{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:38:16Z","timestamp":1754163496381,"version":"3.41.2"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,16]]},"DOI":"10.23919\/splitech65624.2025.11091648","type":"proceedings-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:38:41Z","timestamp":1753900721000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["DL-based Framework for Detecting Malicious Proof-of-Stake Blocks in Gaming Transactions"],"prefix":"10.23919","author":[{"given":"Jay","family":"Gor","sequence":"first","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,Ahmedabad,India"}]},{"given":"Karm","family":"Dave","sequence":"additional","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,Ahmedabad,India"}]},{"given":"Neel","family":"Patel","sequence":"additional","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Electronics and Communication Engg,Ahmedabad,India"}]},{"given":"Keyaba","family":"Gohil","sequence":"additional","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,Ahmedabad,India"}]},{"given":"Rajesh","family":"Gupta","sequence":"additional","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,Ahmedabad,India"}]},{"given":"Sudeep","family":"Tanwar","sequence":"additional","affiliation":[{"name":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,Ahmedabad,India"}]},{"given":"Kashif","family":"Saleem","sequence":"additional","affiliation":[{"name":"King Saud University,Center of Excellence in Information Assurance (CoEIA),Riyadh,Saudi Arabia,12372"}]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Federal University of Piau&#x00ED; (UFPI),Teresina,PI,Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1017\/9781009057707","article-title":"Non-fungible tokens (nfts): Overview, applications and challenges","author":"Wang","year":"2022","journal-title":"Journal of Blockchain Research"},{"article-title":"Smart contract-based consensus mechanisms","volume-title":"Proceedings of Blockchain Security 2016","author":"McCorry","key":"ref2"},{"key":"ref3","article-title":"Nft-based gaming assets and their economic impact","author":"Hao","year":"2021","journal-title":"Journal of Game Studies"},{"issue":"1","key":"ref4","first-page":"10","article-title":"Nfts in gaming: Risks and solutions","volume":"3","author":"Yu","year":"2022","journal-title":"Blockchain Technology Review"},{"key":"ref5","first-page":"125","article-title":"Blockchain for supply chain: A survey","volume-title":"2019 IEEE International Conference on Blockchain","author":"Monrat"},{"key":"ref6","article-title":"The impossibility of consensus in blockchain systems","author":"Kwon","year":"2019","journal-title":"Cryptography and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"issue":"2","key":"ref8","first-page":"45","article-title":"Blockchain technology in online gaming: A review","volume":"1","author":"Zhang","year":"2021","journal-title":"Journal of Digital Gaming"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISITIA56226.2022.9855272"},{"key":"ref10","first-page":"112","article-title":"Detecting fraudulent activities in blockchain networks using machine learning","volume-title":"Proceedings of the International Conference on Blockchain","author":"Wang"},{"issue":"3","key":"ref11","first-page":"30","article-title":"A secure architecture for nft-based gaming","volume":"2","author":"Li","year":"2023","journal-title":"Journal of Cybersecurity"},{"issue":"3","key":"ref12","first-page":"375","article-title":"Examining various ml approaches in blockchain for fraud detection","volume-title":"International Journal for Research in Applied Science and Engineering Technology (IJRASET)","volume":"12","author":"Novah","year":"2024"},{"year":"2023","key":"ref13","article-title":"Proof-of-stake blockchain dataset"}],"event":{"name":"2025 10th International Conference on Smart and Sustainable Technologies (SpliTech)","start":{"date-parts":[[2025,6,16]]},"location":"Bol and Split, Croatia","end":{"date-parts":[[2025,6,20]]}},"container-title":["2025 10th International Conference on Smart and Sustainable Technologies (SpliTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11091588\/11091382\/11091648.pdf?arnumber=11091648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T05:12:09Z","timestamp":1753938729000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11091648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/splitech65624.2025.11091648","relation":{},"subject":[],"published":{"date-parts":[[2025,6,16]]}}}