{"id":"https://openalex.org/W4416707450","doi":"https://doi.org/10.1109/tifs.2025.3637670","title":"Trans2Graph: Mining Ethereum Phishers With Graph on Heterogeneous Temporal Transaction Data","display_name":"Trans2Graph: Mining Ethereum Phishers With Graph on Heterogeneous Temporal Transaction Data","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416707450","doi":"https://doi.org/10.1109/tifs.2025.3637670"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3637670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3637670","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021472169","display_name":"Jieli Liu","orcid":"https://orcid.org/0000-0001-8158-3735"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jieli Liu","raw_affiliation_strings":["School of Software Engineering, Sun Yat-sen University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031531093","display_name":"Jiajing Wu","orcid":"https://orcid.org/0000-0001-5155-8547"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajing Wu","raw_affiliation_strings":["School of Software Engineering, Sun Yat-sen University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018918343","display_name":"J. Chen","orcid":"https://orcid.org/0009-0006-6300-7287"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinze Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038044319","display_name":"Yiyue Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiyue Cao","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012731436","display_name":"Zibin Zheng","orcid":"https://orcid.org/0000-0001-7872-7718"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zibin Zheng","raw_affiliation_strings":["School of Software Engineering, Sun Yat-sen University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021472169"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49072526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"12950","last_page":"12963"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.5575000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.5575000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.21950000524520874,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.025699999183416367,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.652999997138977},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6449999809265137},{"id":"https://openalex.org/keywords/transaction-data","display_name":"Transaction data","score":0.6208999752998352},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5612000226974487},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.45570001006126404},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.414900004863739},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.36469998955726624},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3546000123023987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.833899974822998},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.652999997138977},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6449999809265137},{"id":"https://openalex.org/C127722929","wikidata":"https://www.wikidata.org/wiki/Q7833714","display_name":"Transaction data","level":3,"score":0.6208999752998352},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5612000226974487},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47029998898506165},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.45570001006126404},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.414900004863739},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.36469998955726624},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C2781221856","wikidata":"https://www.wikidata.org/wiki/Q840247","display_name":"Hypergraph","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C2780898871","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Performance metric","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27730000019073486},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.27720001339912415},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.26750001311302185},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.2662999927997589},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2639999985694885},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3637670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3637670","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1954178617","display_name":null,"funder_award_id":"24lgqb018","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2092827959","display_name":null,"funder_award_id":"62372485","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2795951424","display_name":null,"funder_award_id":"62332004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4980977470","display_name":null,"funder_award_id":"2023A1515011314","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7014931617","display_name":null,"funder_award_id":"2023YFB2704700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7886642409","display_name":null,"funder_award_id":"2024ZDZX1001","funder_id":"https://openalex.org/F4320326279","funder_display_name":"Department