{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:48:35Z","timestamp":1730324915450,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"name":"the Strategic Priority Research Program of Chinese Academy of Sciences","award":["No.XDC02040400"]},{"name":"The National Key Research and Development Program of China","award":["No.2020YFB1006100"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512226","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T01:11:23Z","timestamp":1650849083000},"page":"661-669","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection"],"prefix":"10.1145","author":[{"given":"Sijia","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Chengshang","family":"Hou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Zhenzhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488393"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2883678"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944615"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral techniques for embedding and clustering.. In Nips Vol.\u00a014. 585\u2013591. Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral techniques for embedding and clustering.. In Nips Vol.\u00a014. 585\u2013591.","DOI":"10.7551\/mitpress\/1120.003.0080"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806512"},{"volume-title":"Accessed","year":"2021","key":"e_1_3_2_1_6_1","unstructured":"chainalysis. [n. d.]. 2021 -Crypto-Crime-Report. https:\/\/go.chainalysis.com\/2021-Crypto-Crime-Report.html . Accessed February, 2021. chainalysis. [n. d.]. 2021-Crypto-Crime-Report. https:\/\/go.chainalysis.com\/2021-Crypto-Crime-Report.html. Accessed February, 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on ethereum systems security: Vulnerabilities, attacks, and defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen , Marcus Pendleton , Laurent Njilla , and Shouhuai Xu . 2020 . A survey on ethereum systems security: Vulnerabilities, attacks, and defenses . ACM Computing Surveys (CSUR) 53 , 3 (2020), 1 \u2013 43 . Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1\u201343.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3398071","article-title":"Phishing scams detection in ethereum transaction network","volume":"21","author":"Chen Liang","year":"2020","unstructured":"Liang Chen , Jiaying Peng , Yang Liu , Jintang Li , Fenfang Xie , and Zibin Zheng . 2020 . Phishing scams detection in ethereum transaction network . ACM Transactions on Internet Technology (TOIT) 21 , 1 (2020), 1 \u2013 16 . Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, and Zibin Zheng. 2020. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology (TOIT) 21, 1 (2020), 1\u201316.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506\u20134512. Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506\u20134512.","DOI":"10.24963\/ijcai.2020\/621"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.03.022"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025\u20131035","year":"2017","author":"Hamilton L","key":"e_1_3_2_1_12_1","unstructured":"William\u00a0 L Hamilton , Rex Ying , and Jure Leskovec . 2017 . Inductive representation learning on large graphs . In Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025\u20131035 . William\u00a0L Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025\u20131035."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254506"},{"volume-title":"Long short-term memory. Neural computation 9, 8","year":"1997","author":"Hochreiter Sepp","key":"e_1_3_2_1_14_1","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735\u20131780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376207"},{"volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30","year":"2017","author":"Ke Guolin","key":"e_1_3_2_1_16_1","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30 (2017), 3146\u20133154. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30 (2017), 3146\u20133154."},{"key":"e_1_3_2_1_17_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016). Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016)."},{"key":"e_1_3_2_1_18_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308(2016). Thomas\u00a0N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308(2016)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939751"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"volume-title":"Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500","year":"2000","author":"Roweis T","key":"e_1_3_2_1_22_1","unstructured":"Sam\u00a0 T Roweis and Lawrence\u00a0 K Saul . 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 ( 2000 ), 2323\u20132326. Sam\u00a0T Roweis and Lawrence\u00a0K Saul. 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 (2000), 2323\u20132326."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_25_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008. Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008."},{"key":"e_1_3_2_1_26_1","unstructured":"Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903(2017). Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903(2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9284-9"},{"volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","year":"2014","author":"Gavin Wood","key":"e_1_3_2_1_29_1","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1\u201332. Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1\u201332."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180815"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event, Lyon France","acronym":"WWW '22"},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:03:44Z","timestamp":1700471024000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":31,"alternative-id":["10.1145\/3485447.3512226","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512226","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}