{"id":"https://openalex.org/W4295934967","doi":"https://doi.org/10.1109/tcss.2022.3203081","title":"Hide and Seek: An Adversarial Hiding Approach Against Phishing Detection on Ethereum","display_name":"Hide and Seek: An Adversarial Hiding Approach Against Phishing Detection on Ethereum","publication_year":2022,"publication_date":"2022-09-15","ids":{"openalex":"https://openalex.org/W4295934967","doi":"https://doi.org/10.1109/tcss.2022.3203081"},"language":"en","primary_location":{"id":"doi:10.1109/tcss.2022.3203081","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3203081","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058144769","display_name":"Haixian Wen","orcid":"https://orcid.org/0000-0003-4101-7514"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haixian Wen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090023699","display_name":"Junyuan Fang","orcid":"https://orcid.org/0000-0003-2225-053X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Junyuan Fang","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031531093","display_name":"Jiajing Wu","orcid":"https://orcid.org/0000-0001-5155-8547"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajing Wu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012731436","display_name":"Zibin Zheng","orcid":"https://orcid.org/0000-0001-7872-7718"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zibin Zheng","raw_affiliation_strings":["School of Software Engineering, Sun Yat-sen University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058144769"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":3.1716,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92778966,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"6","first_page":"3512","last_page":"3523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9657688140869141},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7358107566833496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7146857976913452},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6618582010269165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6052899360656738},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5398054122924805},{"id":"https://openalex.org/keywords/transaction-data","display_name":"Transaction data","score":0.4688592553138733},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41303038597106934},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36489337682724},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3247529864311218},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24923092126846313},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16830787062644958},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.12109929323196411}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9657688140869141},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7358107566833496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7146857976913452},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6618582010269165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6052899360656738},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5398054122924805},{"id":"https://openalex.org/C127722929","wikidata":"https://www.wikidata.org/wiki/Q7833714","display_name":"Transaction data","level":3,"score":0.4688592553138733},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41303038597106934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36489337682724},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3247529864311218},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24923092126846313},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16830787062644958},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.12109929323196411},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcss.2022.3203081","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3203081","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1378608539","display_name":null,"funder_award_id":"62032025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1488555145","display_name":null,"funder_award_id":"2021A1515011661","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G2678325498","display_name":null,"funder_award_id":"61973325","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1678356000","https://openalex.org/W2122111042","https://openalex.org/W2222557215","https://openalex.org/W2295594229","https://openalex.org/W2788033080","https://openalex.org/W2789063661","https://openalex.org/W2798302089","https://openalex.org/W2898479617","https://openalex.org/W2908442265","https://openalex.org/W2911964244","https://openalex.org/W2912514591","https://openalex.org/W2914953695","https://openalex.org/W2945838763","https://openalex.org/W2962700793","https://openalex.org/W2963395938","https://openalex.org/W2966149470","https://openalex.org/W2969297966","https://openalex.org/W2990806707","https://openalex.org/W3001887669","https://openalex.org/W3002238338","https://openalex.org/W3006668450","https://openalex.org/W3035480952","https://openalex.org/W3082324443","https://openalex.org/W3090450658","https://openalex.org/W3123330587","https://openalex.org/W3158706314","https://openalex.org/W3172306995","https://openalex.org/W3181143371","https://openalex.org/W3189397825","https://openalex.org/W3195763694","https://openalex.org/W4206433144","https://openalex.org/W4220971618","https://openalex.org/W4221069805","https://openalex.org/W4225359667","https://openalex.org/W4225526013","https://openalex.org/W4225751948","https://openalex.org/W4226069575","https://openalex.org/W4228997019","https://openalex.org/W4287888697","https://openalex.org/W6676769703","https://openalex.org/W6686453509","https://openalex.org/W6726873649","https://openalex.org/W6751569023","https://openalex.org/W6755124781","https://openalex.org/W6764544054"],"related_works":["https://openalex.org/W2989589039","https://openalex.org/W3007554386","https://openalex.org/W2780247929","https://openalex.org/W3108131348","https://openalex.org/W4213307675","https://openalex.org/W3005442585","https://openalex.org/W2035952186","https://openalex.org/W2000646855","https://openalex.org/W2136233809","https://openalex.org/W3095070775"],"abstract_inverted_index":{"With":[0],"the":[1,9,14,33,42,46,51,80,118,129,132,140,144,152,160],"wide":[2],"application":[3],"and":[4,110,148],"development":[5],"of":[6,16,25,45,54,61,73,82,131,143],"blockchain":[7,34,47,55],"technology,":[8],"past":[10],"years":[11],"have":[12,20,66],"witnessed":[13],"emergence":[15],"various":[17],"cybercrimes,":[18],"which":[19],"caused":[21],"a":[22,38,57,59,101,113],"huge":[23],"amount":[24],"economic":[26],"loss.":[27],"Among":[28],"them,":[29],"phishing":[30,63,84,93,103,114,124,145],"scams":[31],"on":[32,107,164],"are":[35],"regarded":[36],"as":[37,56],"serious":[39],"threat":[40],"to":[41,78,91,127],"trading":[43],"security":[44],"ecosystem.":[48],"By":[49],"modeling":[50],"transaction":[52],"data":[53],"network,":[58],"series":[60],"graph-based":[62],"detection":[64,85,104,135,146],"frameworks":[65,86],"been":[67],"proposed.":[68],"Enlightened":[69],"by":[70],"adversarial":[71,171],"attacks":[72],"graph":[74],"data,":[75],"we":[76,98],"propose":[77,100,112],"verify":[79],"robustness":[81,130,150],"current":[83],"under":[87,170],"intentional":[88],"attackers":[89],"aiming":[90],"hide":[92],"behaviors.":[94],"In":[95],"this":[96],"study,":[97],"first":[99],"general":[102,134],"framework":[105,116],"based":[106,163],"feature":[108,165],"engineering":[109,166],"then":[111],"hiding":[115,125,153],"combing":[117],"greedy":[119],"selection":[120],"mechanism":[121],"with":[122],"four":[123],"strategies":[126],"measure":[128],"proposed":[133],"models.":[136],"Extensive":[137],"experiments":[138],"evaluate":[139],"detective":[141,161],"performance":[142],"model":[147,162],"its":[149],"against":[151],"framework.":[154],"The":[155],"experimental":[156],"results":[157],"indicate":[158],"that":[159],"is":[167],"rather":[168],"fragile":[169],"attacks.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
