CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation

被引:3
作者
Xiao, Lijun [1 ]
Han, Dezhi [1 ]
Li, Dun [1 ]
Liang, Wei [2 ,3 ]
Yang, Ce [2 ,3 ]
Li, Kuan-Ching [4 ]
Castiglione, Arcangelo [5 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
[3] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan, Peoples R China
[4] Providence Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
基金
中国国家自然科学基金;
关键词
Abnormal transaction detection; Cryptocurrency; GCN; MGU; Global representation; MODEL;
D O I
10.1007/s00500-023-08220-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid advances in computing and networking technologies, there have led to the creation of a novel and booming set of payment services, known as cryptocurrencies or digital tokens. Many are available for exchanges worldwide, inviting investors to trade with costs, quality, and safety that vary widely. Nevertheless, Blockchain transaction data have complex time and space dependencies, and historical transaction data reflect the transaction trends of cryptocurrencies to a certain extent, thus identifying the illegal behaviors of transactions such as money laundering more at the earliest. In this article, we propose a novel cryptocurrency abnormal transaction detection method with spatio-temporal and global representation, namely CTDM. CTDM combines EvolveGCN with MGU and global representations to achieve better performance. In addition, CTDM needs fewer learning parameters through MGU, which leads to less training time. Experimental results show that the proposed CTDM method outperforms SOTA Blockchain abnormal transaction detection methods.
引用
收藏
页码:11647 / 11660
页数:14
相关论文
共 56 条
[51]   Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding [J].
Wu, Jiajing ;
Yuan, Qi ;
Lin, Dan ;
You, Wei ;
Chen, Weili ;
Chen, Chuan ;
Zheng, Zibin .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (02) :1156-1166
[52]  
Wu SW, 2021, Arxiv, DOI arXiv:2104.15068
[53]   A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0 [J].
Xu, Zisang ;
Liang, Wei ;
Li, Kuan-Ching ;
Xu, Jianbo ;
Zomaya, Albert Y. ;
Zhang, Jixin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) :7118-7127
[54]   A novel competitive swarm optimized RBF neural network model for short-term solar power generation forecasting [J].
Yang, Zhile ;
Mourshed, Monjur ;
Liu, Kailong ;
Xu, Xinzhi ;
Feng, Shengzhong .
NEUROCOMPUTING, 2020, 397 :415-421
[55]   A New Crossover Mechanism for Genetic Algorithms for Steiner Tree Optimization [J].
Zhang, Qiongbing ;
Yang, Shengxiang ;
Liu, Min ;
Liu, Jianxun ;
Jiang, Lei .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3147-3158
[56]   Minimal gated unit for recurrent neural networks [J].
Zhou G.-B. ;
Wu J. ;
Zhang C.-L. ;
Zhou Z.-H. .
International Journal of Automation and Computing, 2016, 13 (3) :226-234