{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T01:14:31Z","timestamp":1772327671530,"version":"3.50.1"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>Ethereum blockchain has shown great potential in providing the next generation of the decentralized platform beyond crypto payments. Recently, it has attracted researchers and industry players to experiment with developing various Web3 applications for the Internet of Things (IoT), Defi, Metaverse, and many more. Although Ethereum provides a secure platform for developing decentralized applications, it is not immune to security risks and has been a victim of numerous cyber attacks. Adversarial attacks are a new cyber threat to systems that have been rising. Adversarial attacks can disrupt and exploit decentralized applications running on the Ethereum platform by creating fake accounts and transactions. Detecting adversarial attacks is challenging because the fake materials (e.g., accounts and transactions) as malicious payloads are similar to benign data. This article proposes a model using Generative Adversarial Networks (GAN) and Deep Recurrent Neural Networks (RNN) for cyber threat hunting in the Ethereum blockchain. Firstly, we employ GAN to generate fake transactions using genuine Ethereum transactions as the first phase of the proposed model. Then in the second phase, we utilize bi-directional Long Short-Term Memory (LSTM) to identify adversarial transactions in a hunting exercise. The results of the first phase evaluation show that the GAN can generate transactions identical to the actual Ethereum transactions with an accuracy of 82.51%. Also, the results of the second phase show 99.98% accuracy in identifying adversarial transactions.<\/jats:p>","DOI":"10.1145\/3584666","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T11:07:04Z","timestamp":1677236824000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7730-9065","authenticated-orcid":false,"given":"Elnaz","family":"Rabieinejad","sequence":"first","affiliation":[{"name":"Cyber Science Lab, School of Computer Science, University of Guelph"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8669-9777","authenticated-orcid":false,"given":"Abbas","family":"Yazdinejad","sequence":"additional","affiliation":[{"name":"Cyber Science Lab, School of Computer Science, University of Guelph"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0049-4296","authenticated-orcid":false,"given":"Reza M.","family":"Parizi","sequence":"additional","affiliation":[{"name":"Decentralized Science Lab, Kennesaw State University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9294-7554","authenticated-orcid":false,"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[{"name":"Cyber Science Lab, School of Computer Science, University of Guelph"}]}],"member":"320","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"issue":"7","key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"117134","DOI":"10.1109\/ACCESS.2019.2936094","article-title":"A survey of blockchain from the perspectives of applications, challenges, and opportunities","volume":"7","author":"Monrat Ahmed Afif","year":"2019","unstructured":"Ahmed Afif Monrat, Olov Schel\u00e9n, and Karl Andersson. 2019. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7, 7 (2019), 117134\u2013117151.","journal-title":"IEEE Access"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Gaby G. Dagher Praneeth Babu Marella Matea Milojkovic and Jordan Mohler. 2018. Broncovote: Secure voting system using ethereum\u2019s blockchain. (2018).","DOI":"10.5220\/0006609700960107"},{"issue":"25","key":"e_1_3_1_5_2","first-page":"100258","article-title":"Blockchain in medical informatics","volume":"25","author":"Qu Jia","year":"2022","unstructured":"Jia Qu. 2022. Blockchain in medical informatics. Journal of Industrial Information Integration 25, 25 (2022), 100258.","journal-title":"Journal of Industrial Information Integration"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987376"},{"key":"e_1_3_1_7_2","first-page":"27 Pages","article-title":"A survey of how to use blockchain to secure internet of things and the stalker attack","volume":"2018","author":"Jesus Emanuel Ferreira","year":"2018","unstructured":"Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, C\u00e9lio V. N. De Albuquerque, and Ant\u00f4nio A. de A. Rocha. 