{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:45Z","timestamp":1750219845834,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3581971.3581977","type":"proceedings-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T16:35:44Z","timestamp":1680798944000},"page":"40-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Distributed Authenticity Verification Scheme Using Deep Learning for NFT Market"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1457-1325","authenticated-orcid":false,"given":"Keigo","family":"Kimura","sequence":"first","affiliation":[{"name":"University of Tsukuba, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7833-775X","authenticated-orcid":false,"given":"Mitsuyoshi","family":"Imamura","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-4454","authenticated-orcid":false,"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3109359"},{"key":"e_1_3_2_1_2_1","volume-title":"Bitcoin:a peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto , \u201c Bitcoin:a peer-to-peer electronic cash system ,\u201d http:\/\/www.bitcoin.org\/ bitcoin.pdf , 2008 . S. Nakamoto, \u201cBitcoin:a peer-to-peer electronic cash system,\u201d http:\/\/www.bitcoin.org\/ bitcoin.pdf , 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519694"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2021.3136055"},{"key":"e_1_3_2_1_5_1","volume-title":"SEMANTiCS Conference","author":"Graux D.","year":"2018","unstructured":"D. Graux , G. Sejdiu , H. Jabeen , J. Lehmann , D. Sui , D. Muhs , and J. Pfeffer , \u201c Profiting from kitties on ethereum: Leveraging blockchain rdf data with sansa ,\u201d in SEMANTiCS Conference , 2018 . D. Graux, G. Sejdiu, H. Jabeen, J. Lehmann, D. Sui, D. Muhs, and J. Pfeffer, \u201cProfiting from kitties on ethereum: Leveraging blockchain rdf data with sansa,\u201d in SEMANTiCS Conference, 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-00053-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05146-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524629"},{"key":"e_1_3_2_1_9_1","volume-title":"Metaverse native communication: A blockchain and spectrum prospective","author":"Xu H.","year":"2022","unstructured":"H. Xu , Z. Li , Z. Li , X. Zhang , Y. Sun , and L. Zhang , \u201c Metaverse native communication: A blockchain and spectrum prospective ,\u201d arXiv preprint arXiv:2203.08355., 2022 . H. Xu, Z. Li, Z. Li, X. Zhang, Y. Sun, and L. Zhang, \u201cMetaverse native communication: A blockchain and spectrum prospective,\u201d arXiv preprint arXiv:2203.08355., 2022."},{"key":"e_1_3_2_1_10_1","first-page":"154","volume-title":"IFIP International Conference on Information Security Theory and Practice. Springer","author":"Sato T.","year":"2019","unstructured":"T. Sato , M. Imamura , and K. Omote , \u201c Threat analysis of poisoning attack against ethereum blockchain ,\u201d in IFIP International Conference on Information Security Theory and Practice. Springer , 2019 , pp. 139\u2013 154 . T. Sato, M. Imamura, and K. Omote, \u201cThreat analysis of poisoning attack against ethereum blockchain,\u201d in IFIP International Conference on Information Security Theory and Practice. Springer, 2019, pp. 139\u2013154."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00070"},{"key":"e_1_3_2_1_12_1","volume-title":"Understanding security issues in the nft ecosystem","author":"Das D.","year":"2021","unstructured":"D. Das , P. Bose , N. Ruaro , C. Kruegel , and G. Vigna , \u201c Understanding security issues in the nft ecosystem ,\u201d arXiv preprint arXiv:2111.08893., 2021 . D. Das, P. Bose, N. Ruaro, C. Kruegel, and G. Vigna, \u201cUnderstanding security issues in the nft ecosystem,\u201d arXiv preprint arXiv:2111.08893., 2021."},{"key":"e_1_3_2_1_13_1","volume-title":"Nftgan: Non-fungible token art generation using generative adversatial networks","author":"Shahriar S.","year":"2021","unstructured":"S. Shahriar and K. Hayawi , \u201c Nftgan: Non-fungible token art generation using generative adversatial networks ,\u201d arXiv preprint arXiv:2112.10577, 2021 . S. Shahriar and K. Hayawi, \u201cNftgan: Non-fungible token art generation using generative adversatial networks,\u201d arXiv preprint arXiv:2112.10577, 2021."},{"key":"e_1_3_2_1_14_1","unstructured":"P. Sharma A. R. Sahoo S. Sinha and S. Bharadwaj \u201cNft artwork generation using oscillatory activation functions in gans.\u201d  P. Sharma A. R. Sahoo S. Sinha and S. Bharadwaj \u201cNft artwork generation using oscillatory activation functions in gans.\u201d"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00087"},{"key":"e_1_3_2_1_16_1","volume-title":"Auto-encoding variational bayes","author":"Kingma D. P.","year":"2013","unstructured":"D. P. Kingma and M. Welling ., \u201c Auto-encoding variational bayes ,\u201d arXiv preprint arXiv:1312.6114, 2013 . D. P. Kingma and M. Welling., \u201cAuto-encoding variational bayes,\u201d arXiv preprint arXiv:1312.6114, 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0919-5_4"}],"event":{"name":"ICBTA 2022: 2022 5th International Conference on Blockchain Technology and Applications","acronym":"ICBTA 2022","location":"Xi'an China"},"container-title":["Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581977","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581971.3581977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:58Z","timestamp":1750178818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":17,"alternative-id":["10.1145\/3581971.3581977","10.1145\/3581971"],"URL":"https:\/\/doi.org\/10.1145\/3581971.3581977","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}