| 1 |
CHEN C , ZHANG L , LI Y H , et al. When digital economy meets Web3.0: applications and challenges. IEEE Open Journal of the Computer Society, 2022, 3, 233- 245.
doi: 10.1109/OJCS.2022.3217565
|
| 2 |
WAN S C , LIN H , GAN W S , et al. Web3: the next Internet revolution. IEEE Internet of Things Journal, 2024, 11 (21): 34811- 34825.
doi: 10.1109/JIOT.2024.3432116
|
| 3 |
WU J J , YUAN Q , LIN D , et al. Who are the phishers? phishing scam detection on Ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022, 52 (2): 1156- 1166.
doi: 10.1109/TSMC.2020.3016821
|
| 4 |
TANG M D , YE M S , CHEN W L , et al. BiLSTM4DPS: an attention-based BiLSTM approach for detecting phishing scams in Ethereum. Expert Systems with Applications, 2024, 256, 124941.
doi: 10.1016/j.eswa.2024.124941
|
| 5 |
HUANG B Y, LIU J L, WU J J, et al. Ethereum phishing fraud detection based on heterogeneous transaction subnets[C]//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS). Washington D.C., USA: IEEE Press, 2023: 1-5.
|
| 6 |
CHEN Z, HU Y F, HE B W, et al. Dissecting payload-based transaction phishing on Ethereum[C]//Proceedings of 2025 Network and Distributed System Security Symposium. Washington D.C., USA: IEEE Press, 2025: 16-22.
|
| 7 |
LIU J L , CHEN J Z , WU J J , et al. Fishing for fraudsters: uncovering Ethereum phishing gangs with blockchain data. IEEE Transactions on Information Forensics and Security, 2024, 19, 3038- 3050.
doi: 10.1109/TIFS.2024.3359000
|
| 8 |
|
| 9 |
PRAKASH P, KUMAR M, KOMPELLA R R, et al. PhishNet: predictive blacklisting to detect phishing attacks[C]//Proceedings of IEEE INFOCOM. Washington D.C., USA: IEEE Press, 2010: 1-5.
|
| 10 |
LEE L H, LEE K C, CHEN H H, et al. POSTER: proactive blacklist update for anti-phishing[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2014: 1448-1450.
|
| 11 |
郑礼雄, 李青山, 李素科, 等. 基于域名信息的钓鱼URL探测. 计算机工程, 2012, 38 (10): 108- 110.
doi: 10.3969/j.issn.1000-3428.2012.10.032
|
|
ZHENG L X , LI Q S , LI S K , et al. Phishing URL detection based on domain name information. Computer Engineering, 2012, 38 (10): 108- 110.
doi: 10.3969/j.issn.1000-3428.2012.10.032
|
| 12 |
蔺亚东. 基于URL特征的钓鱼网站检测方式. 电子测试, 2014 (3): 70- 72.
|
|
LIN Y D . Detection of phishing URL based on abnormal feature. Electronic Test, 2014 (3): 70- 72.
|
| 13 |
ALNEMARI S , ALSHAMMARI M . Detecting phishing domains using machine learning. Applied Sciences, 2023, 13 (8): 4649.
doi: 10.3390/app13084649
|
| 14 |
GUO B Y , ZHANG Y Y , XU C X , et al. HinPhish: an effective phishing detection approach based on heterogeneous information networks. Applied Sciences, 2021, 11 (20): 9733.
doi: 10.3390/app11209733
|
| 15 |
XIANG G , HONG J , ROSE C P , et al. CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security, 2011, 14 (2): 1- 28.
|
| 16 |
LI Y K , YANG Z G , CHEN X , et al. A stacking model using URL and HTML features for phishing webpage detection. Future Generation Computer Systems, 2019, 94, 27- 39.
doi: 10.1016/j.future.2018.11.004
|
| 17 |
余恩泽, 努尔布力, 于清. 一种基于集成学习的钓鱼网站检测方法. 计算机工程与应用, 2019, 55 (18): 81-88, 200.
