Chiluwa, I. M., Kamalu, I. & Anurudu, S. Deceptive transparency and masked discourses in Ponzi schemes: A critical discourse analysis of mmm nigeria. Crit. Discourse Stud. 19, 55–72 (2022).
Google Scholar
Jory, S. R. & Perry, M. J. Ponzi schemes: A critical analysis. (2011).
Mohammed, U. Effect of ponzi schemes on a country: The case of Ghana. J. Financ. Crime 28, 926–939 (2021).
Google Scholar
Quisenberry, W. L. Ponzi of all Ponzis: Critical analysis of the Bernie Madoff scheme. Int. J. Econom. Financ. Manag. 5, 1–6 (2017).
Bartoletti, M., Pes, B. & Serusi, S. Data mining for detecting bitcoin Ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), 75–84 (IEEE, 2018).
Moore, T. The promise and perils of digital currencies. Int. J. Crit. Infrastructure Prot. 3, 147–149 (2013).
Google Scholar
Omolara, A. E., Jantan, A., Abiodun, O. I., Arshad, H. & Mohamed, N. A. Fingereye: Improvising security and optimizing atm transaction time based on iris-scan authentication. Int. J. Electr. Comput. Eng. 9, 1879 (2019).
Li, D., Cai, Z., Deng, L., Yao, X. & Wang, H. H. Information security model of block chain based on intrusion sensing in the iot environment. Clust. Comput. 22, 451–468 (2019).
Google Scholar
Abiodun, E. O. et al. A systematic review of emerging feature selection optimization methods for optimal text classification: The present state and prospective opportunities. Neural Comput. Appl. 33, 15091–15118 (2021).
Google Scholar
Tajti, T. Pyramid and ponzi schemes and the repercussions of the differing regulatory approaches: Hungarian developments in the light of contemporary global trends. Hungarian J. Leg. Stud. 62, 24–74 (2022).
Google Scholar
Tajti, T. Pyramid and Ponzi schemes and the price of inadequate regulatory responses: A comparative account of the diverging regulatory responses of China, Europe, and the United States. Bus. Bankr. LJ 5, 19 (2019).
Li, L. et al. Dual-interactive fusion for code-mixed deep representation learning in tag recommendation. Inf. Fusion 99, 101862 (2023).
Google Scholar
Bartoletti, M., Carta, S., Cimoli, T. & Saia, R. Dissecting Ponzi schemes on ethereum: Identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259–277 (2020).
Google Scholar
Panda, C. The $3 million winner of fomo3d is still playing to win. LONGHASH, https://en.longhash.com/news/the-3-millionwinner-of-fomo3d-is-still-playing-to-win (2018).
Zhou, Y., Wang, Z., Zhou, W. & Jiang, X. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In NDSS, Vol. 25, 50–52 (2012).
Chen, W. et al. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, 1409–1418 (2018).
Nolasco, C. A. R., Vaughn, M. S. & Del Carmen, R. V. Revisiting the choice model of ponzi and pyramid schemes: Analysis of case law. Crime Law Soc Change 60, 375–400 (2013).
Google Scholar
Henriques, D. B. A case study of a con man: Bernie madoff and the timeless lessons of history’s biggest Ponzi scheme. Soc. Res. An Int. Q. 85, 745–766 (2018).
Google Scholar
Wilkins, A. M. et al. Understanding a Ponzi scheme: Victims’ perspectives. J. Forensic Investig. Account. 4, 1–19 (2012).
Song, L. & Kong, X. A study on characteristics and identification of smart Ponzi schemes. IEEE Access 10, 57299–57308 (2022).
Google Scholar
Ibba, G., Pierro, G. A. & Di Francesco, M. Evaluating machine-learning techniques for detecting smart ponzi schemes. In 2021 IEEE/ACM 4th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 34–40 (IEEE, 2021).
Chen, W., Zheng, Z., Ngai, E.C.-H., Zheng, P. & Zhou, Y. Exploiting blockchain data to detect smart Ponzi schemes on ethereum. IEEE Access 7, 37575–37586 (2019).
Google Scholar
Ibekwe, C. C. & Oli, N. P. Ponzi schemes and risks of patronage among undergraduates in tertiary institutions in Anambra state, south-east, Nigeria. Int. J. Manag. Stud. Soc. Sci. Res. 2(6), 96–107 (2020).
Hu, X., Tang, J. & Liu, H. Online social spammer detection. In Proceedings of the AAAI Conference on Artificial Intelligence, vol. 28 (2014).
