Computer Science ›› 2024, Vol. 51 ›› Issue (7): 422-429.doi: 10.11896/jsjkx.230400177
• Information Security • Previous Articles
LI Zhiyuan1,2,3, XU Binglei1, ZHOU Yingyi1
CLC Number:
[1]TREIBLMAIER H,GARAUS M.Using blockchain tosignal quality in the food supply chain:The impact on consumer purchase intentions and the moderating effect of brand familiarity[J].International Journal of Information Management,2023,68:102514. [2]ZHOU X,YANG W,TIAN X.Detecting Phishing Accounts on Ethereum Based on Transaction Records and EGAT[J].Electronics,2023,12(4):993. [3]XIA Y,LIU J,WU J.Phishing detection on ethereum via attri-buted ego-graph embedding[J].IEEE Transactions on Circuits and Systems II:Express Briefs,2022,69(5):2538-2542. [4]GU Z,LIN D,WU J.On-chain analysis-based detection of ab-normal transaction amount on cryptocurrency exchanges[J].Physica A:Statistical Mechanics and its Applications,2022,604:127799. [5]LIAO Z,ZHENG Z,CHEN X,et al.SmartDagger:a bytecode-based static analysis approach for detecting cross-contract vulnerability[C]//Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis.2022:752-764. [6]ZHENG P,ZHENG Z,LUO X.Park:Accelerating smart contract vulnerability detection via parallel-fork symbolic execution[C]//Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis.2022:740-751. [7]Chainalysis.The 2022 Crypto Crime Report[EB/ OL].ht-tps://www.chainalysis.com/blog/2024-crypto-crime-report-in-troduction/. [8]WU J,LIU J,ZHAO Y,et al.Analysis of cryptocurrency transactions from a network perspective:An overview[J].Journal of Network and Computer Applications,2021,190:103139. [9]ZHENG B,ZHU L,SHEN M,et al.Malicious bitcoin transaction tracing using incidence relation clustering[C]//Mobile Networks and Management:9th International Conference,MONAMI 2017.2018:313-323. [10]MÖSER M,BÖHME R,BREUKER D.Towards risk scoring of Bitcoin transactions[C]//Financial Cryptography and Data Security:FC 2014 Workshops,BITCOIN and WAHC 2014.Christ Church,Barbados,2014:16-32. [11]ANDERSON R.Making Bitcoin Legal(Transcript of Discus-sion)[C]//Security Protocols XXVI:26th International Workshop.Cambridge,UK,2018:254-265. [12]TOVANICH N,CAZABET R.Pattern Analysis of MoneyFlows in the Bitcoin Blockchain[C]//International Conference on Complex Networks and Their Applications.Cham:Springer International Publishing,2022:443-455. [13]ZHAO C,GUAN Y.A graph-based investigation of bitcointransactions[C]//Advances in Digital Forensics XI:11th IFIP WG 11.9 International Conference.Orlando,FL,USA,2015:79-95. [14]PHETSOUVANH S,OGGIER F,DATTA A.Egret:Extortion graph exploration techniques in the bitcoin network[C]//2018 IEEE International Conference on Data Mining Workshops(ICDMW).2018:244-251. [15]YOUSAF H,KAPPOS G,MEIKLEJOHN S.Tracing transactions across cryptocurrency ledgers[C]//28th USENIX Security Symposium(USENIX Security 19).2019:837-850. [16]HASLHOFER B,KARL R,FILTZ E.O Bitcoin Where ArtThou? Insight into Large-Scale Transaction Graphs[C]//SEMANTiCS(Posters,Demos,SuCCESS).2016. [17]ZHU H,NIU W,LIAO X,et al.Attacker Traceability onEthereum through Graph Analysis[J/OL].Security and Communication Networks,2022.https://doi.org/10.1155/2022/3448950. [18]CHEN T,LI Z,ZHU Y,et al.Understanding ethereum viagraph analysis[J].ACM Transactions on Internet Technology(TOIT),2020,20(2):1-32. [19]ZHAO Y,LIU J,HAN Q,et al.Exploring EOSIO via graphcharacterization[C]//Blockchain and Trustworthy Systems:Second International Conference(BlockSys 2020).Dali,China,2020:475-488. [20]LIN D,WU J,YUAN Q,et al.Modeling and understandingethereum transaction records via a complex network approach[J].IEEE Transactions on Circuits and Systems II:Express Briefs,2020,67(11):2737-2741. [21]SONG W,ZHANG W,WANG J,et al.Blockchain data analysis from the perspective of complex networks:Overview[J].Tsinghua Science and Technology,2022,28(1):176-206. [22]MOTAMED A P,BAHRAK B.Quantitative analysis of crypt-ocurrencies transaction graph[J].Applied Network Science,2019,4(1):1-21. [23]CHEN W,ZHANG T,CHEN Z,et al.Traveling the tokenworld:A graph analysis of ethereum erc20 token ecosystem[C]//Proceedings of The Web Conference 2020.2020:1411-1421. [24]WU Z,LIU J,WU J,et al.TRacer:Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading Systems[J].IEEE Transactions on Information Forensics and Security,2022,18:2609-2621. [25]WU Z,LIU J,WU J,et al.Know Your Transactions:Real-time and Generic Transaction Semantic Representation on Blockchain &Web3 Ecosystem[C]//Proceedings of the ACM Web Conference 2023.2023:1918-1927. [26]LIU J,ZHENG J,WU J,et al.FA-GNN:Filter and AugmentGraph Neural Networks for Account Classification in Ethereum[J].IEEE Transactions on Network Science and Engineering,2022,9:2579-2588. [27]HUANG T,LIN D,WU J.Ethereum Account ClassificationBased on Graph Convolutional Network[J].IEEE Transactions on Circuits and Systems II:Express Briefs,2022,69(5):2528-2532. [28]GU Z,LIN D,WU J.On-chain analysis-based detection of abnormal transaction amount on cryptocurrency exchanges[J].Physica A:Statistical Mechanics and its Applications,2022,604:127799. |
[1] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[2] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[3] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[4] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[5] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[6] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[7] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
[8] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[9] | ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389. |
[10] | XI Ying, WU Xuemeng, CUI Xiaohui. Node Influence Ranking Model Based on Transformer [J]. Computer Science, 2024, 51(4): 106-116. |
[11] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
[12] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
[13] | WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339. |
[14] | DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132. |
[15] | TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25. |
|