Results 251 to 260 of about 49,196 (298)
Some of the next articles are maybe not open access.
IEEE Transactions on Network Science and Engineering
With Ethereum blockchain advancement, the Ethereum platform gathers numerous users. In this context, traditional phishing appears new fraud methods, resulting in significant losses.
Haojie Sun +3 more
semanticscholar +1 more source
With Ethereum blockchain advancement, the Ethereum platform gathers numerous users. In this context, traditional phishing appears new fraud methods, resulting in significant losses.
Haojie Sun +3 more
semanticscholar +1 more source
Decentralization of Ethereum's Builder Market
IEEE Symposium on Security and PrivacyBlockchains protect an ecosystem worth more than $500bn with strong security properties derived from the principle of decentralization. Is today's blockchain decentralized?
Sen Yang, Kartik Nayak, Fan Zhang
semanticscholar +1 more source
Who Wins Ethereum Block Building Auctions and Why?
Conference on Advances in Financial TechnologiesThe MEV-Boost block auction contributes approximately 90% of all Ethereum blocks. Between October 2023 and March 2024, only three builders produced 80% of them, highlighting the concentration of power within the block builder market.
Burak Öz +3 more
semanticscholar +1 more source
Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain
Distributed Ledger Technol. Res. Pract., 2023Ethereum blockchain has shown great potential in providing the next generation of the decentralized platform beyond crypto payments. Recently, it has attracted researchers and industry players to experiment with developing various Web3 applications for ...
Elnaz Rabieinejad +3 more
semanticscholar +1 more source
Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph
ACM Transactions on Software Engineering and MethodologyPonzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learning techniques that utilize static ...
Ruichao Liang +8 more
semanticscholar +1 more source
DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction Graphs
The Web ConferenceIn recent years, money laundering crimes on blockchain, especially on Ethereum, have become increasingly rampant, resulting in substantial losses. The unique features of money laundering on Ethereum, such as decentralization and pseudonymity, pose new ...
Dan-yan Lin +5 more
semanticscholar +1 more source
GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum
2024 IEEE International Conference on Web Services (ICWS)The openness and transparency of Ethereum transaction data make it easy to be exploited by any entities, executing malicious attacks. The sandwich attack manipulates the Automated Market Maker (AMM) mechanism, profiting from manipulating the market price
Zekai Liu +3 more
semanticscholar +1 more source
A Phishing Account Detection Model via Network Embedding for Ethereum
IEEE Transactions on Circuits and Systems - II - Express BriefsAs the first blockchain platform to support smart contracts, Ethereum has gained popularity and breeds various cybercrimes. Many phishing accounts on Ethereum take advantage of the blockchain’s anonymity to participate in illegal acts.
Jintao Luo +3 more
semanticscholar +1 more source
Who is Who on Ethereum? Account Labeling Using Heterophilic Graph Convolutional Network
IEEE Transactions on Systems, Man, and Cybernetics: SystemsTo combat cybercrimes and maintain financial security for the blockchain ecosystem, “know your customer” (KYC) is an essential and also challenging process due to the pseudonymity nature of blockchain technology.
Dan-yan Lin +4 more
semanticscholar +1 more source
Demistifying Ethereum Technology
2020A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled.
Prashant Kumar +2 more
openaire +1 more source

