Implementation of Deep Neural Network in the Design of Ethereum Blockchain Scam Token Detection Applications
Abstract
Full Text:
PDFReferences
R. M. Jaya, V. D. Rakkhitta, P. Sembiring, I. S. Edbert, and D. Suhartono, “Blockchain applications in drug data records,” Procedia Comput. Sci., vol. 216, pp. 739–748, 2023, doi: 10.1016/j.procs.2022.12.191.
N. F. Samreen and M. H. Alalfi, “An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps),” Blockchain Res. Appl., vol. 4, no. 2, 2023, doi: 10.1016/j.bcra.2022.100120.
F. T. Commission, “Remarks of Chair Lina M. Khan Regarding the 6(b) Orders Concerning Deceptive Advertising on Social Media - March 16, 2022,” 2022.
K. Toyoda, P. Takis Mathiopoulos, and T. Ohtsuki, “A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification,” IEEE Access, vol. 7, pp. 74835–74848, 2019, doi: 10.1109/ACCESS.2019.2921087.
E. Badawi, G. Jourdan, and I. Onut, “Blockchain : Research and Applications The ‘ Bitcoin Generator ’ Scam,” Blockchain Res. Appl., vol. 3, no. 3, p. 100084, 2022, [Online]. Available: https://doi.org/10.1016/j.bcra.2022.100084.
R. K. Sachan, R. Agarwal, and S. K. Shukla, “Identifying malicious accounts in blockchains using domain names and associated temporal properties,” Blockchain Res. Appl., p. 100136, 2023, doi: 10.1016/j.bcra.2023.100136.
W. Cui and C. Gao, “WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies,” Blockchain Res. Appl., vol. 4, no. 1, p. 100108, 2023, doi: 10.1016/j.bcra.2022.100108.
S. Farrugia, J. Ellul, and G. Azzopardi, “Detection of illicit accounts over the Ethereum blockchain,” Expert Syst. Appl., vol. 150, p. 113318, 2020, doi: 10.1016/j.eswa.2020.113318.
Yugesh Verma, “A Complete Guide to Categorical Data Encoding,” 2021. https://analyticsindiamag.com/a-complete-guide-to-categorical-data-encoding/ (accessed Jul. 21, 2023).
S. Kohli, “Understanding a Classification Report For Your Machine Learning Model,” https://medium.com/, 2019. https://medium.com/@kohlishivam5522/understanding-a-classification-report-for-your-machine-learning-model-88815e2ce397.
P. Palinggik Allorerung, J. K. Perintis Kemerdekaan, K. Tamalanrea, K. Makassar, and S. Selatan, “SISTEMASI: Jurnal Sistem Informasi Analisis Sentimen Pada Ulasan Aplikasi WeTV di Google Play Store Menggunakan Algoritma NBC dan SVM Sentiment Analysis on WeTV App Reviews on Google Play Store Using NBC and SVM Algorithms,” vol. 12, no. 2, pp. 2540–9719, 2023, [Online]. Available: http://sistemasi.ftik.unisi.ac.id.
C. Yuan, J. Du, M. Yue, and T. Ma, “The design of large scale IP address and port scanning tool,” Sensors (Switzerland), vol. 20, no. 16, pp. 1–12, 2020, doi: 10.3390/s20164423.
S. SHARMA, “Activation Functions in Neural Networks Sigmoid, tanh, Softmax, ReLU, Leaky ReLU EXPLAINED !!!,” https://towardsdatascience.com, 2017. https://towardsdatascience.com/activation-functions-neural-networks-1cbd9f8d91d6.
X. Ying, “An Overview of Overfitting and its Solutions,” J. Phys. Conf. Ser., vol. 1168, no. 2, 2019, doi: 10.1088/1742-6596/1168/2/022022.
M. R. Iswardhana and S. Widiono, Diplomasi Siber dan Teknologi Mobile Pada Multi disiplin. 2021.
DOI: https://doi.org/10.32520/stmsi.v12i3.3162
Article Metrics
Abstract view : 315 timesPDF - 95 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.