|
|
YU E Z , NURBOL , YU Q . Phishing website detection method based on integrated learning. Computer Engineering and Applications, 2019, 55 (18): 81-88, 200.
|
| 18 |
胡向东, 刘可, 张峰, 等. 基于页面敏感特征的金融类钓鱼网页检测方法. 网络与信息安全学报, 2017, 3 (2): 31- 38.
|
|
HU X D , LIU K , ZHANG F , et al. Financial phishing detection method based on sensitive characteristics of webpage. Chinese Journal of Network and Information Security, 2017, 3 (2): 31- 38.
|
| 19 |
陈旭, 黎宇坤, 袁华平, 等. 基于分类置信度和网站特征的钓鱼检测系统. 信息网络安全, 2017, 17 (9): 111- 114.
|
|
CHEN X , LI Y K , YUAN H P , et al. Phishing detection system based on classification confidence and website features. Netinfo Security, 2017, 17 (9): 111- 114.
|
| 20 |
|
| 21 |
|
| 22 |
LI Y X, HUANG C Y, DENG S M, et al. KnowPhish: large language models meet multimodal knowledge graphs for enhancing reference-based phishing detection[EB/OL]. [2025-05-05]. https://arxiv.org/abs/2403.02253.
|
| 23 |
CAO T , HUANG C Y , LI Y X , et al. PhishAgent: a robust multimodal agent for phishing webpage detection. Proceedings of the AAAI Conference on Artificial Intelligence, 2025, 39 (27): 27869- 27877.
doi: 10.1609/aaai.v39i27.35003
|
| 24 |
HE B W, CHEN Y, CHEN Z, et al. TxPhishScope: towards detecting and understanding transaction-based phishing on Ethereum[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2023: 120-134.
|
| 25 |
XU C , LI R R , ZHU L H , et al. EWDPS: a novel framework for early warning and detection on Ethereum phishing scams. IEEE Internet of Things Journal, 2024, 11 (19): 30483- 30495.
doi: 10.1109/JIOT.2024.3409742
|
| 26 |
LEE J, LIM P, HOOI B, et al. Multimodal large language models for phishing webpage detection and identification[C]//Proceedings of the APWG Symposium on Electronic Crime Research (eCrime). Washington D.C., USA: IEEE Press, 2025: 1-13.
|
| 27 |
YANG J J , LIU J L , LIN D , et al. Who stole my NFT? investigating Web3 NFT phishing scams on Ethereum. IEEE Transactions on Information Forensics and Security, 2024, 19, 9301- 9314.
doi: 10.1109/TIFS.2024.3463541
|
| 28 |
LI K, LEE D, GUAN S X. Understanding the cryptocurrency free giveaway scam disseminated on Twitter lists[C]//Proceedings of the IEEE International Conference on Blockchain (Blockchain). Washington D.C., USA: IEEE Press, 2024: 9-16.
|
| 29 |
LIU E Z, KAPPOS G, MUGNIER E, et al. Give and take: an end-to-end investigation of giveaway scam conversion rates[C]//Proceedings of the 2024 ACM on Internet Measurement Conference. New York, USA: ACM Press, 2024: 704-712.
|
| 30 |
SHAFAHI M, KEMPERS L, AFSARMANESH H. Phishing through social bots on Twitter[C]//Proceedings of the IEEE International Conference on Big Data (Big Data). Washington D.C., USA: IEEE Press, 2017: 3703-3712.
|
| 31 |
HRIDAY D, KULKARNI A, BALACHANDRAN V, et al. Phish-Blitz: advancing phishing detection with comprehensive webpage resource collection and visual integrity preservation[C]//Proceedings of the 17th International Conference on Communication Systems and Networks (COMSNETS). Washington D.C., USA: IEEE Press, 2025: 481-488.
|