2023
DOI: 10.3390/app13020697
|View full text |Cite
|
Sign up to set email alerts
|

Modified Genetic Algorithm with Deep Learning for Fraud Transactions of Ethereum Smart Contract

Abstract: Recently, the Ethereum smart contracts have seen a surge in interest from the scientific community and new commercial uses. However, as online trade expands, other fraudulent practices—including phishing, bribery, and money laundering—emerge as significant challenges to trade security. This study is useful for reliably detecting fraudulent transactions; this work developed a deep learning model using a unique metaheuristic optimization strategy. The new optimization method to overcome the challenges, Optimized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(12 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Slightly differently, a study enhanced LSTMs with an attention mechanism, improving the analysis of Ethereum transaction dynamics [7]. Another study integrated a genetic algorithm with Cuckoo Search to avoid local optima, enhancing scam node detection [8]. A study focusing on wash trades, a specific type of fraud in Ethereum, used a heuristic algorithm to detect scam nodes, highlighting the adaptability and effectiveness of traditional methodologies to address specific types of cryptocurrency fraud [9].…”
Section: Related Workmentioning
confidence: 99%
“…Slightly differently, a study enhanced LSTMs with an attention mechanism, improving the analysis of Ethereum transaction dynamics [7]. Another study integrated a genetic algorithm with Cuckoo Search to avoid local optima, enhancing scam node detection [8]. A study focusing on wash trades, a specific type of fraud in Ethereum, used a heuristic algorithm to detect scam nodes, highlighting the adaptability and effectiveness of traditional methodologies to address specific types of cryptocurrency fraud [9].…”
Section: Related Workmentioning
confidence: 99%
“…The solution for Equation (1) can be analyzed by equating M : V → R 2 (ρ) with ρ = ∂R, where ∂ represents the partial differential equation with respect to ∂p, ∂v i.e., ∂R ∂p∂v . Therefore, it is understood that there exists a weak sense between MPP and its boundary [25,26]. This can be analyzed by considering N-R-type boundary control and Robin-type boundary control.…”
Section: Problem Formulationmentioning
confidence: 99%
“…(1) Classification: Classification is a process that involves assigning a class label to the input data [13,14]. Mostly, a classification task allocates a single label to the input.…”
Section: Deep-learning-based Analysis Tasksmentioning
confidence: 99%