| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Xu, Shujiang | en_US |
| dc.contributor.author | Luo, Xiaomin | en_US |
| dc.contributor.author | Wang, Lianhai | en_US |
| dc.contributor.author | Mihaljević, Miodrag J. | en_US |
| dc.contributor.author | Zhang, Shuhui | en_US |
| dc.contributor.author | Shao, Wei | en_US |
| dc.contributor.author | Wang, Qizheng | en_US |
| dc.date.accessioned | 2025-12-25T09:55:10Z | - |
| dc.date.available | 2025-12-25T09:55:10Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.isbn | 978-981-95-3536-1 | - |
| dc.identifier.isbn | 978-981-95-3537-8 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/5703 | - |
| dc.description.abstract | As the most popular blockchain-based decentralized platform currently, decentralized finance (DeFi) constructs an open and transparent financial ecosystem. Due to its inherent openness, DeFi is also vulnerable to security threats such as transaction fraud. Although the existing detection methods for DeFi anomaly behavior can ensure the security of the DeFi system in certain specific application scenarios, they still suffer from limitations including high misjudgment and insufficient generalization ability. To avoid the above weaknesses, a hybrid model named VAE-BiLSTM is proposed for DeFi anomaly detection. The model integrates the dimensionality reduction ability of variational autoencoder (VAE) with the sequence modeling ability of bidirectional long short-term memory network (BiLSTM) to collaboratively capture of multi-modal anomaly behavior characteristics. Furthermore, the dynamic time warping and Bayesian optimization algorithm are employed to enhance the ability to detect anomaly behaviors. The experimental results show that the F1 score of the proposed model reaches 87%. Compared with the existing methods, the VAE-BiLSTM model exhibits stronger generalization ability and higher detection precision. | en_US |
| dc.publisher | Springer Link | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science | en_US |
| dc.subject | BiLSTM | DeFi Anomaly Detection | VAE | en_US |
| dc.title | VAE-BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM | en_US |
| dc.type | Conference Paper | en_US |
| dc.relation.conference | 27th International Conference, ICICS 2025, Nanjing, China, October 29–31, 2025 | - |
| dc.relation.publication | Information and Communications Security | en_US |
| dc.identifier.doi | 10.1007/978-981-95-3537-8_19 | - |
| dc.identifier.scopus | 2-s2.0-105022103754 | - |
| dc.contributor.affiliation | Computer Science | en_US |
| dc.contributor.affiliation | Mathematical Institute of the Serbian Academy of Sciences and Arts | en_US |
| dc.relation.firstpage | 340 | - |
| dc.relation.lastpage | 358 | - |
| dc.relation.volume | LNCS, 16219 | - |
| dc.description.rank | M33 | - |
| item.openairetype | Conference Paper | - |
| item.fulltext | No Fulltext | - |
| item.grantfulltext | none | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| item.cerifentitytype | Publications | - |
| crisitem.author.orcid | 0000-0003-3047-3020 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.