Cited 10 time in
Graph Anomaly Detection with Disentangled Prototypical Autoencoder for Phishing Scam Detection in Cryptocurrency Transactions
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kang, Junha | - |
| dc.contributor.author | Buu, Seok-Jun | - |
| dc.date.accessioned | 2024-07-10T06:00:17Z | - |
| dc.date.available | 2024-07-10T06:00:17Z | - |
| dc.date.issued | 2024-06 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/71021 | - |
| dc.description.abstract | As the popularity of cryptocurrencies grows, the threat of phishing scams on trading networks is growing. Detecting unusual transactions within the complex structure of these transaction graphs and imbalanced data between Benign and Scams remains a very important task. In this paper, we present Disentangled Prototypical Graph Convolutional Autoencoder (DP-GCAE), which is optimized for detecting anomalies in cryptocurrency transactions. Our model redefines the approach to analyzing cryptocurrency transactions by treating them as edges and accounts as nodes within a graph neural network enhanced by autoencoders. The DP-GCAE model differentiates itself from existing models by implementing disentangled representation learning within its autoencoder framework. This innovative approach allows for a more nuanced capture of the complex interactions within Ethereum transaction graphs, significantly enhancing the ability of the model to discern subtle patterns often obscured in imbalanced datasets. Building upon this, the autoencoder employs a triplet network to effectively disentangle and reconstruct the graph. Reconstruction is used as input to Graph Convolutional Network to detect unusual patterns through prototyping. In experiments conducted on real Ethereum transaction data, our proposed DP-GCAE model showed remarkable performance improvements. Compared with existing graph convolution methods, the DP-GCAE model achieved a 37.7 percent point increase in F1 score, validating the effectiveness and importance of incorporating disentangled learning approaches in graph anomaly detection. These advances not only improve the F1-score of identifying phishing scams in cryptocurrency networks, but also provide a powerful framework that can be applied to a variety of graph-based anomaly detection tasks. Authors | - |
| dc.format.extent | 1 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | Graph Anomaly Detection with Disentangled Prototypical Autoencoder for Phishing Scam Detection in Cryptocurrency Transactions | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2024.3419152 | - |
| dc.identifier.scopusid | 2-s2.0-85197080916 | - |
| dc.identifier.wosid | 001263404600001 | - |
| dc.identifier.bibliographicCitation | IEEE Access, v.12, pp 1 - 1 | - |
| dc.citation.title | IEEE Access | - |
| dc.citation.volume | 12 | - |
| dc.citation.startPage | 1 | - |
| dc.citation.endPage | 1 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Anomaly detection | - |
| dc.subject.keywordAuthor | Anomaly detection | - |
| dc.subject.keywordAuthor | Blockchains | - |
| dc.subject.keywordAuthor | Cryptocurrency | - |
| dc.subject.keywordAuthor | Data models | - |
| dc.subject.keywordAuthor | Fraud | - |
| dc.subject.keywordAuthor | Graph autoencoder | - |
| dc.subject.keywordAuthor | Graph neural network | - |
| dc.subject.keywordAuthor | Phishing | - |
| dc.subject.keywordAuthor | Representation learning | - |
| dc.subject.keywordAuthor | Task analysis | - |
| dc.subject.keywordAuthor | Triplet network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
