lindan113 / EthereumHeist
☆12Updated last year
Alternatives and similar repositories for EthereumHeist:
Users that are interested in EthereumHeist are comparing it to the libraries listed below
- ☆9Updated last year
- Elliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet Addresses☆92Updated last year
- Datasets used in the paper "Labeled Transactions-based Dataset of Ethereum Network"☆13Updated 6 months ago
- ☆12Updated 5 years ago
- ☆11Updated last year
- ☆17Updated last year
- Extracting and Exploring Blockchain Data from Ethereum☆67Updated last month
- As the most famous application of blockchain, cryptocurrency has suffered huge economic losses due to phishing scams. Our work shares phi…☆31Updated 3 years ago
- A toolkit for blockchain data collection☆144Updated 2 weeks ago
- [ICLR 2024] EX-Graph: A Pioneering Dataset Bridging Ethereum and X https://openreview.net/pdf?id=juE0rWGCJW☆19Updated 6 months ago
- ☆16Updated last year
- EvolveGCN applied to Elliptic dataset☆27Updated 3 years ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆28Updated 2 months ago
- ☆58Updated 6 years ago
- Academic Smart Contract Papers. Welcome developers or researchers to add more published papers to this list.☆506Updated this week
- The official implementation of the DGA-GNN algorithm.☆24Updated 8 months ago
- ☆22Updated last year
- ☆32Updated 4 years ago
- ☆16Updated 3 years ago
- ☆10Updated 4 months ago
- Chartalist.org. Sponsored by the Canadian NSERC Discovery Grant RGPIN-2020-05665: Data Science on Blockchain and the National Science Fou…☆33Updated last year
- ☆13Updated 2 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks (IJCAI-20 Accepted)☆137Updated 2 years ago
- Smart contract vulnerability detection using graph neural network (DR-GCN).☆149Updated 2 years ago
- Attacker Contract Identifier Through Static Dataflow Analysis☆22Updated 9 months ago
- Codes and data for KDD 2022 Research Track paper "CLARE: A Semi-supervised Community Detection Algorithm"☆33Updated last year
- Official guide of using the Elliptic2 dataset introduced by the paper "The Shape of Money Laundering: Subgraph Representation Learning on…☆17Updated 2 months ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆86Updated 2 years ago
- A Sequence Learning Approach to Detecting Vulnerabilities☆48Updated 3 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆31Updated last year