Wang, L., Cheng, H., Zheng, Z., Yang, A. & Zhu, X. Ponzi scheme detection via oversampling-based long short-term memory for smart contracts. Knowl.-Based Syst. 228, 107312 (2021).
Google Scholar
Ghani, M. T. A. et al. Overconfidence bias among investors: A qualitative evidence from ponzi scheme case study. Corp. Bus. Strateg. Rev. 4, 59–75 (2023).
Google Scholar
Garrett, B. L. & Mitchell, G. Testing compliance. Law Contemp. Probs. 83, 47 (2020).
Erete, S., Rankin, Y. & Thomas, J. A method to the madness: Applying an intersectional analysis of structural oppression and power in hci and design. ACM Trans. Comput. Interact. 30, 1–45 (2023).
Google Scholar
Ogunyolu, O. A. & Adebayo, A. O. An appraisal of ethical issues and the effect of artificial intelligence on the cryptocurrency market. Glob. J. Eng. Technol. Adv. 11, 063–070 (2022).
Google Scholar
Yuspin, W. & Fadhlulloh, Q. H. Ponzi scheme: Risk and regulation in indonesia. Int. J. Soc. Sci. Res. Rev. 5, 339–345 (2022).
Google Scholar
Obamuyi, T. M. et al. Factors influencing ponzi scheme participation in nigeria. Adv. Soc. Sci. Res. J. https://doi.org/10.14738/assrj.55.4547 (2018).
Google Scholar
Jack, J. & Ibekwe, C. C. Ponzi schemes: an analysis on coping with economic recession in nigeria. The Niger. J. Sociol. Anthropol. 16, 72–90 (2018).
Kehinde Oyedeji, J. et al. Social construction of internet fraud as innovation among youths in nigeria. Int. J. Cybersecurity Intell. Cybercrime 5, 23–42 (2022).
Riviere, A. The future of hedge fund regulation: A comparative approach. Rich. J. Glob. L. & Bus. 10, 263 (2010).
Trompeter, G. M., Carpenter, T. D., Jones, K. L. & Riley, R. A. Jr. Insights for research and practice: What we learn about fraud from other disciplines. Account. Horizons 28, 769–804 (2014).
Google Scholar
Abiodun, O. I., Alawida, M., Omolara, A. E. & Alabdulatif, A. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ. Inf. Sci. 34(10), 10217–10245 (2022).
Zhang, J., Peng, S., Gao, Y., Zhang, Z. & Hong, Q. Apmsa: adversarial perturbation against model stealing attacks. IEEE Trans. Inf. Forensics Secur. 18, 1667–1679 (2023).
Google Scholar
Liu, Y., Wang, K., Liu, L., Lan, H. & Lin, L. Tcgl: Temporal contrastive graph for self-supervised video representation learning. IEEE Trans. Image Process. 31, 1978–1993 (2022).
Google Scholar
Xie, X., Huang, L., Marson, S. M. & Wei, G. Emergency response process for sudden rainstorm and flooding: Scenario deduction and bayesian network analysis using evidence theory and knowledge meta-theory. Nat. Hazards, 117(3), 3307–3329 (2023).
Cheng, L., Yin, F., Theodoridis, S., Chatzis, S. & Chang, T.-H. Rethinking bayesian learning for data analysis: The art of prior and inference in sparsity-aware modeling. IEEE Signal Process. Mag. 39, 18–52 (2022).
Google Scholar
Li, B., Zhou, X., Ning, Z., Guan, X. & Yiu, K.-F.C. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 612, 384–398 (2022).
Google Scholar
Li, Q.-K., Lin, H., Tan, X. & Du, S. H consensus for multiagent-based supply chain systems under switching topology and uncertain demands. IEEE Trans. Syst. Man Cybern. Syst. 50, 4905–4918 (2018).
Google Scholar
Zhu, H., Xue, M., Wang, Y., Yuan, G. & Li, X. Fast visual tracking with siamese oriented region proposal network. IEEE Signal Process. Lett. 29, 1437–1441 (2022).
Google Scholar
Li, X. & Sun, Y. Stock intelligent investment strategy based on support vector machine parameter optimization algorithm. Neural Comput. Appl. 32, 1765–1775 (2020).
Google Scholar
Cao, B., Wang, X., Zhang, W., Song, H. & Lv, Z. A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw. 34, 78–83 (2020).
