共 31 条
- [1] A Survey of Attacks on Ethereum Smart Contracts (SoK) [J]. PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 : 164 - 186
- [2] Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 259 - 277
- [3] Data mining for detecting Bitcoin Ponzi schemes [J]. 2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, : 75 - 84
- [4] Breidenbach L, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1335
- [5] Buterin Vitalik, 2014, CISC VIS NETW IND GL, V3
- [6] Camino R, 2019, Arxiv, DOI arXiv:1910.01449
- [7] XGBoost: A Scalable Tree Boosting System [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
- [8] Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum [J]. IEEE ACCESS, 2019, 7 : 37575 - 37586
- [9] Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology [J]. WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 1409 - 1418
- [10] JCLedger: A Blockchain Based Distributed Ledger for JointCloud Computing [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 289 - 293