{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:49:08Z","timestamp":1755794948307,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709399","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:42:22Z","timestamp":1743792142000},"page":"2259-2270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TEMPER: Capturing Consistent and Fluctuating TEMPoral User Behaviour for EtheReum Phishing Scam Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0106-6912","authenticated-orcid":false,"given":"Medhasree","family":"Ghosh","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6312-1782","authenticated-orcid":false,"given":"Chirag Dinesh","family":"Jain","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of California, San Diego, San Diego, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8873-8258","authenticated-orcid":false,"given":"Raju","family":"Halder","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5994-9024","authenticated-orcid":false,"given":"Joydeep","family":"Chandra","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology, Patna, Patna, Bihar, India"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"A next-generation smart contract and decentralized application platform. white paper","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. white paper, Vol. 3, 37 (2014), 2--1."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONSTEM.2019.8918887"},{"key":"e_1_3_2_2_3_1","unstructured":"Chainalysis. 2023. Crime Report. https:\/\/go.chainalysis.com\/2023-crypto-crime-report.html."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3398071"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020a. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506--4512.","DOI":"10.24963\/ijcai.2020\/621"},{"key":"e_1_3_2_2_6_1","volume-title":"Keras: The python deep learning library. Astrophysics source code library","author":"Fran\u00e7ois Chollet","year":"2018","unstructured":"Fran\u00e7ois Chollet et al. 2018. Keras: The python deep learning library. Astrophysics source code library (2018), ascl--1806."},{"key":"e_1_3_2_2_7_1","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100153"},{"key":"e_1_3_2_2_9_1","volume-title":"SpaTeD: Sparsity-Aware Tensor Decomposition-Based Representation Learning Framework for Phishing Scams Detection","author":"Ghosh Medhasree","year":"2024","unstructured":"Medhasree Ghosh, Raju Halder, and Joydeep Chandra. 2024. SpaTeD: Sparsity-Aware Tensor Decomposition-Based Representation Learning Framework for Phishing Scams Detection. IEEE Transactions on Computational Social Systems (2024)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the Conference Name. Techrxiv.","author":"Gupta Srishti","year":"2024","unstructured":"Srishti Gupta and Sourav Kumar Dandapat. 2024. SCAECE: Self & Co-Attention-based approach for Emotion Cause Extraction for moderate size dataset. In Proceedings of the Conference Name. Techrxiv."},{"key":"e_1_3_2_2_12_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_2_13_1","volume-title":"PEAE-GNN: Phishing Detection on Ethereum via Augmentation Ego-Graph Based on Graph Neural Network","author":"Huang Hexiang","year":"2024","unstructured":"Hexiang Huang, Xuan Zhang, Jishu Wang, Chen Gao, Xue Li, Rui Zhu, and Qiuying Ma. 2024. PEAE-GNN: Phishing Detection on Ethereum via Augmentation Ego-Graph Based on Graph Neural Network. IEEE Transactions on Computational Social Systems (2024)."},{"key":"e_1_3_2_2_14_1","volume-title":"Mindthedapp: a toolchain for complex network-driven structural analysis of ethereum-based decentralised applications","author":"Ibba Giacomo","year":"2024","unstructured":"Giacomo Ibba, Sabrina Aufiero, Silvia Bartolucci, Rumyana Neykova, Marco Ortu, Roberto Tonelli, and Giuseppe Destefanis. 2024. Mindthedapp: a toolchain for complex network-driven structural analysis of ethereum-based decentralised applications. IEEE Access (2024)."},{"key":"e_1_3_2_2_15_1","unstructured":"Kaggle. 2020. Kaggle Datasets. https:\/\/www.kaggle.com\/xblock\/ethereum-phishing-transaction-network."},{"key":"e_1_3_2_2_16_1","volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_17_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"volume-title":"International Conference on Learning Representations (ICLR).","author":"Thomas","key":"e_1_3_2_2_18_1","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380103"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512226"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627109"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI).","author":"Li Yaguang","year":"2019","unstructured":"Yaguang Li, Rose Yu, Cyrus Shahabi, and Yan Liu. 2019. Dynamic Graph Convolutional Networks. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI)."},{"key":"e_1_3_2_2_23_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, Vol. 32 (2019)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"volume-title":"PAKDD (1)","author":"Poursafaei Farimah","key":"e_1_3_2_2_25_1","unstructured":"Farimah Poursafaei, Reihaneh Rabbany, and Zeljko Zilic. 2021. SigTran: Signature Vectors for Detecting Illicit Activities in Blockchain Transaction Networks.. In PAKDD (1). Springer, 27--39."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00023"},{"key":"e_1_3_2_2_27_1","volume-title":"Learning representations by back-propagating errors. nature","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature, Vol. 323, 6088 (1986), 533--536."},{"key":"e_1_3_2_2_28_1","volume-title":"Attention is all you need. Advances in neural information processing systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR).","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In Proceedings of the 6th International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_30_1","volume-title":"Early-stage phishing detection on the Ethereum transaction network. Soft Computing","author":"Wan Yun","year":"2022","unstructured":"Yun Wan, Feng Xiao, and Dapeng Zhang. 2022. Early-stage phishing detection on the Ethereum transaction network. Soft Computing (2022), 1--13."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07661-0"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7993-3_15"},{"key":"e_1_3_2_2_33_1","volume-title":"Heterogeneous Network Representation Learning Approach for Ethereum Identity Identification","author":"Wang Yixian","year":"2022","unstructured":"Yixian Wang, Zhaowei Liu, Jindong Xu, and Weiqing Yan. 2022. Heterogeneous Network Representation Learning Approach for Ethereum Identity Identification. IEEE Transactions on Computational Social Systems (2022)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118463"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3159594"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9213-3_14"},{"key":"e_1_3_2_2_38_1","volume-title":"GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs","author":"Zhang Jiale","year":"2024","unstructured":"Jiale Zhang, Hao Sui, Xiaobing Sun, Chunpeng Ge, Lu Zhou, and Willy Susilo. 2024. GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs. IEEE Transactions on Services Computing (2024)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449916"}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:37:15Z","timestamp":1755358635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":39,"alternative-id":["10.1145\/3690624.3709399","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709399","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}