{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,6,22]],“日期-时间”:“2024-06-22T06:01:19Z”,“时间戳”:1719036079521},“引用-计数”:23,“发布者”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2019,7,1]],”“日期-时刻”:“2019-07-01T00:00:00 0Z“,”时间戳“:1561939200000},”内容版本“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2019,7,1]],“date-time”:“2019-07-01T00:00:00Z”,“timestamp”:1561939200000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1 5223\/policy-029“},{“开始”:{“日期部分”:[[2019,7,1]],“date-time”:“2019-07-01T00:00:00Z”,“timestamp”:1561939200000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”shortcontainer-title“:[],”published-print“:{”date-parts“:[2019,7]},“doi”:“10.1109\/区块链.2019.00042”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,1,3]],“date-time”:“2020-01-03T01:12:17Z”,“timestamp”:1578013937000},“source”:“Crossref”,“is-referenced-by-count”:51,“title”:[“基于数据挖掘的以太坊欺诈检测”],“prefix”:“10.1109”,”author“:[{“given”:”Eunjin“,”family“:”Jung“,”sequence“:”first“,”affiliation“:[]}{“给定”:“马里恩”,“家族”:“Le Tilly”,“序列”:“附加”,“从属关系”:[]},{“给定”:“阿什什”,“家庭”:“格哈尼”,“顺序”:“额外”,“隶属关系”:[]}{“key”:“ref11”,“doi-asserted-by”:“publisher”,“doi”:“10.1186\/s40163-018-0093-5”},{“key”:“ref12”,“article-title”:“大规模发现贪婪、挥霍和自杀性合同”,“author”:“nikoli?”,“year”:“0”,“journal-title“:“ACSAC’18”}的会议记录,{”key“:”ref13“,”author“:”bartoletti“,”year“2017”,“journal-ttitle“:”ponzi schemes“}的数据集”,{,“年份”:“2018”,“期刊标题”:“图标化用于欺诈ICO识别的深度学习系统”},{“key”:“ref15”,“doi断言者”:“publisher”,“doi”:“10.1007\/978-3-662-58820-8_8”},{“key”:“ref16”,“doi断言者”:“publisher”,“doi”:“10.1109\/ACCESS.2018.2874539”},{“key”:“ref17”,“year”:“2017”,“期刊标题”:“Etherscan The Ethereum block explorer”},{“key”:“ref18”,“article-title”:“下一代智能合约和去中心化应用平台”,“author”:“buterin”,“year”:“2014”,“journal-title:“以太坊白皮书”},{“key”:“ref19”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.dss.2010.008”}新闻标题“:“Quantstamp”},{“key”:“ref6”,“author”:“bartoletti”,“year”:“2017”,“journal-title”:“剖析以太坊识别分析和影响的庞氏骗局”}“”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVCBT.2018.00014”},{“key”:“ref2”,“doi-asserted-by”:”publisher“,”doi“:”10.1007\/978-3662-47854-7_4“},}“key:”ref1“,”author“:”nakamoto“,”year“2009”,“journal-title”:“比特币对等电子现金系统”}、{“密钥”:“ref9”,“year”:“2018”,“journal-title”:“ZCash”},{“key”:“ref20”,“author”:“zambre”,“年份”:“2013年”,“日志标题”:“比特币网络数据集欺诈分析”},{“key”:“ref22”,“year”:“2018”,“journal-title”:“以太坊虚拟机操作码”},“journal-title”:“WEKA Workbench在线附录“数据挖掘实用机器学习工具和技术”}],“event”:{“name”:“2019 IEEE国际区块链会议(区块链)”,“location”:“Atlanta,GA,USA”,“start”:{-“date-parts”:[[2019,7,14]]},“end”:{--“date-parts”:[2019,7,17]}},”container-title“:[“2019 IEEE国际区块链大会(区块链)”],“original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/8938397\/894120\/089466232.pdf?arnumber=8946232”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,7,18]],“date-time“”:“2022-07-18T14:48:50Z”,“timestamp”:1658155730000},“score”:1,“resource”:{“primary”:{“URL”:“https:\/\/ieexplore.iee.org\/document\/8946232\/”}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2019,7]]},‘references-count’:23,‘URL’:”http://\/dx.doi.org\/10.109\/区块链.2019.00042“,”关系“:{},”主题“:[],”发布“:{”日期部分“:[[2019,7]]}}}