2018. A survey of how to use blockchain to secure internet of things and the stalker attack. Security and Communication Networks 2018 (2018), 27 Pages.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_1_8_2","first-page":"1307","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Su Liya","year":"2021","unstructured":"Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil under the sun: Understanding and discovering attacks on Ethereum decentralized applications. In Proceedings of the 30th USENIX Security Symposium. 1307\u20131324."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100028"},{"issue":"5","key":"e_1_3_1_10_2","first-page":"653","article-title":"A survey of blockchain security issues and challenges.","volume":"19","author":"Lin Iuon-Chang","year":"2017","unstructured":"Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. International Journal of Network Security 19, 5 (2017), 653\u2013659.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101654"},{"key":"e_1_3_1_12_2","first-page":"61","volume-title":"Proceedings of the International Conference on Science of Cyber Security","author":"Xia Bin","year":"2019","unstructured":"Bin Xia, Junjie Yin, Jian Xu, and Yun Li. 2019. LogGAN: A sequence-based generative adversarial network for anomaly detection based on system logs. In Proceedings of the International Conference on Science of Cyber Security. Springer, 61\u201376."},{"key":"e_1_3_1_13_2","volume-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence","author":"Chen Zhi","year":"2021","unstructured":"Zhi Chen, Jiang Duan, Li Kang, and Guoping Qiu. 2021. Supervised anomaly detection via conditional generative adversarial network and ensemble active learning. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"issue":"9","key":"e_1_3_1_14_2","first-page":"22616","article-title":"LSTM-CGAN: Towards generating low-rate DDoS adversarial samples for blockchain-based wireless network detection models","volume":"9","author":"Liu Zengguang","year":"2021","unstructured":"Zengguang Liu and Xiaochun Yin. 2021. LSTM-CGAN: Towards generating low-rate DDoS adversarial samples for blockchain-based wireless network detection models. IEEE Access 9, 9 (2021), 22616\u201322625.","journal-title":"IEEE Access"},{"key":"e_1_3_1_15_2","unstructured":"Rachit Agarwal Tanmay Thapliyal and Sandeep K. Shukla. 2021. Detecting malicious accounts showing adversarial behavior in permissionless blockchains. arXiv:2101.11915. Retrieved from https:\/\/arxiv.org\/abs\/2101.11915."},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1145\/3196494.3201584","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","author":"Saad Muhammad","year":"2018","unstructured":"Muhammad Saad, My T. Thai, and Aziz Mohaisen. 2018. POSTER: Deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 809\u2013811."},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Ben Charoenwong and Mario Bernardi. 2021. A decade of cryptocurrency \u2018hacks\u2019: 2011\u20132021. Available at SSRN 3944435.","DOI":"10.2139\/ssrn.3944435"},{"issue":"96","key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"106630","DOI":"10.1016\/j.asoc.2020.106630","article-title":"Cryptocurrency malware hunting: A deep recurrent neural network approach","volume":"96","author":"Yazdinejad Abbas","year":"2020","unstructured":"Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, and Mu-Yen Chen. 2020. Cryptocurrency malware hunting: A deep recurrent neural network approach. Applied Soft Computing 96, 96 (2020), 106630.","journal-title":"Applied Soft Computing"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3469379.3469386"},{"issue":"50","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"102419","DOI":"10.1016\/j.jisa.2019.102419","article-title":"Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study","volume":"50","author":"Ferrag Mohamed Amine","year":"2020","unstructured":"Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, and Helge Janicke. 2020. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications 50, 50 (2020), 102419.","journal-title":"Journal of Information Security and Applications"},{"issue":"189","key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"103106","DOI":"10.1016\/j.jnca.2021.103106","article-title":"Prepare for trouble and make it double! Supervised\u2013Unsupervised stacking for anomaly-based intrusion detection","volume":"189","author":"Zoppi Tommaso","year":"2021","unstructured":"Tommaso Zoppi and Andrea Ceccarelli. 