{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:16:01Z","timestamp":1777130161740,"version":"3.51.4"},"reference-count":39,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061964","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:28:16Z","timestamp":1744259296000},"page":"4775-4794","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["HNND: Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors"],"prefix":"10.32604","volume":"83","author":[{"given":"Jiling","family":"Wan","sequence":"first","affiliation":[]},{"given":"Lifeng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jinlong","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Jinhui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuehui","family":"Du","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI)","first-page":"45","article-title":"Bitcoin-NG: a scalable blockchain protocol","author":"Eyal","year":"2016 Mar"},{"key":"ref2","series-title":"Proceedings of the 26th Symposium on Operating Systems Principles (SOSP)","first-page":"51","article-title":"Algorand: scaling byzantine agreements for cryptocurrencies","author":"Gilad","year":"2017 Oct"},{"key":"ref3","series-title":"Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC)","first-page":"238","article-title":"Shrec: bandwidth-efficient transaction relay in high-throughput blockchain systems","author":"Han","year":"2020 Oct"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","author":"Lewenberg","year":"2015","journal-title":"Proceedings of the Financial Cryptography and Data Security (FC)"},{"key":"ref5","series-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC)","first-page":"515","article-title":"A decentralized blockchain with high throughput and fast confirmation","author":"Li","year":"2020"},{"key":"ref6","series-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","first-page":"583","article-title":"OmniLedger: a secure, scale-out, decentralized ledger via sharding","author":"KokorisKogias","year":"2018"},{"key":"ref7","series-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)","first-page":"817","article-title":"Erlay: efficient transaction relay for bitcoin","author":"Naumenko","year":"2019 Nov"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"129102","DOI":"10.1007\/s11432-023-3828-7","article-title":"A blockchain-based data auditing scheme with key-exposure resistance for IIoT","volume":"67","author":"Yang","year":"2024 Jan","journal-title":"Sci China Inf Sci"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"64861","DOI":"10.1109\/ACCESS.2024.3395918","article-title":"The role of blockchain in finance beyond cryptocurrency: trust, data management, and automation","volume":"12","author":"Chen","year":"2024","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"119890","DOI":"10.1016\/j.ins.2023.119890","article-title":"Selection of a viable blockchain service provider for data management within the internet of medical things: an MCDM approach to Indian healthcare","volume":"657","author":"Krishankumar","year":"2024 Mar","journal-title":"Inf Sci"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1093\/comjnl\/bxac155","article-title":"A system for storing anonymous patient healthcare data using blockchain and its applications","volume":"67","author":"Oksuz","year":"2024 Jan","journal-title":"Comput J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"110472","DOI":"10.1016\/j.comnet.2024.110472","article-title":"Privacy-preserving and scalable federated blockchain scheme for Healthcare 4.0","volume":"247","author":"Salim","year":"2024 Jul","journal-title":"Comput Netw"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1631\/FITEE.2300215","article-title":"Convergence of blockchain and internet of things: integration, security, and use cases","volume":"25","author":"Dama\u0161evi\u010dius","year":"2024 Oct","journal-title":"Front Inform Technol Electron Eng"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1093\/comjnl\/bxad079","article-title":"A blockchain-based public key infrastructure for IoT-based healthcare systems","volume":"67","author":"Joseph Antony","year":"2024 Apr","journal-title":"Comput J"},{"key":"ref15","first-page":"1","article-title":"A survey on ethereum systems security: vulnerabilities, attacks, and defenses","volume":"53","author":"Chen","year":"2020 Jun","journal-title":"ACM Comput Surv"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1109\/TSMC.2021.3049278","article-title":"Detecting mixing services via mining bitcoin transaction network with hybrid motifs","volume":"52","author":"Wu","year":"2022 Apr","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"103412","DOI":"10.1016\/j.ipm.2023.103412","article-title":"Phishing scams detection via temporal graph attention network in ethereum","volume":"60","author":"Wang","year":"2023 Jul","journal-title":"Inf Process Manag"},{"key":"ref18","series-title":"Proceedings of the 