{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:09Z","timestamp":1775815449004,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China(No.62362021)"},{"name":"CCF-Tencent Rhino-Bird Open Research Fund (No.RAGR20230115)"},{"name":"Hainan Provincial Department of Education Project (No.HNJG2023-10)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651478","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"766-769","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Characterizing the Solana NFT Ecosystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6591-968X","authenticated-orcid":false,"given":"Dechao","family":"Kong","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6012-9178","authenticated-orcid":false,"given":"Xiaoqi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4238-8846","authenticated-orcid":false,"given":"Wenkai","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the IEEE 7th International Conference on Information Technology and Digital Applications. 1--6.","author":"Ramadhan Artha Kevin Aditya","unstructured":"Kevin Aditya Ramadhan Artha, Sarah Noor Zain, Azhar Ashhafa Alkautsar, and Mochammad Haldi Widianto. Implementation of Smart Contracts for E-Certificate as Non-Fungible Token using Solana Network 2022. In Proceedings of the IEEE 7th International Conference on Information Technology and Digital Applications. 1--6."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the ACM SIGMOD international conference on Management of data. 93--104","author":"Breunig Markus M","unstructured":"Markus M Breunig, Hans-Peter Kriegel, Raymond T Ng, and J\u00f6rg Sander. LOF: identifying density-based local outliers 2000. In Proceedings of the ACM SIGMOD international conference on Management of data. 93--104."},{"key":"e_1_3_2_2_3_1","unstructured":"Crypto.com. 2022. 2021 Crypto Market Sizing Report 2022 Forecast. https:\/\/assets.ctfassets.net\/hfgyig42jimx\/5i8TeN1QYJDjn82pSuZB5S\/85c7c9393f3ee67e456ec780f9bf11e3\/Cryptodotcom_Crypto_Market_Sizing_Jan2022.pdf"},{"key":"e_1_3_2_2_4_1","unstructured":"cryptoslam. 2023. solana sales volume. https:\/\/www.cryptoslam.io\/blockchains\/solana?headerPeriod=all"},{"key":"e_1_3_2_2_5_1","unstructured":"cryptoslam.io. 2023. Solana NFTs in 2023 - A Comprehensive Guide to their Unparalleled Benefits. https:\/\/www.cryptoslam.io\/blockchains\/solana?headerPeriod=all&timeFrame=year"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 667--681","author":"Das Dipanjan","unstructured":"Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, and Giovanni Vigna. Understanding security issues in the NFT ecosystem 2022. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 667--681."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2022.101794"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.10.028"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 36th Annual ACM Symposium on Applied Computing. 1584--1587","author":"Li Xiaoqi","unstructured":"Xiaoqi Li, Ting Chen, Xiapu Luo, and Chenxu Wang. CLUE: towards discovering locked cryptocurrencies in ethereum 2021. In Proceedings of the 36th Annual ACM Symposium on Applied Computing. 1584--1587."},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the Information Security: 23rd International Conference. 352--371","author":"Li Xiaoqi","unstructured":"Xiaoqi Li, Ting Chen, Xiapu Luo, and Jiangshan Yu. Characterizing erasable accounts in ethereum 2020. In Proceedings of the Information Security: 23rd International Conference. 352--371."},{"key":"e_1_3_2_2_11_1","volume-title":"An overview of AI and blockchain integration for privacy-preserving","author":"Li Zongwei","year":"2023","unstructured":"Zongwei Li, Dechao Kong, Yuanzheng Niu, Hongli Peng, Xiaoqi Li, and Wenkai Li. An overview of AI and blockchain integration for privacy-preserving 2023. arXiv preprint arXiv:2305.03929."},{"key":"e_1_3_2_2_12_1","unstructured":"MagicEden. 2024. . https:\/\/magiceden.io\/"},{"key":"e_1_3_2_2_13_1","volume-title":"Automated Smart Contract Summarization via LLMs","author":"Mao Yingjie","year":"2024","unstructured":"Yingjie Mao, Xiao Li, Zongwei Li, and Wenkai Li. Automated Smart Contract Summarization via LLMs 2024. arXiv preprint arXiv:2402.04863."},{"key":"e_1_3_2_2_14_1","volume-title":"A New High-Performance Approach to Approximate Pattern-Matching for Plagiarism Detection in Blockchain-Based Non-Fungible Tokens (NFTs)","author":"Pungila Ciprian","year":"2022","unstructured":"Ciprian Pungila, Darius Galis, and Viorel Negru. A New High-Performance Approach to Approximate Pattern-Matching for Plagiarism Detection in Blockchain-Based Non-Fungible Tokens (NFTs) 2022. arXiv preprint arXiv:2205.14492."},{"key":"e_1_3_2_2_15_1","unstructured":"solscan. 2024. . https:\/\/solscan.io\/nfts"},{"key":"e_1_3_2_2_16_1","unstructured":"Bijan Stephen. 2021. Nft mania is here so are the scammers. https:\/\/www.theverge.com\/2021\/3\/20\/ 22334527\/nft-scams-artists-opensea-rarible-marble-cards-fraud-art"},{"key":"e_1_3_2_2_17_1","unstructured":"TENSOR. 2024. . https:\/\/www.tensor.trade\/"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the ACM Web Conference. 2099--2109","author":"Wang Ziwei","unstructured":"Ziwei Wang, Jiashi Gao, and Xuetao Wei. Do NFTs' Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility 2023. In Proceedings of the ACM Web Conference. 2099--2109."},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems. 1--15","author":"Wen Xiaolin","unstructured":"Xiaolin Wen, Yong Wang, Xuanwu Yue, Feida Zhu, and Min Zhu. NFTDisk: Visual Detection of Wash Trading in NFT Markets 2023. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1--15."},{"key":"e_1_3_2_2_20_1","volume-title":"Companion Proceedings of the Web Conference. 488--496","author":"White Bryan","unstructured":"Bryan White, Aniket Mahanti, and Kalpdrum Passi. Characterizing the OpenSea NFT marketplace 2022. In Companion Proceedings of the Web Conference. 488--496."},{"key":"e_1_3_2_2_21_1","author":"Yin Mowen","year":"2023","unstructured":"Mowen Yin, Weikai Huang, Zhichao Liang, Quanying Liu, and Xiaoying Tang. Network analysis on cortical morphometry in first-episode schizophrenia 2023. IEEE Transactions on Cognitive and Developmental Systems.","journal-title":"IEEE Transactions on Cognitive and Developmental Systems."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the IEEE 22nd International Conference on Software Quality, Reliability and Security. 147--156","author":"Zhang Shenhui","unstructured":"Shenhui Zhang, Wenkai Li, Xiaoqi Li, and Boyi Liu. Authros: Secure data sharing among robot operating systems based on ethereum 2022. In Proceedings of the IEEE 22nd International Conference on Software Quality, Reliability and Security. 147--156."},{"key":"e_1_3_2_2_23_1","volume-title":"Wireless Networks: Cyber Security Threats and Countermeasures","author":"Zocca Matteo","unstructured":"Matteo Zocca and Hamid Jahankhani. 2023. Combining NFC Authenticated Tags with NFTs to Spot Counterfeit Luxury Products Using Solana Blockchain. In Wireless Networks: Cyber Security Threats and Countermeasures. Springer, 247--300."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:31:30Z","timestamp":1755822690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":23,"alternative-id":["10.1145\/3589335.3651478","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651478","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}