2021. Prepare for trouble and make it double! Supervised\u2013Unsupervised stacking for anomaly-based intrusion detection. Journal of Network and Computer Applications 189, 189 (2021), 103106.","journal-title":"Journal of Network and Computer Applications"},{"issue":"21","key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"1882","DOI":"10.1109\/TIP.2021.3049346","article-title":"On data augmentation for GAN training","volume":"30","author":"Tran Ngoc-Trung","year":"2021","unstructured":"Ngoc-Trung Tran, Viet-Hung Tran, Ngoc-Bao Nguyen, Trung-Kien Nguyen, and Ngai-Man Cheung. 2021. On data augmentation for GAN training. IEEE Transactions on Image Processing 30, 21 (2021), 1882\u20131897.","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"e_1_3_1_24_2","first-page":"297","volume-title":"Proceedings of the Cryptographers\u2019 Track at the RSA Conference","author":"Mukhtar Naila","year":"2022","unstructured":"Naila Mukhtar, Lejla Batina, Stjepan Picek, and Yinan Kong. 2022. Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices. In Proceedings of the Cryptographers\u2019 Track at the RSA Conference. Springer, 297\u2013321."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.010"},{"issue":"1","key":"e_1_3_1_26_2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/TCYB.2019.2963138","article-title":"Gan-based key secret-sharing scheme in blockchain","volume":"51","author":"Zheng Wenbo","year":"2020","unstructured":"Wenbo Zheng, Kunfeng Wang, and Fei-Yue Wang. 2020. Gan-based key secret-sharing scheme in blockchain. IEEE Transactions on Cybernetics 51, 1 (2020), 393\u2013404.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_1_27_2","article-title":"GAN-based information leakage attack detection in federated learning","volume":"2022","author":"Lai Jianxiong","year":"2022","unstructured":"Jianxiong Lai, Xiuli Huang, Xianzhou Gao, Chang Xia, and Jingyu Hua. 2022. GAN-based information leakage attack detection in federated learning. Security and Communication Networks 2022 (2022).","journal-title":"Security and Communication Networks"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3168011"},{"issue":"120","key":"e_1_3_1_29_2","doi-asserted-by":"crossref","first-page":"102574","DOI":"10.1016\/j.adhoc.2021.102574","article-title":"Federated learning for drone authentication","volume":"120","author":"Yazdinejadna Abbas","year":"2021","unstructured":"Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, and Hadis Karimipour. 2021. Federated learning for drone authentication. Ad Hoc Networks 120, 120 (2021), 102574.","journal-title":"Ad Hoc Networks"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313533"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467145"},{"key":"e_1_3_1_32_2","unstructured":"Hung Ba. 2019. Improving detection of credit card fraudulent transactions using generative adversarial networks. arXiv:1907.03355. Retrieved from https:\/\/arxiv.org\/abs\/1907.03355."},{"key":"e_1_3_1_33_2","first-page":"1","volume-title":"Proceedings of the 2018 16th Annual Conference on Privacy, Security and Trust","author":"Seo Eunbi","year":"2018","unstructured":"Eunbi Seo, Hyun Min Song, and Huy Kang Kim. 2018. Gids: Gan based intrusion detection system for in-vehicle network. In Proceedings of the 2018 16th Annual Conference on Privacy, Security and Trust. IEEE, 1\u20136."},{"key":"e_1_3_1_34_2","unstructured":"Dan Li Dacheng Chen Jonathan Goh and See-kiong Ng. 2018. Anomaly detection with generative adversarial networks for multivariate time series. arXiv:1809.04758. Retrieved from https:\/\/arxiv.org\/abs\/1809.04758."},{"key":"e_1_3_1_35_2","first-page":"141","volume-title":"Proceedings of the 2019 IEEE 31st International Conference on Tools with Artificial Intelligence","author":"Ngo Phuc Cuong","year":"2019","unstructured":"Phuc Cuong Ngo, Amadeus Aristo Winarto, Connie Khor Li Kou, Sojeong Park, Farhan Akram, and Hwee Kuan Lee. 2019. Fence GAN: Towards better anomaly detection. In Proceedings of the 2019 IEEE 31st International Conference on Tools with Artificial Intelligence. IEEE, 141\u2013148."},{"issue":"14","key":"e_1_3_1_36_2","first-page":"1","article-title":"N-GAN: A novel anomaly-based network intrusion detection with generative adversarial networks","volume":"14","author":"Iliyasu Auwal Sani","year":"2022","unstructured":"Auwal Sani Iliyasu and Huifang Deng. 2022. N-GAN: A novel anomaly-based network intrusion detection with generative adversarial networks. International Journal of Information Technology 14, 14 (2022), 1\u201311.","journal-title":"International Journal of Information Technology"},{"issue":"11","key":"e_1_3_1_37_2","doi-asserted-by":"crossref","first-page":"e4578","DOI":"10.1002\/ett.4578","article-title":"Block chain fostered cycle-consistent generative adversarial network framework espoused intrusion detection for protecting IoT network","volume":"33","author":"Sugitha G.","year":"2022","unstructured":"G. Sugitha, A. Solairaj, and J. Suresh. 2022. Block chain fostered cycle-consistent generative adversarial network framework espoused intrusion detection for protecting IoT network. Transactions on Emerging Telecommunications Technologies 33, 11 (2022), e4578.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"e_1_3_1_38_2","first-page":"212","volume-title":"Proceedings of the ITASEC","author":"Scicchitano Francesco","year":"2020","unstructured":"Francesco Scicchitano, Angelica Liguori, Massimo Guarascio, Ettore Ritacco, and Giuseppe Manco. 2020. A deep learning approach for detecting security attacks on blockchain. In Proceedings of the ITASEC. 212\u2013222."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402618"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_1_41_2","unstructured":"Houssam Zenati Chuan Sheng Foo Bruno Lecouat Gaurav Manek and Vijay Ramaseshan Chandrasekhar. 2018. Efficient gan-based anomaly detection. arXiv:1802.06222. Retrieved from https:\/\/arxiv.org\/abs\/1802.06222."},{"key":"e_1_3_1_42_2","volume-title":"GAN-Based Image Data Augmentation","author":"Liu David","year":"2020","unstructured":"David Liu and Nathan Hu. 2020. GAN-Based Image Data Augmentation. Stanford University."},{"key":"e_1_3_1_43_2","article-title":"Modeling tabular data using conditional gan","volume":"32","author":"Xu Lei","year":"2019","unstructured":"Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. Advances in Neural Information Processing Systems 32 (2019).","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"493","key":"e_1_3_1_44_2","first-page":"497","article-title":"GAN-based anomaly detection: A review","volume":"493","author":"Xia Xuan","year":"2022","unstructured":"Xuan Xia, Xizhou Pan, Nan Li, Xing He, Lin Ma, Xiaoguang Zhang, and Ning Ding. 2022. GAN-based anomaly detection: A review. Neurocomputing 493, 493 (2022), 497\u2013535.","journal-title":"Neurocomputing"},{"key":"e_1_3_1_45_2","unstructured":"Eric Jang Shixiang Gu and Ben Poole. 2016. Categorical reparameterization with gumbel-softmax. arXiv:1611.01144. Retrieved from https:\/\/arxiv.org\/abs\/1611.01144."},{"key":"e_1_3_1_46_2","article-title":"Improved training of wasserstein gans","volume":"30","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron Courville. 2017. Improved training of wasserstein gans. Advances in Neural Information Processing Systems 30 (2017).","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"4","key":"e_1_3_1_47_2","first-page":"865","article-title":"Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures","volume":"15","author":"Bahrami Pooneh Nikkhah","year":"2019","unstructured":"Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, and Hamid H. S. Javadi. 2019. Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures. Journal of Information Processing Systems 15, 4 (2019), 865\u2013889.","journal-title":"Journal of Information Processing Systems"},{"issue":"9","key":"e_1_3_1_48_2","article-title":"A novel extra tree ensemble optimized DL framework (ETEODL) for early detection of diabetes","volume":"9","author":"Arya Monika","year":"2021","unstructured":"Monika Arya, Hanumat Sastry, Anand Motwani, Sunil Kumar, and Atef Zaguia. 2021. A novel extra tree ensemble optimized DL framework (ETEODL) for early detection of diabetes. Frontiers in Public Health 9, 9 (2021).","journal-title":"Frontiers in Public Health"},{"key":"e_1_3_1_49_2","first-page":"399","volume-title":"Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics","author":"Patki Neha","year":"2016","unstructured":"Neha Patki, Roy Wedge, and Kalyan Veeramachaneni. 2016. The synthetic data vault. In Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics. IEEE, 399\u2013410."