default search action
Dan Lin 0007
Person information
- affiliation: Sun Yat-sen University, School of Software Engineering, Zhuhai, China
Other persons with the same name
- Dan Lin — disambiguation page
- Dan Lin 0001 — Vanderbilt University, Nashville, TN, USA (and 3 more)
- Dan Lin 0002 — Tianjin University, China
- Dan Lin 0003 — Simon Fraser University, BC, Canada
- Dan Lin 0004 — Hasselt University, Belgium
- Dan Lin 0005 — University of Virginia, Charlottesville, VA, USA
- Dan Lin 0006 — South China University of Technology, School of Electric Power, Guangzhou, China
- Dan Lin 0008 — Dalian University of Technology, School of Software Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Qishuang Fu, Dan Lin, Jiajing Wu, Zibin Zheng:
A General Framework for Account Risk Rating on Ethereum: Toward Safer Blockchain Technology. IEEE Trans. Comput. Soc. Syst. 11(2): 1865-1875 (2024) - [j8]Jiajing Wu, Dan Lin, Qishuang Fu, Shuo Yang, Ting Chen, Zibin Zheng, Bowen Song:
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists. IEEE Trans. Inf. Forensics Secur. 19: 1994-2009 (2024) - [j7]Jingjing Yang, Jieli Liu, Dan Lin, Jiajing Wu, Baoying Huang, Quanzhong Li, Zibin Zheng:
Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum. IEEE Trans. Inf. Forensics Secur. 19: 9301-9314 (2024) - [j6]Dan Lin, Jiajing Wu, Tao Huang, Kaixin Lin, Zibin Zheng:
Who is Who on Ethereum? Account Labeling Using Heterophilic Graph Convolutional Network. IEEE Trans. Syst. Man Cybern. Syst. 54(3): 1541-1553 (2024) - [c8]Kaixin Lin, Dan Lin, Ziye Zheng, Yixiang Tan, Jiajing Wu:
Detecting Fake Deposit Attacks on Cross-chain Bridges from a Network Perspective. ISCAS 2024: 1-5 - [c7]Dan Lin, Jiajing Wu, Yunmei Yu, Qishuang Fu, Zibin Zheng, Changlin Yang:
DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction Graphs. WWW 2024: 4429-4438 - [i8]Dan Lin, Jiajing Wu, Yuxin Su, Ziye Zheng, Yuhong Nan, Zibin Zheng:
CONNECTOR: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-chain Transaction Association. CoRR abs/2409.04937 (2024) - 2023
- [j5]Jiajing Wu, Kaixin Lin, Dan Lin, Ziye Zheng, Huawei Huang, Zibin Zheng:
Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. IEEE Open J. Comput. Soc. 4: 37-49 (2023) - [c6]Yunmei Yu, Jiajing Wu, Dan Lin, Qishuang Fu:
Money Laundering Detection on Ethereum: Applying Traditional Approaches to New Scene. ICPADS 2023: 1759-1766 - [c5]Qishuang Fu, Dan Lin, Yiyue Cao, Jiajing Wu:
Does Money Laundering on Ethereum Have Traditional Traits? ISCAS 2023: 1-5 - [c4]Baoying Huang, Jieli Liu, Jiajing Wu, Quanzhong Li, Dan Lin:
Ethereum Phishing Fraud Detection Based on Heterogeneous Transaction Subnets. ISCAS 2023: 1-5 - [c3]Qishuang Fu, Dan Lin, Jiajing Wu:
Bigger Than We Thought: The Upbit Hack Gang. MARBLE 2023: 178-185 - [c2]Kaixin Lin, Jiajing Wu, Dan Lin, Zibin Zheng:
A Survey on Metaverse: Applications, Crimes and Governance. MetaCom 2023: 541-549 - [i7]Dan Lin, Jiajing Wu, Qishuang Fu, Zibin Zheng, Ting Chen:
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation. CoRR abs/2301.00354 (2023) - [i6]Qishuang Fu, Dan Lin, Yiyue Cao, Jiajing Wu:
Does Money Laundering on Ethereum Have Traditional Traits? CoRR abs/2303.15841 (2023) - [i5]Dan Lin, Jiajing Wu, Qishuang Fu, Yunmei Yu, Kaixin Lin, Zibin Zheng, Shuo Yang:
Towards Understanding Crypto Money Laundering in Web3 Through the Lenses of Ethereum Heists. CoRR abs/2305.14748 (2023) - 2022
- [j4]Tao Huang, Dan Lin, Jiajing Wu:
Ethereum Account Classification Based on Graph Convolutional Network. IEEE Trans. Circuits Syst. II Express Briefs 69(5): 2528-2532 (2022) - [j3]Dan Lin, Jialan Chen, Jiajing Wu, Zibin Zheng:
Evolution of Ethereum Transaction Relationships: Toward Understanding Global Driving Factors From Microscopic Patterns. IEEE Trans. Comput. Soc. Syst. 9(2): 559-570 (2022) - [j2]Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, Zibin Zheng:
Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. IEEE Trans. Syst. Man Cybern. Syst. 52(2): 1156-1166 (2022) - [i4]Jiajing Wu, Kaixin Lin, Dan Lin, Ziye Zheng, Huawei Huang, Zibin Zheng:
Financial Crimes in Web3-empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. CoRR abs/2212.13452 (2022) - 2021
- [c1]Zhuoming Gu, Dan Lin, Jiatao Zheng, Jiajing Wu, Chaoxin Hu:
Deep Learning-Based Transaction Prediction in Ethereum. BlockSys 2021: 30-43 - 2020
- [j1]Dan Lin, Jiajing Wu, Qi Yuan, Zibin Zheng:
Modeling and Understanding Ethereum Transaction Records via a Complex Network Approach. IEEE Trans. Circuits Syst. 67-II(11): 2737-2741 (2020) - [i3]Dan Lin, Jiajing Wu, Qi Yuan, Zibin Zheng:
Modeling and Understanding Ethereum Transaction Records via a Complex Network Approach. CoRR abs/2012.15462 (2020)
2010 – 2019
- 2019
- [i2]Jiajing Wu, Dan Lin, Zibin Zheng, Qi Yuan:
T-EDGE: Temporal WEighted MultiDiGraph Embedding for Ethereum Transaction Network Analysis. CoRR abs/1905.08038 (2019) - [i1]Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, Zibin Zheng:
Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. CoRR abs/1911.09259 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint