{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:47:50Z","timestamp":1725990470037},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583345","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3297-6991","authenticated-orcid":false,"given":"Sihao","family":"Hu","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore and Georgia Institute of Technology, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5769-8786","authenticated-orcid":false,"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7083-6311","authenticated-orcid":false,"given":"Bingqiao","family":"Luo","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4775-4005","authenticated-orcid":false,"given":"Shengliang","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8618-4581","authenticated-orcid":false,"given":"Bingsheng","family":"He","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4138-3082","authenticated-orcid":false,"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Learning role-based graph embeddings. arXiv preprint arXiv:1802.02896","author":"Ahmed K","year":"2018","unstructured":"Nesreen\u00a0K Ahmed, Ryan Rossi, John\u00a0Boaz Lee, Theodore\u00a0L Willke, Rong Zhou, Xiangnan Kong, and Hoda Eldardiry. 2018. Learning role-based graph embeddings. arXiv preprint arXiv:1802.02896 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"e_1_3_2_1_3_1","volume-title":"Icorating: A deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670","author":"Bian Shuqing","year":"2018","unstructured":"Shuqing Bian, Zhenpeng Deng, Fei Li, Will Monroe, Peng Shi, Zijun Sun, Wei Wu, Sikuang Wang, William\u00a0Yang Wang, Arianna Yuan, 2018. Icorating: A deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Weili Chen Xiongfeng Guo Zhiguang Chen Zibin Zheng and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem.. In IJCAI. 4506\u20134512.","DOI":"10.24963\/ijcai.2020\/621"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380215"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_1_7_1","unstructured":"CoinDesk. 2022. Uniswap User Loses $8M Worth of Ether in Phishing Attack. https:\/\/www.coindesk.com\/tech\/2022\/07\/12\/uniswap-user-loses-8m-worth-of-ether-in-phishing-attack."},{"key":"e_1_3_2_1_8_1","unstructured":"The\u00a0Ripple Cryptocurrency. 2022. 100s of ETH Stolen After Bee Token ICO Email List Hacked. https:\/\/theripplecryptocurrency.com\/bee-token-scam."},{"key":"e_1_3_2_1_9_1","volume-title":"Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234","author":"Daian Philip","year":"2019","unstructured":"Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2019. Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_14_1","volume-title":"Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining. In ICDE.","author":"Hu Sihao","year":"2021","unstructured":"Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, 2021. Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining. In ICDE."},{"key":"e_1_3_2_1_15_1","volume-title":"Sequence-Based Target Coin Prediction for Cryptocurrency Pump-and-Dump. SIGMOD","author":"Hu Sihao","year":"2023","unstructured":"Sihao Hu, Zhen Zhang, Shengliang Lu, Bingsheng He, and Zhao Li. 2023. Sequence-Based Target Coin Prediction for Cryptocurrency Pump-and-Dump. SIGMOD (2023)."},{"key":"e_1_3_2_1_16_1","volume-title":"International conference on machine learning. pmlr, 448\u2013456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. pmlr, 448\u2013456."},{"key":"e_1_3_2_1_17_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf N","year":"2016","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_18_1","volume-title":"Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942","author":"Lan Zhenzhong","year":"2019","unstructured":"Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2019. Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380103"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512226"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2968376"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00204"},{"key":"e_1_3_2_1_23_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73198-8_9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7993-3_1"},{"key":"e_1_3_2_1_27_1","volume-title":"Analysis of Address Linkability in Tornado Cash on Ethereum. In China Cyber Security Annual Conference. Springer, 39\u201350","author":"Tang Yujia","year":"2021","unstructured":"Yujia Tang, Chang Xu, Can Zhang, Yan Wu, and Liehuang Zhu. 2021. Analysis of Address Linkability in Tornado Cash on Ethereum. In China Cyber Security Annual Conference. Springer, 39\u201350."},{"key":"e_1_3_2_1_28_1","volume-title":"Attention is all you need. arXiv:1706.03762","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, 2017. Attention is all you need. arXiv:1706.03762 (2017)."},{"key":"e_1_3_2_1_29_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449824"},{"key":"e_1_3_2_1_31_1","volume-title":"Who are the phishers\u00bf phishing scam detection on ethereum via network embedding","author":"Wu Jiajing","year":"2020","unstructured":"Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2020. Who are the phishers\u00bf phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2020)."},{"key":"e_1_3_2_1_32_1","volume-title":"Xlnet: Generalized autoregressive pretraining for language understanding. Advances in neural information processing systems 32","author":"Yang Zhilin","year":"2019","unstructured":"Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ\u00a0R Salakhutdinov, and Quoc\u00a0V Le. 2019. Xlnet: Generalized autoregressive pretraining for language understanding. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449916"},{"key":"e_1_3_2_1_34_1","volume-title":"Behavior-aware Account De-anonymization on Ethereum Interaction Graph. arXiv preprint arXiv:2203.09360","author":"Zhou Jiajun","year":"2022","unstructured":"Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, and Qi Xuan. 2022. Behavior-aware Account De-anonymization on Ethereum Interaction Graph. arXiv preprint arXiv:2203.09360 (2022)."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:33:58Z","timestamp":1709235238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":34,"alternative-id":["10.1145\/3543507.3583345","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583345","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}