{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:57Z","timestamp":1750309557552,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332004 and 62372485"],"award-info":[{"award-number":["62332004 and 62372485"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011314"],"award-info":[{"award-number":["2023A1515011314"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities of China","award":["24lgqb018"],"award-info":[{"award-number":["24lgqb018"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714928","type":"proceedings-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T16:42:02Z","timestamp":1746463322000},"page":"4519-4530","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hunting in the Dark Forest: A Pre-trained Model for On-chain Attack Transaction Detection in Web3"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4633-0008","authenticated-orcid":false,"given":"Zhiying","family":"Wu","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai, China and GuangDong Engineering Technology Research Center of Blockchain, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8717-9184","authenticated-orcid":false,"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7878-4330","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai, China and GuangDong Engineering Technology Research Center of Blockchain, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6159-619X","authenticated-orcid":false,"given":"Weiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Independent, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623204"},{"key":"e_1_3_2_1_2_1","volume-title":"Build Web3 dApps on the Most Popular Blockchain. https:\/\/www.bnbchain.org\/ Retrieved","author":"Chain BNB","year":"2023","unstructured":"Binance. 2020. BNB Chain, Build Web3 dApps on the Most Popular Blockchain. https:\/\/www.bnbchain.org\/ Retrieved October 12, 2023 from"},{"key":"e_1_3_2_1_3_1","unstructured":"BlockSec. 2024. MetaSuites The Swiss Army Knife for Builders. https:\/\/blocksec.com\/metasuites."},{"volume-title":"Phalcon: Security Incidents. https:\/\/phalcon.blocksec.com\/explorer\/security-incidents.","year":"2024","key":"e_1_3_2_1_4_1","unstructured":"Blocksec. 2024. Phalcon: Security Incidents. https:\/\/phalcon.blocksec.com\/explorer\/security-incidents."},{"key":"e_1_3_2_1_5_1","volume-title":"Random forests. Machine learning","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning, Vol. 45, 1 (2001), 5--32."},{"key":"e_1_3_2_1_6_1","unstructured":"Chainalysis. 2024. The Chainalysis 2024 Crypto Crime Report: Crypto Hacking Stolen Funds. https:\/\/www.chainalysis.com\/blog\/crypto-hacking-stolen-funds-2024."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3078342"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_1_9_1","unstructured":"Vogelsteller Fabian and Buterin Vitalik. 2015. ERC20: Token Standard. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md."},{"volume-title":"Findings of the Association for Computational Linguistics: EMNLP","author":"Feng Zhangyin","key":"e_1_3_2_1_10_1","unstructured":"Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng, Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, and Ming Zhou. 2020. CodeBERT: A Pre-Trained Model for Programming and Natural Languages. In Findings of the Association for Computational Linguistics: EMNLP. Association for Computational Linguistics, Online, 1536--1547."},{"key":"e_1_3_2_1_11_1","volume-title":"Blockchain large language models. arXiv preprint arXiv:2304.12749","author":"Gai Yu","year":"2023","unstructured":"Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, and Arthur Gervais. 2023. Blockchain large language models. arXiv preprint arXiv:2304.12749 (2023)."},{"key":"e_1_3_2_1_12_1","volume-title":"web3, and the Metaverse. https:\/\/www.bennettinstitute.cam.ac.uk\/wp-content\/uploads\/2022\/03\/Policy-brief-Crypto-web3-and-the-metaverse.pdf Retrieved","author":"Gilbert Sam","year":"2022","unstructured":"Sam Gilbert. 2022. Crypto, web3, and the Metaverse. https:\/\/www.bennettinstitute.cam.ac.uk\/wp-content\/uploads\/2022\/03\/Policy-brief-Crypto-web3-and-the-metaverse.pdf Retrieved July 8, 2022 from"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the fourteenth international conference on artificial intelligence and statistics. JMLR","author":"Glorot Xavier","year":"2011","unstructured":"Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Deep sparse rectifier neural networks. In Proceedings of the fourteenth international conference on artificial intelligence and statistics. JMLR, Fort Lauderdale, FL, USA, 315--323."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00142"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_16_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_17_1","volume-title":"International conference on machine learning. ACM","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. ACM, Lille, France, 448--456."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00936"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856"},{"key":"e_1_3_2_1_20_1","volume-title":"CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts. arXiv preprint arXiv:2403.01425","author":"Lin Zewei","year":"2024","unstructured":"Zewei Lin, Jiachi Chen, Zibin Zheng, Jiajing Wu, Weizhe Zhang, and Yongjuan Wang. 2024. CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts. arXiv preprint arXiv:2403.01425 (2024)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_22_1","volume-title":"Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101","author":"Loshchilov Ilya","year":"2017","unstructured":"Ilya Loshchilov and Frank Hutter. 2017. Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"An introduction to autoencoders. arXiv preprint arXiv:2201.03898","author":"Michelucci Umberto","year":"2022","unstructured":"Umberto Michelucci. 