},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"e_1_3_1_51_2","first-page":"61","volume-title":"Proceedings of the International Conference on Advances in Cyber Security","author":"Salam Al-E\u2019mari","year":"2020","unstructured":"Al-E\u2019mari Salam, Mohammed Anbar, Yousef Sanjalawe, and Selvakumar Manickam. 2020. A labeled transactions-based dataset on the ethereum network. In Proceedings of the International Conference on Advances in Cyber Security. Springer, 61\u201379."},{"issue":"150","key":"e_1_3_1_52_2","doi-asserted-by":"crossref","first-page":"113318","DOI":"10.1016\/j.eswa.2020.113318","article-title":"Detection of illicit accounts over the Ethereum blockchain","volume":"150","author":"Farrugia Steven","year":"2020","unstructured":"Steven Farrugia, Joshua Ellul, and George Azzopardi. 2020. Detection of illicit accounts over the Ethereum blockchain. Expert Systems with Applications 150, 150 (2020), 113318.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_1_53_2","first-page":"1","volume-title":"Proceedings of the 2019 15th International Conference on Network and Service Management","author":"Linoy Shlomi","year":"2019","unstructured":"Shlomi Linoy, Natalia Stakhanova, and Alina Matyukhina. 2019. Exploring Ethereum\u2019s blockchain anonymity using smart contract code attribution. In Proceedings of the 2019 15th International Conference on Network and Service Management. IEEE, 1\u20139."},{"key":"e_1_3_1_54_2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-030-33774-2_6","article-title":"A review on contemporary hole transport materials for perovskite solar cells","author":"Nair Saikumar","year":"2020","unstructured":"Saikumar Nair and Jignasa V. Gohel. 2020. A review on contemporary hole transport materials for perovskite solar cells. Nanotechnology for Energy and Environmental Engineering (2020), 145\u2013168.","journal-title":"Nanotechnology for Energy and Environmental Engineering"},{"key":"e_1_3_1_55_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency","author":"Phillips Ross","year":"2020","unstructured":"Ross Phillips and Heidi Wilder. 2020. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 1\u20138."},{"issue":"1","key":"e_1_3_1_56_2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3390\/s20010147","article-title":"A machine learning-based method for automated blockchain transaction signing including personalized anomaly detection","volume":"20","author":"Podgorelec Bla\u017e","year":"2020","unstructured":"Bla\u017e Podgorelec, Muhamed Turkanovi\u0107, and Sa\u0161o Karakati\u010d. 2020. A machine learning-based method for automated blockchain transaction signing including personalized anomaly detection. Sensors 20, 1 (2020), 147.","journal-title":"Sensors"},{"issue":"7","key":"e_1_3_1_57_2","doi-asserted-by":"crossref","first-page":"37575","DOI":"10.1109\/ACCESS.2019.2905769","article-title":"Exploiting blockchain data to detect smart ponzi schemes on ethereum","volume":"7","author":"Chen Weili","year":"2019","unstructured":"Weili Chen, Zibin Zheng, Edith C.-H. Ngai, Peilin Zheng, and Yuren Zhou. 2019. Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7, 7 (2019), 37575\u201337586.","journal-title":"IEEE Access"},{"issue":"2","key":"e_1_3_1_58_2","first-page":"1156","article-title":"Who are the phishers? Phishing scam detection on ethereum via network embedding","volume":"52","author":"Wu Jiajing","year":"2020","unstructured":"Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2020. Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems 52, 2 (2020), 1156\u20131166.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"e_1_3_1_59_2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-981-13-6861-5_17","volume-title":"Proceedings of the Advances in Computer Communication and Computational Sciences","author":"Sharaff Aakanksha","year":"2019","unstructured":"Aakanksha Sharaff and Harshil Gupta. 2019. Extra-tree classifier with metaheuristics approach for e-mail classification. In Proceedings of the Advances in Computer Communication and Computational Sciences. Springer, 189\u2013197."}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:59Z","timestamp":1750268999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3584666"],"URL":"https:\/\/doi.org\/10.1145\/3584666","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"value":"2769-6472","type":"print"},{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,8]]},"assertion":[{"value":"2021-12-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}