Paper
7 March 2022 Semi-supervised graph convolutional network for Ethereum phishing scam recognition
Junjing Tang, Gansen Zhao, Bangqi Zou
Author Affiliations +
Proceedings Volume 12167, Third International Conference on Electronics and Communication; Network and Computer Technology (ECNCT 2021); 121671K (2022) https://doi.org/10.1117/12.2628705
Event: 2021 Third International Conference on Electronics and Communication, Network and Computer Technology, 2021, Harbin, China
Abstract
In recent years, as the blockchain and the cryptocurrency built on it have become popular, a large number of decentralized financial applications have been built on the Ethereum network. This makes the security issues on Ethereum attract more and more researchers' attention. Phishing scams on Ethereum have caused people to suffer huge economic losses. Recently, with the popularity of graph convolutional neural networks (GCN), many models based on GCN for node classification have emerged. However, these current GCN models are difficult to cope with the challenges caused by the lack of side information and labels of nodes in the Ethereum network. In this paper, we propose a semisupervised graph convolutional neural network model based on important neighbors for the identification of phishing scam nodes on Ethereum. In our work, we design the pretext task for the node embedding module so that our model can learn the appropriate node embedding by using a large amount of unlabeled node data. Subsequent experiments show that our proposed model is better than all other baselines, which proves the effectiveness of our model.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Junjing Tang, Gansen Zhao, and Bangqi Zou "Semi-supervised graph convolutional network for Ethereum phishing scam recognition", Proc. SPIE 12167, Third International Conference on Electronics and Communication; Network and Computer Technology (ECNCT 2021), 121671K (7 March 2022); https://doi.org/10.1117/12.2628705
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Convolution

Data modeling

Neural networks

Network security

Intelligence systems

Back to Top