of Education of Guangdong Province"},{"id":"https://openalex.org/G7955673215","display_name":null,"funder_award_id":"62372485, 62332004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320326279","display_name":"Department of Education of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2028223155","https://openalex.org/W2086254934","https://openalex.org/W2148485166","https://openalex.org/W2154851992","https://openalex.org/W2604314403","https://openalex.org/W2768418903","https://openalex.org/W2789063661","https://openalex.org/W2809613546","https://openalex.org/W2950635152","https://openalex.org/W2962756421","https://openalex.org/W2990806707","https://openalex.org/W3001887669","https://openalex.org/W3022662270","https://openalex.org/W3035480952","https://openalex.org/W3035733952","https://openalex.org/W3087349682","https://openalex.org/W3107357885","https://openalex.org/W3110705828","https://openalex.org/W3123330587","https://openalex.org/W3152893301","https://openalex.org/W3169741886","https://openalex.org/W3172306995","https://openalex.org/W3211638053","https://openalex.org/W3214431650","https://openalex.org/W4211037329","https://openalex.org/W4224318400","https://openalex.org/W4224903112","https://openalex.org/W4225723741","https://openalex.org/W4225751948","https://openalex.org/W4292253853","https://openalex.org/W4312332656","https://openalex.org/W4364323110","https://openalex.org/W4367046762","https://openalex.org/W4367047373","https://openalex.org/W4380551105","https://openalex.org/W4385187146","https://openalex.org/W4385245566","https://openalex.org/W4391249321"],"related_works":[],"abstract_inverted_index":{"In":[0,112],"recent":[1],"years,":[2],"phishing":[3,23,42,127,179,218],"scams":[4],"have":[5,181],"caused":[6],"huge":[7],"economic":[8],"losses":[9],"in":[10,64,68,93,184,234,250],"Ethereum,":[11],"the":[12,47,59,65,110,132,144,152,186,198,209,235],"largest":[13],"blockchain":[14],"platform":[15],"enabling":[16],"smart":[17,27,74],"contracts.":[18,75],"Many":[19],"new":[20,80,141],"sorts":[21],"of":[22,146,160,191,211],"attacks":[24],"based":[25],"on":[26,197,221,239,253],"contracts,":[28],"specifically":[29],"targeting":[30],"Ethereum":[31,41,123,148,162],"assets":[32],"such":[33,96],"as":[34,97],"Ether":[35],"and":[36,100,108,126,150,188,217,245],"tokens,":[37],"are":[38],"emerging.":[39],"Existing":[40],"detection":[43],"methods":[44,244],"usually":[45],"mine":[46,58,109],"transaction":[48,61,70,85,136,171,192,254],"relationships":[49,155],"among":[50,156],"accounts":[51,66,180],"from":[52],"block":[53],"data,":[54],"while":[55],"neglecting":[56],"to":[57,106,129],"temporal":[60,135,213],"patterns":[62,183],"inherent":[63],"themselves":[67],"different":[69],"types":[71],"introduced":[72],"by":[73],"Such":[76],"information":[77,90],"provides":[78],"a":[79,118,140,165,202,222,230,246],"perspective":[81],"for":[82,122,143,208],"analyzing":[83],"account":[84,163,241],"preferences.":[86],"However,":[87],"since":[88],"this":[89,113],"is":[91,104],"hidden":[92],"heterogeneous":[94,134,147,158,212],"data":[95,99,124,149],"trace":[98],"event":[101],"logs,":[102],"it":[103],"difficult":[105],"analyze":[107],"information.":[111],"paper,":[114],"we":[115,200],"contribute":[116],"Trans2Graph,":[117],"novel":[119,203],"graph-based":[120,243],"framework":[121],"modeling":[125],"detection,":[128],"fully":[130],"exploit":[131],"massively":[133],"data.":[137],"We":[138],"propose":[139],"paradigm":[142],"fusion":[145],"model":[151],"implicit":[153],"transition":[154,173,194,215],"multiple":[157],"transactions":[159],"each":[161],"into":[164],"heterogeneous,":[166],"temporal,":[167],"directed":[168],"multigraph":[169],"called":[170],"state":[172,193,214],"graph.":[174],"Empirical":[175],"analysis":[176],"shows":[177],"that":[178,227],"unique":[182],"both":[185],"heterogeneity":[187],"time":[189],"dynamics":[190],"graphs.":[195],"Based":[196],"analysis,":[199],"develop":[201],"attention-based":[204],"graph":[205],"neural":[206],"network":[207],"learning":[210],"graphs":[216],"detection.":[219],"Experiments":[220],"large-scale":[223],"real-world":[224],"dataset":[225],"demonstrate":[226],"Trans2Graph":[228],"achieves":[229],"minimum":[231,247],"52.57%":[232],"improvement":[233,249],"average":[236,251],"precision":[237,252],"metric":[238],"state-of-the-art":[240],"interaction":[242],"11.52%":[248],"sequence-based":[255],"methods.":[256]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-27T00:00:00"}
