[1]Malik S, Dedeoglu V, Trustchain S, et al. Trust management in blockchain and iot supported supply chains[C] Proc of IEEE Int Conf on Blockchain. Piscataway, NJ: IEEE, 2019: 184193[2]田国华, 胡云瀚, 陈晓峰. 区块链系统攻击与防御技术研究进展[J]. 软件学报, 2021, 32(5): 14951525[3]Toyoda K, Ohtsuki T, Mathiopoulos P T. Multiclass bitcoinenabled service identification based on transaction history summarization[C] Proc of IEEE Int Conf on Blockchain 2018. Piscataway, NJ: IEEE, 2018: 11531160[4]Lin Y J, Wu P W, Hsu C H, et al. An evaluation of bitcoin address classification based on transaction history summarization[C] Proc of IEEE Int Conf on Blockchain and Cryptocurrency (ICBC 2019). Piscataway, NJ: IEEE, 2019: 302310[5]Wu J, Yuan Q, Lin D, et al. Who are the phishers? Phishing scam detection on Ethereum via network embedding[J]. IEEE Trans on Systems, Man, and Cybernetics: Systems, 2020, 52(2): 11561166[6]Chen W, Guo X, Chen Z, et al. Phishing scam detection on Ethereum: Towards financial security for blockchain ecosystem[C] Proc of the 29th Int Joint Conf on Artificial Intelligence and 17th Pacific Rim Int Conf on Artificial Intelligence. San Francisco: Morgan Kaufmann, 2020: 45064512[7]Sf A, Jeb C, Ga A. Detection of illicit accounts over the Ethereum blockchain[J]. Expert Systems with Applications, 2020, 150: 113318[8]Jourdan M, Blandin S, Wynter L, et al. Characterizing entities in the bitcoin blockchain[C] Proc of Int Conf on Data Mining Workshops. Piscataway, NJ: IEEE, 2018: 5562[9]Kumar N, Singh A, Handa A, et al. Detecting malicious accounts on the Ethereum blockchain with supervised learning[C] Proc of Int Symp on Cyber Security Cryptography and Machine Learning. Berlin: Springer, 2020: 94109 [10]Podgorelec B, Turkanovi M, Karakati S. A machine learningbased method for automated blockchain transaction signing including personalized anomaly detection[J]. Sensors, 2019, 20(1): 147165[11]Ibrahim R F, Mohammad Elian A, Ababneh M. Illicit account detection in the Ethereum blockchain using machine learning[C] Proc of Int Conf on Information Technology (ICIT). Valencia, Spain: ICIT, 2021: 488493[12]Friedman J H. Greedy function approximation: A gradient boosting machine[J]. Annals of Statistics, 2001, 29(5): 11891232[13]Qi M, Guo K, Tai W, et al. A communicationefficient parallel algorithm for decision tree[J]. arXiv preprint, arXiv:1611.01276, 2016[14]Ke G, Meng Q, Finley T, et al. Lightgbm: A highly efficient gradient boosting decision tree[C] Advances in Neural Information Processing Systems. New York: ACM, 2017: 31493157[15]Jin R, Agrawal G. Communication and memory efficient parallel decision tree construction[C] Proc of the 2003 SIAM Int Conf on Data Mining. Philadelphia, PA: SIAM, 2003: 119129[16]魏志强, 张浩, 陈龙. 一种采用SmoteTomek和LightGBM算法的Web异常检测模型[J]. 小型微型计算机系统, 2020, 41(3): 587592[17]Li P, Wu Q, Burges C. Mcrank: Learning to rank using multiple classification and gradient boosting[C] Proc of the 20th Int Conf on Neural Information Processing Systems. New York: ACM, 2007: 897904 [18]Shi H. Bestfirst decision tree learning[D]. Hamilton: The University of Waikato, 2007[19]Sun X, Liu M, Sima Z. A novel cryptocurrency price trend forecasting model based on LightGBM[J]. Finance Research Letters, 2020, 32(C): 101084 |