From Asset Flow to Status, Action and Intention Discovery: Early Malice
Detection in Cryptocurrency
- URL: http://arxiv.org/abs/2309.15133v1
- Date: Tue, 26 Sep 2023 07:12:59 GMT
- Title: From Asset Flow to Status, Action and Intention Discovery: Early Malice
Detection in Cryptocurrency
- Authors: Ling Cheng, Feida Zhu, Yong Wang, Ruicheng Liang, Huiwen Liu
- Abstract summary: An ideal detection model is expected to achieve all three critical properties of (I) early detection, (II) good interpretability, and (III) versatility for various illicit activities.
We propose Intention-Monitor for early malice detection in Bitcoin (BTC), where the on-chain record data for a certain address are much scarcer than other cryptocurrency platforms.
Our model is highly interpretable and can detect various illegal activities.
- Score: 9.878712887719978
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cryptocurrency has been subject to illicit activities probably more often
than traditional financial assets due to the pseudo-anonymous nature of its
transacting entities. An ideal detection model is expected to achieve all three
critical properties of (I) early detection, (II) good interpretability, and
(III) versatility for various illicit activities. However, existing solutions
cannot meet all these requirements, as most of them heavily rely on deep
learning without interpretability and are only available for retrospective
analysis of a specific illicit type. To tackle all these challenges, we propose
Intention-Monitor for early malice detection in Bitcoin (BTC), where the
on-chain record data for a certain address are much scarcer than other
cryptocurrency platforms. We first define asset transfer paths with the
Decision-Tree based feature Selection and Complement (DT-SC) to build different
feature sets for different malice types. Then, the Status/Action Proposal
Module (S/A-PM) and the Intention-VAE module generate the status, action,
intent-snippet, and hidden intent-snippet embedding. With all these modules,
our model is highly interpretable and can detect various illegal activities.
Moreover, well-designed loss functions further enhance the prediction speed and
model's interpretability. Extensive experiments on three real-world datasets
demonstrate that our proposed algorithm outperforms the state-of-the-art
methods. Furthermore, additional case studies justify our model can not only
explain existing illicit patterns but can also find new suspicious characters.
Related papers
- LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts [15.071155232677643]
Decentralized Finance (DeFi) incidents have resulted in financial damages exceeding 3 billion US dollars.
Current detection tools face significant challenges in identifying attack activities effectively.
We propose a new direction for detecting DeFi attacks that focuses on identifying adversarial contracts.
arXiv Detail & Related papers (2024-01-14T11:39:33Z) - Model Stealing Attack against Graph Classification with Authenticity, Uncertainty and Diversity [80.16488817177182]
GNNs are vulnerable to the model stealing attack, a nefarious endeavor geared towards duplicating the target model via query permissions.
We introduce three model stealing attacks to adapt to different actual scenarios.
arXiv Detail & Related papers (2023-12-18T05:42:31Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Enhancing Multiple Reliability Measures via Nuisance-extended
Information Bottleneck [77.37409441129995]
In practical scenarios where training data is limited, many predictive signals in the data can be rather from some biases in data acquisition.
We consider an adversarial threat model under a mutual information constraint to cover a wider class of perturbations in training.
We propose an autoencoder-based training to implement the objective, as well as practical encoder designs to facilitate the proposed hybrid discriminative-generative training.
arXiv Detail & Related papers (2023-03-24T16:03:21Z) - Exploring Active 3D Object Detection from a Generalization Perspective [58.597942380989245]
Uncertainty-based active learning policies fail to balance the trade-off between point cloud informativeness and box-level annotation costs.
We propose textscCrb, which hierarchically filters out the point clouds of redundant 3D bounding box labels.
Experiments show that the proposed approach outperforms existing active learning strategies.
arXiv Detail & Related papers (2023-01-23T02:43:03Z) - Toward Intention Discovery for Early Malice Detection in Bitcoin [7.627156550422715]
An ideal detection model is expected to achieve all the three properties of (I) early detection, (II) good interpretability, and (III) versatility for various illicit activities.
We present asset transfer paths, which aim to describe addresses' early characteristics.
A hierarchical self-attention predictor predicts the label for the given address in real time.
arXiv Detail & Related papers (2022-09-24T13:04:22Z) - Democracy Does Matter: Comprehensive Feature Mining for Co-Salient
Object Detection [31.08198053527017]
Co-salient object detection with the target of detecting co-existed salient objects is gaining popularity.
Recent works use the attention mechanism or extra information to aggregate common co-salient features.
This paper aims to mine comprehensive co-salient features with democracy and reduce background interference.
arXiv Detail & Related papers (2022-03-11T08:02:20Z) - Online Multi-Object Tracking with Unsupervised Re-Identification
Learning and Occlusion Estimation [80.38553821508162]
Occlusion between different objects is a typical challenge in Multi-Object Tracking (MOT)
In this paper, we focus on online multi-object tracking and design two novel modules to handle these problems.
The proposed unsupervised re-identification learning module does not require any (pseudo) identity information nor suffer from the scalability issue.
Our study shows that, when applied to state-of-the-art MOT methods, the proposed unsupervised re-identification learning is comparable to supervised re-identification learning.
arXiv Detail & Related papers (2022-01-04T18:59:58Z) - One-Shot Object Affordance Detection in the Wild [76.46484684007706]
Affordance detection refers to identifying the potential action possibilities of objects in an image.
We devise a One-Shot Affordance Detection Network (OSAD-Net) that estimates the human action purpose and then transfers it to help detect the common affordance from all candidate images.
With complex scenes and rich annotations, our PADv2 dataset can be used as a test bed to benchmark affordance detection methods.
arXiv Detail & Related papers (2021-08-08T14:53:10Z) - Locally Interpretable One-Class Anomaly Detection for Credit Card Fraud
Detection [4.507860128918788]
We propose a novel anomaly detection framework for credit card fraud detection.
The fraud detection model is composed of two deep neural networks, which are trained in an unsupervised and adversarial manner.
The explanation module has three white-box explainers in charge of interpretations of the AutoEncoder, discriminator, and the whole detection model.
arXiv Detail & Related papers (2021-08-05T10:19:12Z) - Verifying Quantized Neural Networks using SMT-Based Model Checking [2.38142799291692]
We develop and evaluate a symbolic verification framework using incremental model checking (IMC) and satisfiability modulo theories (SMT)
We can provide guarantees on the safe behavior of ANNs implemented both in floating-point and fixed-point arithmetic.
For small- to medium-sized ANNs, our approach completes most of its verification runs in minutes.
arXiv Detail & Related papers (2021-06-10T18:27:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.