2022. An introduction to autoencoders. arXiv preprint arXiv:2201.03898 (2022)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3271417"},{"key":"e_1_3_2_1_25_1","volume-title":"Towards automated security analysis of smart contracts based on execution property graph. arXiv preprint arXiv:2305.14046","author":"Qin Kaihua","year":"2023","unstructured":"Kaihua Qin, Zhe Ye, Zhun Wang, Weilin Li, Liyi Zhou, Chao Zhang, Dawn Song, and Arthur Gervais. 2023. Towards automated security analysis of smart contracts based on execution property graph. arXiv preprint arXiv:2305.14046 (2023)."},{"key":"e_1_3_2_1_26_1","unstructured":"SWC Registry. 2020. Smart Contract Weakness Classification (SWC). https:\/\/swcregistry.io\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084 (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In Annual Network and Distributed System Security Symposium. The Internet Society","author":"Rodler Michael","year":"2019","unstructured":"Michael Rodler, Wenting Li, Ghassan O. Karame, and Lucas Davi. 2019. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In Annual Network and Distributed System Security Symposium. The Internet Society, San Diego, California, USA."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Rodler Michael","year":"2021","unstructured":"Michael Rodler, Wenting Li, Ghassan O Karame, and Lucas Davi. 2021. {EVMPatch}: Timely and automated patching of ethereum smart contracts. In USENIX Security Symposium. USENIX Association, Vancouver, B.C., Canada, 1289--1306."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/214"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.","author":"Shixuan Guan","year":"2024","unstructured":"Guan Shixuan and Li Kai. 2024. Characterizing Ethereum Address Poisoning Attack. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00110"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Su Liya","year":"2021","unstructured":"Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil under the sun: understanding and discovering attacks on Ethereum decentralized applications. In USENIX Security Symposium. USENIX Association, Vancouver, B.C., Canada, 1307--1324."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616270"},{"key":"e_1_3_2_1_35_1","unstructured":"SunWeb3Sec. 2023. DeFi Hacks Reproduce - Foundry. https:\/\/github.com\/SunWeb3Sec\/DeFiHackLabs."},{"key":"e_1_3_2_1_36_1","volume-title":"Polygon. https:\/\/polygon.technology\/ Retrieved","author":"Team Polygon","year":"2023","unstructured":"Polygon Team. 2019. Bring the World to Ethereum, Polygon. https:\/\/polygon.technology\/ Retrieved October 12, 2023 from"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Torres Christof Ferreira","year":"2021","unstructured":"Christof Ferreira Torres, Ramiro Camino, et al. 2021. Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain. In USENIX Security Symposium. USENIX Association, Vancouver, B.C., Canada, 1343--1359."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3228122"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing. Association for Computing Machinery","author":"Wang Dabao","year":"2021","unstructured":"Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, and Kui Ren. 2021. Towards a first step to unimpderstand flash loan and its applications in defi ecosystem. In Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing. Association for Computing Machinery, New York, NY, USA, 23--28."},{"key":"e_1_3_2_1_40_1","unstructured":"Entriken William Shirley Dieter Evans Jacob and Sachs Nastassia. 2018. ERC721: Non-Fungible Token Standard. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-721.md."},{"key":"e_1_3_2_1_41_1","unstructured":"Radomski Witek Cooke Andrew Castonguay Philippe Therien James Binet Eric and Sandford Ronan. 2018. ERC1155: Multi Token Standard. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-1155.md."},{"key":"e_1_3_2_1_42_1","volume-title":"Ethereum Yellow Paper: a formal specification of Ethereum, a programmable blockchain. Accessed on: Mar","author":"Wood G","year":"2019","unstructured":"G Wood. 2019. Ethereum Yellow Paper: a formal specification of Ethereum, a programmable blockchain. Accessed on: Mar, Vol. 6 (2019)."},{"key":"e_1_3_2_1_43_1","volume-title":"DeFiRanger: Detecting DeFi Price Manipulation Attacks","author":"Wu Siwei","year":"2023","unstructured":"Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, and Xingliang Yuan. 2023b. DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Transactions on Dependable and Secure Computing (2023)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583537"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652116"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652137"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559520"},{"key":"e_1_3_2_1_48_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Zhang Mengya","year":"2020","unstructured":"Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. 2020. {TXSPECTOR}: Uncovering attacks in ethereum from transactions. In USENIX Security Symposium. USENIX Association, Boston, USA, 2775--2792."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Zhou Shunfan","year":"2020","unstructured":"Shunfan Zhou, Malte M\u00f6ser, Zhemin Yang, Ben Adida, Thorsten Holz, Jie Xiang, Steven Goldfeder, Yinzhi Cao, Martin Plattner, Xiaojun Qin, et al. 2020. An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem. In USENIX Security Symposium. USENIX Association, Boston, USA, 2793--2810."},{"key":"e_1_3_2_1_52_1","volume-title":"International conference on learning representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:54Z","timestamp":1750295934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":52,"alternative-id":["10.1145\/3696410.3714928","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714928","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}