{"id":"https://openalex.org/W4415593452","doi":"https://doi.org/10.1109/tdsc.2025.3625268","title":"AHGT-DFD: Adaptive Hierarchical Graph Transformer for Dynamic Fraud Detection in Blockchain Networks","display_name":"AHGT-DFD: Adaptive Hierarchical Graph Transformer for Dynamic Fraud Detection in Blockchain Networks","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W4415593452","doi":"https://doi.org/10.1109/tdsc.2025.3625268"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3625268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3625268","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003606386","display_name":"Jianbin Gao","orcid":"https://orcid.org/0000-0001-7014-6417"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianbin Gao","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0000-0001-7014-6417","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119413480","display_name":"Befoum Stephane Richard","orcid":"https://orcid.org/0009-0003-2316-0664"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Befoum Stephane Richard","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0009-0003-2316-0664","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079721352","display_name":"Hu Xia","orcid":"https://orcid.org/0000-0001-9851-666X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Xia","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0000-0001-9851-666X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119413478","display_name":"Kombou Victor","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kombou Victor","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0009-0005-0259-8135","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119413479","display_name":"Eyezo\u2019o Benjamin Fabien","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Eyezo\u2019o Benjamin Fabien","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0009-0003-9381-941X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026564599","display_name":"Qi Xia","orcid":"https://orcid.org/0000-0003-2245-2588"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xia","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China"],"raw_orcid":"https://orcid.org/0000-0003-2245-2588","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003606386"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15738936,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2229","last_page":"2241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6980000138282776},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.527400016784668},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.47519999742507935},{"id":"https://openalex.org/keywords/forgetting","display_name":"Forgetting","score":0.38280001282691956},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.3716000020503998},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3257000148296356},{"id":"https://openalex.org/keywords/regularization","display_name":"Regularization (linguistics)","score":0.31869998574256897},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3165999948978424}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036999702453613},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6980000138282776},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.527400016784668},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.47519999742507935},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3846000134944916},{"id":"https://openalex.org/C7149132","wikidata":"https://www.wikidata.org/wiki/Q1377840","display_name":"Forgetting","level":2,"score":0.38280001282691956},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.351500004529953},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C5465570","wikidata":"https://www.wikidata.org/wiki/Q5326898","display_name":"Early stopping","level":3,"score":0.3124000132083893},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29249998927116394},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C88871306","wikidata":"https://www.wikidata.org/wiki/Q7208287","display_name":"Point process","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.26980000734329224},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26750001311302185},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.26460000872612},{"id":"https://openalex.org/C2776760741","wikidata":"https://www.wikidata.org/wiki/Q25325235","display_name":"Financial networks","level":4,"score":0.2567000091075897},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3625268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3625268","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G572481615","display_name":null,"funder_award_id":"U22B2029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G659392923","display_name":null,"funder_award_id":"CYK2024-02-02","funder_id":"https://openalex.org/F4320312071","funder_display_name":"Ministry of Education, Libya"}],"funders":[{"id":"https://openalex.org/F4320312071","display_name":"Ministry of Education, Libya","ror":"https://ror.org/02w030k33"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322927","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2560647685","https://openalex.org/W2896916493","https://openalex.org/W2998313947","https://openalex.org/W3012871709","https://openalex.org/W4320004330","https://openalex.org/W4322706754","https://openalex.org/W4361858883","https://openalex.org/W4385064145","https://openalex.org/W4385194686","https://openalex.org/W4386363048","https://openalex.org/W4388099759","https://openalex.org/W4390818924","https://openalex.org/W4391097141","https://openalex.org/W4391216147","https://openalex.org/W4391249321","https://openalex.org/W4391774404","https://openalex.org/W4391847811","https://openalex.org/W4392910585","https://openalex.org/W4393241226","https://openalex.org/W4399426023","https://openalex.org/W4399881395","https://openalex.org/W4405231925","https://openalex.org/W4405718321","https://openalex.org/W4407937106","https://openalex.org/W4408914030","https://openalex.org/W4409883423","https://openalex.org/W4412081485"],"related_works":[],"abstract_inverted_index":{"Blockchain":[0],"fraud":[1,11,177],"detection":[2,117,130,178],"confronts":[3],"escalating":[4],"challenges":[5],"in":[6,14,18,179],"Ethereum":[7,107],"ecosystems":[8],"where":[9],"evolving":[10,144],"patterns":[12,145],"result":[13],"billions":[15],"of":[16,87],"dollars":[17],"annual":[19],"losses,":[20],"yet":[21],"existing":[22],"ap":[23],"proaches":[24],"fail":[25],"to":[26,147],"adapt":[27],"without":[28],"catastrophic":[29],"forgetting":[30],"while":[31,152],"pro":[32],"viding":[33],"no":[34],"theoretical":[35,169],"guarantees":[36,170],"for":[37,115,128,149,161,175],"financial":[38,182],"system":[39],"deployment.":[40],"This":[41,166],"paper":[42],"presents":[43],"AHGT-DFD,":[44],"a":[45,69,172],"framework":[46,137],"integrating":[47],"four":[48],"ML":[49],"techniques":[50],"automated":[51],"pattern":[52],"discovery":[53],"through":[54],"Dirichlet":[55],"process":[56],"priors,":[57],"hierarchical":[58],"variational":[59],"learning,":[60],"heterogeneous":[61],"graph":[62],"transformers,":[63],"and":[64,96,123],"continual":[65],"learning":[66],"mechanisms":[67],"into":[68],"theoretically":[70],"grounded":[71],"system.":[72],"We":[73],"provide":[74],"rigorous":[75],"theoret":[76],"ical":[77],"foundations":[78],"including":[79],"PAC-learning":[80],"bounds":[81],"guaranteeing":[82],"generalization":[83],"performance":[84,140],"within":[85],"6.21%":[86],"empirical":[88],"error":[89],"with":[90,156,168],"95%":[91],"confidence,":[92],"polynomial-time":[93],"convergence":[94],"analysis,":[95],"certified":[97],"robustness":[98],"against":[99],"adversarial":[100],"perturbations.":[101],"Compre":[102],"hensive":[103],"evaluation":[104],"on":[105,143],"real-world":[106],"datasets":[108],"demonstrates":[109],"4.62":[110],"percentage":[111,125],"point":[112,126],"F1-score":[113],"improvement":[114,127],"Ponzi":[116],"(95.58%":[118],"vs.":[119,132],"92.15%":[120],"best":[121,134],"baseline)":[122],"4.94":[124],"phishing":[129],"(97.41%":[131],"94.47%":[133],"baseline).":[135],"The":[136],"maintains":[138],"94.2%":[139],"reten":[141],"tion":[142],"compared":[146],"78.6%":[148],"conventional":[150],"approaches,":[151],"supporting":[153],"real-time":[154],"processing":[155],"sub-15ms":[157],"inference":[158],"latency":[159],"suitable":[160],"production":[162],"blockchain":[163],"security":[164],"systems.":[165],"integration":[167],"provides":[171],"foundational":[173],"advance":[174],"dependable":[176],"adver":[180],"sarial":[181],"environments.":[183]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-28T00:00:00"}
