Slow is Fast! Dissecting Ethereum’s Slow Liquidity Drain Scams Authors: Minh Trung Tran, Nasrin Sohrabi, Zahir Tari, Qin Wang, Minhui Xue, Xiaoyu Xia | Published: 2025-03-06 | Updated: 2025-08-06 Fraudulent TransactionFraud TechniquesFinancial Intelligence 2025.03.06 2025.08.08 Literature Database
Privacy Technologies for Financial Intelligence Authors: Yang Li, Thilina Ranbaduge, Kee Siong Ng | Published: 2024-08-19 Privacy ProtectionPrivacy Protection MethodFinancial Intelligence 2024.08.19 2025.05.27 Literature Database
Trading Devil: Robust backdoor attack via Stochastic investment models and Bayesian approach Authors: Orson Mengara | Published: 2024-06-15 | Updated: 2024-09-16 Backdoor AttackFinancial Intelligence 2024.06.15 2025.05.27 Literature Database
Detecting Financial Bots on the Ethereum Blockchain Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02 Blockchain TechnologyTransaction FlowFinancial Intelligence 2024.03.28 2025.05.27 Literature Database
Cryptocurrency Valuation: An Explainable AI Approach Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08 Token Collection Methodevaluation metricsFinancial Intelligence 2022.01.30 2025.05.28 Literature Database
Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange Authors: Pengcheng Xia, Haoyu wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Published: 2021-09-01 | Updated: 2021-11-11 PhishingFraud Token IdentificationFinancial Intelligence 2021.09.01 2025.05.28 Literature Database
Graph Computing for Financial Crime and Fraud Detection: Trends, Challenges and Outlook Authors: E. Kurshan, H. Shen | Published: 2021-03-02 Dynamic Graph ProcessingFraud TechniquesFinancial Intelligence 2021.03.02 2025.05.28 Literature Database
Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks Authors: Marco Schreyer, Chistian Schulze, Damian Borth | Published: 2020-12-13 Data Protection MethodImage Feature ExtractionFinancial Intelligence 2020.12.13 2025.05.28 Literature Database
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02 Attack MethodMachine LearningFinancial Intelligence 2020.10.19 2025.05.28 Literature Database
PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning Authors: Yuli Zheng, Zhenyu Wu, Ye Yuan, Tianlong Chen, Zhangyang Wang | Published: 2020-10-06 Data Protection MethodMachine LearningFinancial Intelligence 2020.10.06 2025.05.28 Literature Database