{"id":"https://openalex.org/W4416252159","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227377","title":"TG-Transformer: A Graph Transformer for Token Transaction Risk Detection with Bi-Level Attention","display_name":"TG-Transformer: A Graph Transformer for Token Transaction Risk Detection with Bi-Level Attention","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416252159","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227377"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101350045","display_name":"Jiayue Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayue Zhou","raw_affiliation_strings":["Shanghai Jiao Tong University,SJTU Paris Elite Institute of Technology,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,SJTU Paris Elite Institute of Technology,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114585213","display_name":"Shiyao Wang","orcid":"https://orcid.org/0000-0001-5291-4945"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiyao Wang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110562345","display_name":"Jianan Hong","orcid":"https://orcid.org/0009-0000-1452-5252"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Hong","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103092835","display_name":"Wenjun Zhu","orcid":"https://orcid.org/0009-0002-1893-0014"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044004251","display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101350045"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49501676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6919999718666077,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6919999718666077,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.1225999966263771,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.019999999552965164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6460000276565552},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.583899974822998},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5325000286102295},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.427700012922287},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4226999878883362},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4133000075817108},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.36899998784065247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8245999813079834},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6460000276565552},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.583899974822998},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5325000286102295},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.427700012922287},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4226999878883362},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.421099990606308},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4133000075817108},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39239999651908875},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.36899998784065247},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35260000824928284},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31779998540878296},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C197657726","wikidata":"https://www.wikidata.org/wiki/Q174733","display_name":"Bipartite graph","level":3,"score":0.29739999771118164},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2957000136375427},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28540000319480896},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.2574999928474426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2789063661","https://openalex.org/W2897450989","https://openalex.org/W2913015533","https://openalex.org/W2983902802","https://openalex.org/W2990049382","https://openalex.org/W3012561668","https://openalex.org/W3025569729","https://openalex.org/W4284891981","https://openalex.org/W4385194686","https://openalex.org/W4385764404","https://openalex.org/W4390467969","https://openalex.org/W4392203343","https://openalex.org/W4405182388","https://openalex.org/W4415798193"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,47,73,89,116],"novel":[4],"approach":[5],"for":[6,100],"detecting":[7,109],"fraudulent":[8],"tokens":[9],"in":[10,108],"blockchain":[11,121],"transactions":[12],"using":[13],"an":[14],"enhanced":[15],"Graphs":[16,18],"of":[17,32,76],"model.":[19],"By":[20],"leveraging":[21],"blockchain\u2019s":[22],"inherent":[23],"transparency":[24],"and":[25,39,57,64,111,123],"immutability,":[26],"our":[27],"method":[28],"enables":[29,72],"precise":[30],"tracking":[31],"transactional":[33],"patterns,":[34],"enhancing":[35],"fraud":[36,110],"detection":[37],"capabilities":[38],"market":[40],"forecast":[41],"within":[42],"decentralized":[43],"ecosystems.":[44],"We":[45],"introduce":[46],"self-attention":[48],"mechanism,":[49],"Transaction-To-Token":[50],"Attention":[51],"(T2T-Attention),":[52],"which":[53],"captures":[54],"both":[55],"wallet-level":[56],"token-level":[58],"information":[59],"by":[60],"maintaining":[61],"detailed":[62],"node":[63],"cluster":[65,90],"interactions.":[66],"Unlike":[67],"traditional":[68],"graph":[69],"coarsening,":[70],"T2T-Attention":[71],"fine-grained":[74],"analysis":[75],"token":[77],"transfer":[78],"activities,":[79],"preserving":[80],"transaction-level":[81],"details":[82],"while":[83],"also":[84],"modeling":[85],"inter-token":[86],"relationships":[87],"at":[88],"level.":[91],"To":[92],"address":[93],"computational":[94],"complexity,":[95],"we":[96],"use":[97],"kernelized":[98],"softmax":[99],"efficient":[101],"processing.":[102],"Our":[103],"model":[104],"outperforms":[105],"existing":[106],"methods":[107],"classifying":[112],"token-related":[113],"risks,":[114],"offering":[115],"scalable":[117],"solution":[118],"to":[119],"enhance":[120],"security":[122],"DeFi":[124],"risk":[125],"management.":[126]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