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"Blockchain security attack: a brief survey","author":"Anita","year":"2019 Jul"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"152802","DOI":"10.1007\/s11704-020-9284-9","article-title":"Ethereum smart contract security research: survey and future research opportunities","volume":"15","author":"Wang","year":"2020 Oct","journal-title":"Front Comput Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"103858","DOI":"10.1016\/j.jnca.2024.103858","article-title":"AI-enhanced blockchain technology: a review of advancements and opportunities","volume":"225","author":"Ressi","year":"2024","journal-title":"J Netw Comput Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"113318","DOI":"10.1016\/j.eswa.2020.113318","article-title":"Detection of illicit accounts over the ethereum blockchain","volume":"150","author":"Farrugia","year":"2020 Jul","journal-title":"Expert Syst Appl"},{"key":"ref22","series-title":"Proceedings of the International Conference on Information Technology (ICIT)","first-page":"488","article-title":"Illicit account detection in the ethereum blockchain using machine learning","author":"Ibrahim","year":"2021 Jul"},{"key":"ref23","series-title":"Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","first-page":"120","article-title":"Detecting malicious ethereum entities via application of machine learning classification","author":"Poursafaei","year":"2020 Sep"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/978-3-030-49785-9_7","author":"Kumar","year":"2020","journal-title":"Proceedings of the Cyber Security Cryptography and Machine Learning (CSCML)"},{"key":"ref25","series-title":"Proceedings of the IEEE International Conference on Data Mining Workshops (ICDMW)","first-page":"55","article-title":"Characterizing entities in the bitcoin blockchain","author":"Jourdan","year":"2018 Nov"},{"key":"ref26","series-title":"Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI)","first-page":"4506","article-title":"Phishing scam detection on ethereum: towards financial security for blockchain ecosystem","author":"Chen","year":"2020 Jul"},{"key":"ref27","series-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD \u201914)","first-page":"701","article-title":"DeepWalk: online learning of social representations","author":"Perozzi","year":"2014 Aug"},{"key":"ref28","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD \u201916)","first-page":"855","article-title":"Node2vec: scalable feature learning for networks","author":"Grover","year":"2016 Aug"},{"key":"ref29","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2018 Feb"},{"key":"ref30","series-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS)","first-page":"1","article-title":"Detecting phishing scams on ethereum based on transaction records","author":"Yuan","year":"2020 Oct"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/TSMC.2020.3016821","article-title":"Who are the phishers? Phishing scam detection on ethereum via network embedding","volume":"52","author":"Wu","year":"2022 Feb","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3450630","article-title":"Phishing scams detection in ethereum transaction network","volume":"21","author":"Chen","year":"2021 Feb","journal-title":"ACM Trans Internet Technol"},{"key":"ref33","series-title":"Proceedings of the 30th ACM International Conference on Information & Knowledge Management (CIKM)","first-page":"2827","article-title":"Variational graph normalized autoencoders","author":"Ahn","year":"2021 Oct"},{"key":"ref34","series-title":"Proceedings of the SIAM International Conference on Data Mining (SDM)","first-page":"594","article-title":"Deep anomaly detection on attributed networks","author":"Ding","year":"2019 May"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1007\/s10489-021-02453-9","article-title":"LSTM-TC: bitcoin coin mixing detection method with a high recall","volume":"52","author":"Sun","year":"2022 Jan","journal-title":"Appl Intell"},{"key":"ref36","series-title":"Proceedings of the ACM Web Conference (WWW)","first-page":"661","article-title":"TTAGN: temporal transaction aggregation graph network for ethereum phishing scams detection","author":"Li","year":"2022 Apr"},{"key":"ref37","unstructured":"Chung J, G\u00fclcehre C, Cho K, Bengio Y. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv:1412.3555. 2014."},{"key":"ref38","series-title":"Proceedings of the IEEE Conference on Computer Communications Workshops (WKSHPS)","first-page":"1","article-title":"SCSGuard: Deep scam detection for ethereum smart contracts","author":"Hu","year":"2022 May"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997 Nov","journal-title":"Neural Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_61964\/TSP_CMC_61964.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:28:38Z","timestamp":1763342918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061964","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}