Google Scholar
Yan, L. et al. Method of reaching consensus on probability of food safety based on the integration of finite credible data on block chain. IEEE Access 9, 123764–123776 (2021).
Google Scholar
Liu, Z. et al. Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting. IEEE Trans. Inf. Forensics Secur. 18, 1237–1251 (2023).
Google Scholar
Li, C. et al. Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst. J. 16, 5521–5532 (2022).
Google Scholar
Wang, S. et al. Blockchain-empowered distributed multi-camera multi-target tracking in edge computing. IEEE Trans. Ind. Inform. 1–10. https://doi.org/10.1109/TII.2023.3261890 (2023).
Song, Y. et al. Identifying performance anomalies in fluctuating cloud environments: A robust correlative-gnn-based explainable approach. Futur. Gener. Comput. Syst. 145, 77–86 (2023).
Google Scholar
Zenggang, X. et al. Social similarity routing algorithm based on socially aware networks in the big data environment. J. Signal Process. Syst. 94, 1253–1267 (2022).
Google Scholar
Han, S. et al. Practical and robust federated learning with highly scalable regression training. IEEE Trans. Neural Netw. Learn. Syst. https://doi.org/10.1109/TNNLS.2023.3271859 (2023).
Ni, Q., Guo, J., Wu, W. & Wang, H. Influence-based community partition with sandwich method for social networks. IEEE Trans. Comput. Soc. Syst. 10, 819–830 (2022).
Google Scholar
Li, S. & Liu, Z. Scheduling uniform machines with restricted assignment. Math. Biosci. Eng 19, 9697–9708 (2022).
Google Scholar
Li, S. Efficient algorithms for scheduling equal-length jobs with processing set restrictions on uniform parallel batch machines. Math. Biosci. Eng 19, 10731–10740 (2022).
Google Scholar
Lu, S. et al. The multi-modal fusion in visual question answering: A review of attention mechanisms. PeerJ Comput. Sci. 9, e1400 (2023).
Google Scholar
Lu, S. et al. Improved blending attention mechanism in visual question answering. Comput. Syst. Sci. Eng. 47, 1149–1161 (2023).
Google Scholar
Aziz, R. M., Baluch, M. F., Patel, S. & Ganie, A. H. Lgbm: A machine learning approach for ethereum fraud detection. Int. J. Inf. Technol. 14, 3321–3331 (2022).
Zhong, M., Wang, Y., Yan, J., Cheng, Y. & Sun, P. Transformer-based comparative multi-view illegal transaction detection. PLoS ONE 18, e0276495 (2023).
Google Scholar
Fan, S., Fu, S., Xu, H. & Cheng, X. Al-spsd: Anti-leakage smart ponzi schemes detection in blockchain. Inf. Process. Manag. 58, 102587 (2021).
Google Scholar
Peng, J. & Xiao, G. Detection of smart ponzi schemes using opcode. In Blockchain and Trustworthy Systems: Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers 2, 192–204 (Springer, 2020).
Chawla, N. V., Bowyer, K. W., Hall, L. O. & Kegelmeyer, W. P. Smote: Synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002).
Google Scholar
Lima, R. F. & Pereira, A. C. Feature selection approaches to fraud detection in e-payment systems. In E-Commerce and Web Technologies: 17th International Conference, EC-Web 2016, Porto, Portugal, September 5–8, 2016, Revised Selected Papers 17, 111–126 (Springer, 2017).
Mani, I. & Zhang, I. knn approach to unbalanced data distributions: A case study involving information extraction. In Proceedings of Workshop on Learning from Imbalanced Datasets, vol. 126, 1–7 (ICML, 2003).
Dobson, A. J. & Barnett, A. G. An Introduction to Generalized Linear Models (CRC Press, 2018).
Google Scholar
Maes, S., Tuyls, K., Vanschoenwinkel, B. & Manderick, B. Credit card fraud detection using bayesian and neural networks. In Proceedings of the 1st International Naiso Congress on Neuro Fuzzy Technologies, vol. 261, 270 (2002).
Salzberg, S. L. Programs for machine learning by j. ross quinlan (1993).
Qader, W. A., Ameen, M. M. & Ahmed, B. I. An overview of bag of words; importance, implementation, applications, and challenges. In 2019 International Engineering Conference (IEC), 200–204 (IEEE, 2019).
Cheng, B. et al. Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Trans. Netw. 25, 2082–2095 (2017).
Google Scholar
Credit: Source link