{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T05:41:56Z","timestamp":1771306916263,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARC DECRA","award":["DE210101458"],"award-info":[{"award-number":["DE210101458"]}]},{"name":"the NUDT Grants","award":["ZK19-38"],"award-info":[{"award-number":["ZK19-38"]}]},{"name":"the National Nature Science Founda- tion of China","award":["62072466, 62102430, 62102429"],"award-info":[{"award-number":["62072466, 62102430, 62102429"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557454","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:22:22Z","timestamp":1665883342000},"page":"468-477","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Smart Contract Scams Detection with Topological Data Analysis on Account Interaction"],"prefix":"10.1145","author":[{"given":"Shuhui","family":"Fan","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Haoran","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/612"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-09-01249-X"},{"key":"e_1_3_2_2_3_1","unstructured":"Chainalysis. 2021. The 2021 Crypto Crime Report. https:\/\/go.chainalysis.com\/2021-Crypto-Crime-Report.html.  Chainalysis. 2021. The 2021 Crypto Crime Report. https:\/\/go.chainalysis.com\/2021-Crypto-Crime-Report.html."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377402"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020a. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In IJCAI. 4506--4512.  Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020a. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In IJCAI. 4506--4512.","DOI":"10.24963\/ijcai.2020\/621"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380215"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905769"},{"key":"e_1_3_2_2_9_1","volume-title":"Topological Data Analysis for Arrhythmia Detection Through Modular Neural Networks. In Canadian Conference on AI. 177--188","author":"Dindin Meryll","year":"2020","unstructured":"Meryll Dindin , Yuhei Umeda , and Fr\u00e9d\u00e9ric Chazal . 2020 . Topological Data Analysis for Arrhythmia Detection Through Modular Neural Networks. In Canadian Conference on AI. 177--188 . Meryll Dindin, Yuhei Umeda, and Fr\u00e9d\u00e9ric Chazal. 2020. Topological Data Analysis for Arrhythmia Detection Through Modular Neural Networks. In Canadian Conference on AI. 177--188."},{"key":"e_1_3_2_2_10_1","first-page":"226","article-title":"a. A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , Xiaowei Xu , 1996 a. A density-based algorithm for discovering clusters in large spatial databases with noise . In Kdd , Vol. 96. 226 -- 231 . Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, Xiaowei Xu, et al. 1996 a. A density-based algorithm for discovering clusters in large spatial databases with noise. In Kdd, Vol. 96. 226--231.","journal-title":"Kdd"},{"key":"e_1_3_2_2_11_1","first-page":"226","article-title":"b. A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , Xiaowei Xu , 1996 b. A density-based algorithm for discovering clusters in large spatial databases with noise . In Kdd , Vol. 96. 226 -- 231 . Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, Xiaowei Xu, et al. 1996 b. A density-based algorithm for discovering clusters in large spatial databases with noise. In Kdd, Vol. 96. 226--231.","journal-title":"Kdd"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428335"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_35"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102462"},{"key":"e_1_3_2_2_15_1","volume-title":"27th USENIX Security Symposium ($$USENIX$$ Security 18)","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow . 2018 . teether: Gnawing at ethereum to automatically exploit smart contracts . In 27th USENIX Security Symposium ($$USENIX$$ Security 18) . 1317--1333. Johannes Krupp and Christian Rossow. 2018. teether: Gnawing at ethereum to automatically exploit smart contracts. In 27th USENIX Security Symposium ($$USENIX$$ Security 18). 1317--1333."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380103"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976236.59"},{"key":"e_1_3_2_2_18_1","volume-title":"Irwan Adi Ekaputra, and Za\u00e4fri Ananto Husodo","author":"Mariana Christy Dwita","year":"2021","unstructured":"Christy Dwita Mariana , Irwan Adi Ekaputra, and Za\u00e4fri Ananto Husodo . 2021 . Are Bitcoin and Ethereum safe-havens for stocks during the COVID-19 pandemic? Finance research letters, Vol. 38 (2021), 101798. Christy Dwita Mariana, Irwan Adi Ekaputra, and Za\u00e4fri Ananto Husodo. 2021. Are Bitcoin and Ethereum safe-havens for stocks during the COVID-19 pandemic? Finance research letters, Vol. 38 (2021), 101798."},{"key":"e_1_3_2_2_19_1","volume-title":"Assessing single-cell transcriptomic variability through density-preserving data visualization. Nature Biotechnology","author":"Narayan Ashwin","year":"2021","unstructured":"Ashwin Narayan , Bonnie Berger , and Hyunghoon Cho . 