{"id":"https://openalex.org/W4409149670","doi":"https://doi.org/10.1145/3690624.3709399","title":"TEMPER: Capturing Consistent and Fluctuating TEMPoral User Behaviour for EtheReum Phishing Scam Detection","display_name":"TEMPER: Capturing Consistent and Fluctuating TEMPoral User Behaviour for EtheReum Phishing Scam Detection","publication_year":2025,"publication_date":"2025-04-04","ids":{"openalex":"https://openalex.org/W4409149670","doi":"https://doi.org/10.1145/3690624.3709399"},"language":"en","primary_location":{"id":"doi:10.1145/3690624.3709399","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709399","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3690624.3709399","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039542358","display_name":"M. K. Ghosh","orcid":"https://orcid.org/0000-0002-0106-6912"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Medhasree Ghosh","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116907035","display_name":"Chirag Dinesh Jain","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chirag Dinesh Jain","raw_affiliation_strings":["Computer Science and Engineering, University of California, San Diego, San Diego, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of California, San Diego, San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032316006","display_name":"Raju Halder","orcid":"https://orcid.org/0000-0002-8873-8258"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raju Halder","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology, Patna, Bihta, Bihar, India","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003396109","display_name":"Joydeep Chandra","orcid":"https://orcid.org/0000-0001-5994-9024"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Joydeep Chandra","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology, Patna, Patna, Bihar, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology, Patna, Patna, Bihar, India","institution_ids":["https://openalex.org/I132153292"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039542358"],"corresponding_institution_ids":["https://openalex.org/I132153292"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09080522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2259","last_page":"2270"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9454548358917236},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6081793904304504},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22487574815750122},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11571690440177917}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9454548358917236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6081793904304504},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22487574815750122},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11571690440177917}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690624.3709399","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709399","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3690624.3709399","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709399","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W569478347","https://openalex.org/W2154851992","https://openalex.org/W2901425049","https://openalex.org/W2962756421","https://openalex.org/W2988653659","https://openalex.org/W2990806707","https://openalex.org/W2992318819","https://openalex.org/W3035480952","https://openalex.org/W3082324443","https://openalex.org/W3087349682","https://openalex.org/W3098980258","https://openalex.org/W3104097132","https://openalex.org/W3155395560","https://openalex.org/W3156476623","https://openalex.org/W4224318400","https://openalex.org/W4225359667","https://openalex.org/W4226427994","https://openalex.org/W4234371342","https://openalex.org/W4292253853","https://openalex.org/W4311534380","https://openalex.org/W4385076670","https://openalex.org/W4387389727","https://openalex.org/W4389279095","https://openalex.org/W4391097141","https://openalex.org/W4399426023","https://openalex.org/W4403123544"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260"],"abstract_inverted_index":{"Phishing":[0],"scams":[1],"on":[2,28,142],"the":[3,13,19,87,111,157],"Ethereum":[4,145,169],"network":[5,61,133],"have":[6],"become":[7],"a":[8,78,125,153,165],"serious":[9],"threat,":[10],"especially":[11],"with":[12,33,135],"influx":[14],"of":[15,114],"new":[16],"users":[17],"into":[18],"cryptocurrency":[20],"market.":[21],"Current":[22],"detection":[23],"methods":[24,39],"are":[25],"mainly":[26],"focused":[27],"long-term":[29],"consistent":[30],"transaction":[31,128],"patterns":[32],"smooth":[34],"temporal":[35,137],"dynamics.":[36],"However,":[37],"these":[38,73],"often":[40],"struggle":[41],"to":[42,67,84,99,160],"differentiate":[43],"between":[44,90],"phishing":[45,115,170],"and":[46,63,92,96,131],"non-phishing":[47],"users,":[48],"whose":[49],"behaviours":[50,95],"may":[51],"appear":[52],"deceptively":[53],"similar.":[54],"Additionally,":[55],"they":[56],"face":[57],"challenges":[58],"such":[59],"as":[60],"sparsity":[62,134],"data":[64,122],"leakage,":[65],"leading":[66],"significant":[68,166],"performance":[69],"limitations.":[70],"To":[71],"address":[72],"issues,":[74],"we":[75],"introduce":[76],"TEMPER,":[77],"novel":[79,126],"sequential":[80,127],"learning":[81],"framework":[82],"designed":[83],"jointly":[85],"capture":[86],"subtle":[88],"distinctions":[89],"long-":[91],"short-term":[93,136],"user":[94,108,171],"their":[97],"correlations":[98],"provide":[100],"more":[101],"comprehensive":[102],"insights.":[103],"TEMPER":[104,120,147],"effectively":[105],"generates":[106],"distinguishable":[107],"embeddings,":[109],"enabling":[110],"accurate":[112],"identification":[113],"users.":[116],"Unlike":[117],"previous":[118],"approaches,":[119],"mitigates":[121],"leakage":[123],"through":[124],"sampling":[129],"algorithm":[130],"addresses":[132],"learning.":[138],"Through":[139],"extensive":[140],"experimentation":[141],"three":[143],"real-world":[144],"datasets,":[146],"demonstrates":[148],"its":[149],"efficacy":[150],"by":[151],"achieving":[152],"3-4%":[154],"improvement":[155],"in":[156,168],"F1-Score":[158],"compared":[159],"existing":[161],"baseline":[162],"models,":[163],"representing":[164],"advancement":[167],"detection.":[172]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
