{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T19:25:59Z","timestamp":1771356359106,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733799.3762983","type":"proceedings-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:38:49Z","timestamp":1767094729000},"page":"253-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EthAegis: Featured graph based Fraud Detection in Ethereum Transactions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8615-5298","authenticated-orcid":false,"given":"Ankur","family":"Jain","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Patna, IIT Patna, Bihta, Bihar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6964-2648","authenticated-orcid":false,"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Patna, IIT Patna, Bihta, Bihar, India"}]}],"member":"320","published-online":{"date-parts":[[2025,12,30]]},"reference":[{"key":"e_1_3_3_1_2_2","volume-title":"2023 IC3 Annual Report: Cybercrime and Cryptocurrency","year":"2023","unstructured":"2023. 2023 IC3 Annual Report: Cybercrime and Cryptocurrency. Technical Report. Federal Bureau of Investigation (FBI) \u2013 Internet Crime Complaint Center (IC3). https:\/\/www.ic3.gov\/annualreport\/reports\/2023_ic3cryptocurrencyreport.pdf Accessed: 2025-03-21."},{"key":"e_1_3_3_1_3_2","unstructured":"Block Solutions\u00a0Sdn Bhd. 2015. ETHERSCAN: Block Explorer and Analytics Platform. https:\/\/static.nhtsa.gov\/odi\/inv\/2016\/INCLA-PE16007-7876.PDF"},{"key":"e_1_3_3_1_4_2","unstructured":"Vitalik Buterin et\u00a0al. 2014. A next-generation smart contract and decentralized application platform. white paper 3 37 (2014) 2\u20131."},{"key":"e_1_3_3_1_5_2","unstructured":"DappRadar. 2024. Dapp Industry Report 2024 Overview. https:\/\/dappradar.com\/blog\/dapp-industry-report-2024-overview. https:\/\/dappradar.com\/blog\/dapp-industry-report-2024-overview Accessed: 2025-03-21."},{"key":"e_1_3_3_1_6_2","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Mohammad Hasan Mohammad\u00a0Shahriar Rahman Helge Janicke and Iqbal\u00a0H Sarker. 2024. Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis. Blockchain: Research and Applications 5 3 (2024) 100207.","DOI":"10.1016\/j.bcra.2024.100207"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583345"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Hexiang Huang Xuan Zhang Jishu Wang Chen Gao Xue Li Rui Zhu and Qiuying Ma. 2024. PEAE-GNN: Phishing Detection on Ethereum via Augmentation Ego-Graph Based on Graph Neural Network. IEEE Transactions on Computational Social Systems 11 3 (2024) 4326\u20134339.","DOI":"10.1109\/TCSS.2023.3349071"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Jheng-Jia Huang Zheng-Yan Lin Nai-Wei Lo and Sheng-Feng Feng. 2025. Dynamic trust management framework using blockchain for zero-trust-based authentication in BYOD environments. Enterprise Information Systems (2025) 2457952.","DOI":"10.1080\/17517575.2025.2457952"},{"key":"e_1_3_3_1_11_2","unstructured":"Hiroki Kanezashi Toyotaro Suzumura Xin Liu and Takahiro Hirofuchi. 2022. Ethereum fraud detection with heterogeneous graph neural networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2203.12363 (2022)."},{"key":"e_1_3_3_1_12_2","volume-title":"International Conference on Learning Representations (ICLR)","author":"Kipf Thomas\u00a0N.","year":"2017","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations (ICLR). https:\/\/openreview.net\/forum?id=SJU4ayYgl"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512226"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN54977.2022.9868875"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICKG52313.2021.00020"},{"key":"e_1_3_3_1_16_2","volume-title":"International Conference on Learning Representations","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJXMpikCZ accepted as poster."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Jiajing Wu Qi Yuan Dan Lin Wei You Weili Chen Chuan Chen and Zibin Zheng. 2020. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems Man and Cybernetics: Systems 52 2 (2020) 1156\u20131166.","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Zonghan Wu Shirui Pan Fengwen Chen Guodong Long Chengqi Zhang and Philip\u00a0S Yu. 2020. A comprehensive survey on graph neural networks. IEEE transactions on neural networks and learning systems 32 1 (2020) 4\u201324.","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_3_1_19_2","volume-title":"International Conference on Learning Representations","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km"}],"event":{"name":"AISec '25: Proceedings of the 2025 Workshop on Artificial Intelligence and Security","location":"Taipei , Taiwan","acronym":"AISec '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733799.3762983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T18:55:36Z","timestamp":1771354536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733799.3762983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":18,"alternative-id":["10.1145\/3733799.3762983","10.1145\/3733799"],"URL":"https:\/\/doi.org\/10.1145\/3733799.3762983","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}