Crypto Pump and Dump Detection via Deep Learning Techniques
- URL: http://arxiv.org/abs/2205.04646v1
- Date: Tue, 10 May 2022 03:24:32 GMT
- Title: Crypto Pump and Dump Detection via Deep Learning Techniques
- Authors: Viswanath Chadalapaka, Kyle Chang, Gireesh Mahajan, Anuj Vasil
- Abstract summary: pump and dump schemes are some of the most common fraudulent activity regarding cryptocurrencies.
We propose the novel application of two existing neural network architectures to this problem domain.
We show that deep learning solutions can significantly outperform all other existing pump and dump detection methods for cryptocurrencies.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Despite the fact that cryptocurrencies themselves have experienced an
astonishing rate of adoption over the last decade, cryptocurrency fraud
detection is a heavily under-researched problem area. Of all fraudulent
activity regarding cryptocurrencies, pump and dump schemes are some of the most
common. Though some studies have been done on these kinds of scams in the stock
market, the lack of labelled stock data and the volatility unique to the
cryptocurrency space constrains the applicability of studies on the stock
market toward this problem domain. Furthermore, the only work done in this
space thus far has been either statistical in nature, or has been concerned
with classical machine learning models such as random forest trees. We propose
the novel application of two existing neural network architectures to this
problem domain and show that deep learning solutions can significantly
outperform all other existing pump and dump detection methods for
cryptocurrencies.
Related papers
- On Replacing Cryptopuzzles with Useful Computation in Blockchain Proof-of-Work Protocols [0.12289361708127873]
Researchers have been pursuing the idea of replacing cryptopuzzles with useful computing tasks for over a decade.
We provide insight into the effect of introducing "usefulness" and of transitioning to task classes other than cryptopuzzles.
We discuss pertinent techniques and present research gaps in the current state-of-the-art.
arXiv Detail & Related papers (2024-04-24T08:49:41Z) - Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights [1.912429179274357]
Polkadot has gained significant attention in the digital currency landscape due to its pioneering approach to interoperability and scalability.
We map Polkadot on a palette that ranges from a thriving ecosystem to a speculative coin without compelling use cases.
Our findings demonstrate that crypto exchanges exert considerable influence on the Polkadot network, owning nearly 40% of all addresses in the ledger and absorbing at least 80% of all transactions.
arXiv Detail & Related papers (2024-04-16T13:11:02Z) - Cryptocurrency Portfolio Optimization by Neural Networks [81.20955733184398]
This paper proposes an effective algorithm based on neural networks to take advantage of these investment products.
A deep neural network, which outputs the allocation weight of each asset at a time interval, is trained to maximize the Sharpe ratio.
A novel loss term is proposed to regulate the network's bias towards a specific asset, thus enforcing the network to learn an allocation strategy that is close to a minimum variance strategy.
arXiv Detail & Related papers (2023-10-02T12:33:28Z) - An Automated Vulnerability Detection Framework for Smart Contracts [18.758795474791427]
We propose a framework to automatically detect vulnerabilities in smart contracts on the blockchain.
More specifically, first, we utilize novel feature vector generation techniques from bytecode of smart contract.
Next, the collected vectors are fed into our novel metric learning-based deep neural network(DNN) to get the detection result.
arXiv Detail & Related papers (2023-01-20T23:16:04Z) - Deep convolutional forest: a dynamic deep ensemble approach for spam
detection in text [219.15486286590016]
This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically.
As a result, the model achieved high precision, recall, f1-score and accuracy of 98.38%.
arXiv Detail & Related papers (2021-10-10T17:19:37Z) - Smart Contract Vulnerability Detection: From Pure Neural Network to
Interpretable Graph Feature and Expert Pattern Fusion [48.744359070088166]
Conventional smart contract vulnerability detection methods heavily rely on fixed expert rules.
Recent deep learning approaches alleviate this issue but fail to encode useful expert knowledge.
We develop automatic tools to extract expert patterns from the source code.
We then cast the code into a semantic graph to extract deep graph features.
arXiv Detail & Related papers (2021-06-17T07:12:13Z) - The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations [50.521292491613224]
This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump.
The pump and dump scheme is a fraud as old as the stock market. Now, it got new vitality in the loosely regulated market of cryptocurrencies.
We report on three case studies related to pump and dump groups.
arXiv Detail & Related papers (2021-05-03T10:20:47Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.