","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"key-10.1145\/3178876.3186046-28","unstructured":"Namecoin. 2014. Namecoin project. (2014). deftempurl%https:\/\/www.namecoin.org\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-29","unstructured":"Jens Neisius and Richard Clayton. 2014. Orchestrated crime: The high yield investment fraud ecosystem proceedings of APWG Symposium on Electronic Crime Research (eCrime). IEEE, 48--58."},{"key":"key-10.1145\/3178876.3186046-30","doi-asserted-by":"crossref","unstructured":"Alex Norta. 2015. Creation of Smart-Contracting Collaborations for Decentralized Autonomous Organizations. In Proceedings of International Conference on Perspectives in Business Informatics Research. Springer, 3--17.","DOI":"10.1007\/978-3-319-21915-8_1"},{"key":"key-10.1145\/3178876.3186046-31","unstructured":"Gareth William Peters and Efstathios Panayi. 2015. Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. (2015). showeprint[arxiv]1511.05740"},{"key":"key-10.1145\/3178876.3186046-32","doi-asserted-by":"crossref","unstructured":"Fergal Reid and Martin Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks. Springer, 197--223.","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"key-10.1145\/3178876.3186046-33","unstructured":"Dorit Ron and Adi Shamir. 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph Proceedings of International Conference on Financial Cryptography and Data Security. Springer, 6--24."},{"key":"key-10.1145\/3178876.3186046-34","unstructured":"David Schwartz, Noah Youngs, and Arthur Britto. 2014. The Ripple protocol consensus algorithm. Ripple Labs Inc White Paper (2014)."},{"key":"key-10.1145\/3178876.3186046-35","unstructured":"Stan Higgins. 2015. SEC seizes assets from alleged altcoin pyramid scheme. https:\/\/www.coindesk.com\/sec-seizes-alleged-altcoin-pyramid-scheme\/. (Oct.. 2015)."},{"key":"key-10.1145\/3178876.3186046-36","unstructured":"Melanie Swan. 2015. Blockchain: Blueprint for a new economy. O'Reilly Media, Inc."},{"key":"key-10.1145\/3178876.3186046-37","unstructured":"Nick Szabo. 1996. Smart contracts: Building blocks for digital markets. (Sept.. 1996). deftempurl%http:\/\/www.fon.hum.uva.nl\/ Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-38","doi-asserted-by":"crossref","unstructured":"Marie Vasek and Tyler Moore. 2015. There's no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In Proceedings of International Conference on Financial Cryptography and Data Security. Springer, 44--61.","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"key-10.1145\/3178876.3186046-39","unstructured":"Wikipedia. 2017. Ponzi scheme. (Oct.. 2017). deftempurl%https:\/\/en.wikipedia.org\/wiki\/Ponzi_scheme Retrieved October 1, 2017 from tempurl"},{"key":"key-10.1145\/3178876.3186046-40","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Yellow Paper (2014)."},{"key":"key-10.1145\/3178876.3186046-41","doi-asserted-by":"crossref","unstructured":"Aaron Yelowitz and Matthew Wilson. 2015. Characteristics of Bitcoin users: an analysis of Google search data. Applied Economics Letters Vol. 22, 13 (2015), 1030--1036.","DOI":"10.1080\/13504851.2014.995359"},{"key":"key-10.1145\/3178876.3186046-42","doi-asserted-by":"crossref","unstructured":"Li Yujian and Liu Bo. 2007. A normalized Levenshtein distance metric. IEEE transactions on pattern analysis and machine intelligence Vol. 29, 6 (2007), 1091--1095.","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"key-10.1145\/3178876.3186046-43","unstructured":"Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2016. Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services (2016)."},{"key":"key-10.1145\/3178876.3186046-44","unstructured":"Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends Proceedings of International Congress on Big Data. IEEE Computer Society, 557--564."}],"event":{"name":"the 2018 World Wide Web Conference","location":"Lyon, France","acronym":"WWW '18","number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web  - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3186046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186046&ftid=1957371&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:27:00Z","timestamp":1750213620000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3186046"}},"subtitle":["Towards Healthier Blockchain Technology"],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1145\/3178876.3186046","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}