2021. Assessing single-cell transcriptomic variability through density-preserving data visualization. Nature Biotechnology ( 2021 ), 1--10. Ashwin Narayan, Bonnie Berger, and Hyunghoon Cho. 2021. Assessing single-cell transcriptomic variability through density-preserving data visualization. Nature Biotechnology (2021), 1--10."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038513"},{"key":"e_1_3_2_2_21_1","volume-title":"Fast and accurate tumor segmentation of histology images using persistent homology and deep convolutional features. Medical image analysis","author":"Qaiser Talha","year":"2019","unstructured":"Talha Qaiser , Yee-Wah Tsang , Daiki Taniyama , Naoya Sakamoto , Kazuaki Nakane , David Epstein , and Nasir Rajpoot . 2019. Fast and accurate tumor segmentation of histology images using persistent homology and deep convolutional features. Medical image analysis , Vol. 55 ( 2019 ), 1--14. Talha Qaiser, Yee-Wah Tsang, Daiki Taniyama, Naoya Sakamoto, Kazuaki Nakane, David Epstein, and Nasir Rajpoot. 2019. Fast and accurate tumor segmentation of histology images using persistent homology and deep convolutional features. Medical image analysis, Vol. 55 (2019), 1--14."},{"key":"e_1_3_2_2_22_1","first-page":"192","article-title":"Abnormal transaction behavior recognition based on motivation analysis in blockchain digital currency","volume":"44","author":"Shen Meng","year":"2021","unstructured":"Meng Shen , Anqi Sang , Liehuang Zhu , Rungeng Sun , and Can Zhang . 2021 . Abnormal transaction behavior recognition based on motivation analysis in blockchain digital currency . Chinese Journal of Computers , Vol. 44 , 1 (2021), 192 -- 208 . Meng Shen, Anqi Sang, Liehuang Zhu, Rungeng Sun, and Can Zhang. 2021. Abnormal transaction behavior recognition based on motivation analysis in blockchain digital currency. Chinese Journal of Computers, Vol. 44, 1 (2021), 192--208.","journal-title":"Chinese Journal of Computers"},{"key":"e_1_3_2_2_23_1","first-page":"100","article-title":"Topological methods for the analysis of high dimensional data sets and 3d object recognition","volume":"91","author":"Singh Gurjeet","year":"2007","unstructured":"Gurjeet Singh , Facundo M\u00e9moli , and Gunnar E Carlsson . 2007 . Topological methods for the analysis of high dimensional data sets and 3d object recognition . SPBG , Vol. 91 (2007), 100 . Gurjeet Singh, Facundo M\u00e9moli, and Gunnar E Carlsson. 2007. Topological methods for the analysis of high dimensional data sets and 3d object recognition. SPBG, Vol. 91 (2007), 100.","journal-title":"SPBG"},{"key":"e_1_3_2_2_24_1","volume-title":"Blockchain: Blueprint for a new economy. \"O'Reilly Media","author":"Swan Melanie","year":"2015","unstructured":"Melanie Swan . 2015 . Blockchain: Blueprint for a new economy. \"O'Reilly Media , Inc .\". Melanie Swan. 2015. Blockchain: Blueprint for a new economy. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_25_1","first-page":"39","article-title":"giotto-tda:: A Topological Data Analysis Toolkit for Machine Learning and Data Exploration","volume":"22","author":"Tauzin Guillaume","year":"2021","unstructured":"Guillaume Tauzin , Umberto Lupo , Lewis Tunstall , Julian Burella P\u00e9rez , Matteo Caorsi , Anibal M Medina-Mardones , Alberto Dassatti , and Kathryn Hess . 2021 . giotto-tda:: A Topological Data Analysis Toolkit for Machine Learning and Data Exploration . J. Mach. Learn. Res. , Vol. 22 (2021), 39 -- 31 . Guillaume Tauzin, Umberto Lupo, Lewis Tunstall, Julian Burella P\u00e9rez, Matteo Caorsi, Anibal M Medina-Mardones, Alberto Dassatti, and Kathryn Hess. 2021. giotto-tda:: A Topological Data Analysis Toolkit for Machine Learning and Data Exploration. J. Mach. Learn. Res., Vol. 22 (2021), 39--1.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_2_27_1","unstructured":"Christof Ferreira Torres Mathis Steichen etal 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th {USENIX} Security Symposium ($$USENIX$$ Security 19). 1591--1607.  Christof Ferreira Torres Mathis Steichen et al. 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th {USENIX} Security Symposium ($$USENIX$$ Security 19). 1591--1607."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449916"},{"key":"e_1_3_2_2_29_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1371--1385.","author":"Zhou Yi","unstructured":"Yi Zhou , Deepak Kumar , Surya Bakshi , Joshua Mason , Andrew Miller , and Michael Bailey . 2018. Erays: reverse engineering ethereum's opaque smart contracts . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1371--1385. Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: reverse engineering ethereum's opaque smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1371--1385."}],"event":{"name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","location":"Atlanta GA USA","acronym":"CIKM '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:55Z","timestamp":1750182535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":29,"alternative-id":["10.1145\/3511808.3557454","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557454","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}