[1] |
ZHENG Z B , XIE S A , DAI H N ,et al. An overview of blockchain technology:architecture,consensus,and future trends[C]// Proceedings of 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway:IEEE Press, 2017: 557-564.
|
[2] |
ZHENG Z B , XIE S A , DAI H N ,et al. An overview on smart contracts:challenges,advances and platforms[J]. Future Generation Computer Systems, 2020,105: 475-491.
|
[3] |
TORRES C F , STEICHEN M . The art of the scam:demystifying honeypots in Ethereum smart contracts[C]// Proceedings of 28th USENIX Security Symposium (USENIX Security 19). Berkeley:USENIX Association, 2019: 1591-1607.
|
[4] |
CAMINO R , TORRES C F , BADEN M ,et al. A data science approach for detecting honeypots in Ethereum[C]// Proceedings of 2020 IEEE International Conference on Blockchain and Cryptocurrency. Piscata-way:IEEE Press, 2020: 1-9.
|
[5] |
CHEN W L , GUO X F , CHEN Z G ,et al. Honeypot contract risk warning on Ethereum smart contracts[C]// Proceedings of 2020 IEEE International Conference on Joint Cloud Computing. Piscataway:IEEE Press, 2020: 1-8.
|
[6] |
曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151.
|
|
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151.
|
[7] |
CONTI M , SANDEEP KUMAR E , LAL C ,et al. A survey on security and privacy issues of bitcoin[J]. IEEE Communications Surveys &Tutorials, 2018,20(4): 3416-3452.
|
[8] |
VASEK M , MOORE T . There’s no free lunch,even using bitcoin:tracking the popularity and profits of virtual currency scams[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2015: 44-61.
|
[9] |
BARTOLETTI M , CARTA S , CIMOLI T ,et al. Dissecting Ponzi schemes on Ethereum:identification,analysis,and impact[J]. Future Generation Computer Systems, 2020,102: 259-277.
|
[10] |
CHEN W L , ZHENG Z B , NGAI E C H ,et al. Exploiting blockchain data to detect smart ponzi schemes on Ethereum[J]. IEEE Access, 2019,7: 37575-37586.
|
[11] |
CHEN W L , ZHENG Z B , CUI J H ,et al. Detecting ponzi schemes on Ethereum:towards healthier blockchain technology[C]// Proceedings of the 2018 World Wide Web Conference on World Wide Web. New York:ACM Press, 2018: 409-1418.
|
[12] |
张艳梅, 楼胤成 . 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021,48(1): 273-279.
|
|
ZHANG Y M , LOU Y C . Deep neural network based ponzi scheme contract detection method[J]. Computer Science, 2021,48(1): 273-279.
|
[13] |
CHEN T Q , GUESTRIN C . XGBoost:a scalable tree boosting system[C]// Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2016: 785-794.
|
[14] |
TIKHOMIROV S , VOSKRESENSKAYA E , IVANITSKIY I ,et al. SmartCheck:static analysis of Ethereum smart contracts[C]// Proceedings of 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). Piscataway:IEEE Press, 2018: 9-16.
|
[15] |
LIU C , LIU H , CAO Z ,et al. ReGuard:finding reentrancy bugs in smart contracts[C]// Proceedings of 2018 IEEE/ACM 40th International Conference on Software Engineering:Companion (ICSE-Companion). Piscataway:IEEE Press, 2018: 65-68.
|
[16] |
JIANG B , LIU Y , CHAN W K . ContractFuzzer:fuzzing smart contracts for vulnerability detection[C]// Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. New York:ACM Press, 2018: 259-269.
|
[17] |
ZHANG Y , JIN R , ZHOU Z H . Understanding bag-of-words model:a statistical framework[J]. International Journal of Machine Learning and Cybernetics, 2010,1(1/2/3/4): 43-52.
|
[18] |
KE G , MENG Q , FINLEY T ,et al. LightGBM:a highly efficient gradient boosting decision tree[J]. Advances in Neural Information Processing Systems, 2017,30: 3146-3154.
|
[19] |
LIU H , YANG Z Q , LIU C ,et al. EClone:detect semantic clones in Ethereum via symbolic transaction sketch[C]// Proceedings of ESEC/FSE 2018:Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York:ACM Press, 2018: 900-903.
|
[20] |
施聪莺, 徐朝军, 杨晓江 . TFIDF 算法研究综述[J]. 计算机应用, 2009,29(S1): 167-170,180.
|
|
SHI C Y , XU C J , YANG X J . Study of TFIDF algorithm[J]. Journal of Computer Applications, 2009,29(S1): 167-170,180.
|
[21] |
MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint,arXiv:1301.3781, 2013.
|
[22] |
WEI J , ZOU K . EDA:easy data augmentation techniques for boosting performance on text classification tasks[C]// Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Boston:Association for Computational Linguistics, 2019: 6382-6388.
|
[23] |
ARLOT S , CELISSE A . A survey of cross-validation procedures for model selection[J]. Statistics Surveys, 2010,4: 40-79.
|
[24] |
GAL Y , GHAHRAMANI Z . A theoretically grounded application of dropout in recurrent neural networks[J]. arXiv Preprint,arXiv:1512.05287, 2015.
|