{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:53:37Z","timestamp":1753520017050,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031168147"},{"type":"electronic","value":"9783031168154"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16815-4_5","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T20:19:35Z","timestamp":1663964375000},"page":"66-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Vulnerability Detection for\u00a0Smart Contract via\u00a0Backward Bayesian Active Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2143-5666","authenticated-orcid":false,"given":"Jiale","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Liangqiong","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weitong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"5_CR1","unstructured":"Garriga, C.: Decentralized finance: on blockchain- and smart contract-based financial markets (2021)"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Moosavi, J., Naeni, L.M., Fathollahi-Fard, A.M., Fiore, U.: Blockchain in supply chain management: a review, bibliometric, and network analysis. Environ. Sci. Pollut. Res. 1\u201315 (2021). https:\/\/doi.org\/10.1007\/s11356-021-13094-3","DOI":"10.1007\/s11356-021-13094-3"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"180856","DOI":"10.1109\/ACCESS.2019.2959771","volume":"7","author":"Y Jiang","year":"2019","unstructured":"Jiang, Y., Zhong, Y., Ge, X.: Smart contract-based data commodity transactions for industrial internet of things. IEEE Access 7, 180856\u2013180866 (2019)","journal-title":"IEEE Access"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/646\/1\/012009","volume":"646","author":"B Xu","year":"2019","unstructured":"Xu, B., Agbele, T., Jiang, R.: Biometric blockchain: a better solution for the security and trust of food logistics. IOP Conf. Ser. Mater. Sci. Eng. 646, 012009 (2019)","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"5_CR5","unstructured":"[26] cointegraph1. https:\/\/cointelegraph.com\/. Accessed 21 Mar 2022"},{"key":"5_CR6","unstructured":"Torres, C.F., Iannillo, A.K., Gervais, A., State, R.: The eye of horus: spotting and analyzing attacks on ethereum smart contracts. arXiv preprint arXiv:2101.06204 (2021)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315. IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Zeus: analyzing safety of smart contracts. In: NDSS, pp. 1\u201312 (2018)","DOI":"10.14722\/ndss.2018.23082"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Park, D., Zhang, Y., Saxena, M., Daian, P., Ro\u015fu, G.: A formal verification tool for ethereum VM bytecode. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 912\u2013915 (2018)","DOI":"10.1145\/3236024.3264591"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201382 (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 259\u2013269. IEEE (2018)","DOI":"10.1145\/3238147.3238177"},{"issue":"11","key":"5_CR14","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1109\/TSE.2019.2949275","volume":"47","author":"Z Yu","year":"2019","unstructured":"Yu, Z., Theisen, C., Williams, L., Menzies, T.: Improving vulnerability inspection efficiency using active learning. IEEE Trans. Softw. Eng. 47(11), 2401\u20132420 (2019)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Xu, Z., Liu, J., Luo, X., Zhang, T.: Cross-version defect prediction via hybrid active learning with kernel principal component analysis. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 209\u2013220. IEEE (2018)","DOI":"10.1109\/SANER.2018.8330210"},{"issue":"Nov","key":"5_CR16","first-page":"45","volume":"2","author":"S Tong","year":"2001","unstructured":"Tong, S., Koller, D.: Support vector machine active learning with applications to text classification. J. Mach. Learn. Res. 2(Nov), 45\u201366 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Hoi, S.C.H., Jin, R., Lyu, M.R.: Large-scale text categorization by batch mode active learning. In: Proceedings of the 15th International Conference on World Wide Web, pp. 633\u2013642 (2006)","DOI":"10.1145\/1135777.1135870"},{"issue":"7","key":"5_CR18","doi-asserted-by":"publisher","first-page":"2218","DOI":"10.1109\/TGRS.2008.2010404","volume":"47","author":"D Tuia","year":"2009","unstructured":"Tuia, D., Ratle, F., Pacifici, F., Kanevski, M.F., Emery, W.J.: Active learning methods for remote sensing image classification. IEEE Trans. Geosci. Remote Sens. 47(7), 2218\u20132232 (2009)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"5_CR19","volume-title":"MCDAL: maximum classifier discrepancy for active learning","author":"JW Cho","year":"2022","unstructured":"Cho, J.W., Kim, D.-J., Jung, Y., Kweon, I.S.: MCDAL: maximum classifier discrepancy for active learning. IEEE Trans. Neural Netw. Learn, Syst (2022)"},{"key":"5_CR20","unstructured":"Huang, S.-J., Jin, R., Zhou, Z.-H.: Active learning by querying informative and representative examples. In: Advances in Neural Information Processing Systems 23 (2010)"},{"key":"5_CR21","unstructured":"Gal, Y., Ghahramani, Z.: Dropout as a Bayesian approximation: representing model uncertainty in deep learning. In: International Conference on Machine Learning, pp. 1050\u20131059. PMLR (2016)"},{"key":"5_CR22","unstructured":"Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Sch\u00fctte, J., State, R.: Osiris: hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 664\u2013676 (2018)","DOI":"10.1145\/3274694.3274737"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Liu, C., Liu, H., Cao, Z., Chen, Z., Chen, B., Roscoe, B.: Reguard: finding reentrancy bugs in smart contracts. In: 2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), pp. 65\u201368. IEEE (2018)","DOI":"10.1145\/3183440.3183495"},{"key":"5_CR25","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-030-84337-3_9","volume-title":"The International Conference on Deep Learning, Big Data and Blockchain (Deep-BDB 2021)","author":"AA Kevin N\u2019DA","year":"2022","unstructured":"Kevin N\u2019DA, A.A., Matalonga, S., Dahal, K.: Applicability of the software security code metrics for ethereum smart contract. In: Awan, I., Benbernou, S., Younas, M., Aleksy, M. (eds.) Deep-BDB 2021. LNNS, vol. 309, pp. 106\u2013119. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-84337-3_9"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Momeni, P., Wang, Y., Samavi, R.: Machine learning model for smart contracts security analysis. In: 2019 17th International Conference on Privacy, Security and Trust (PST), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Liao, J.-W., Tsai, T.-T., He, C.-K., Tien, C.-W.: SoliAudit: smart contract vulnerability assessment based on machine learning and fuzz testing. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 458\u2013465. IEEE (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., Zimmermann, R., Wang, X.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8, 19685\u201319695 (2020)","journal-title":"IEEE Access"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Ashizawa, N., Yanai, N., Cruz, J.P., Okamura, S.: Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts. In: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 47\u201359 (2021)","DOI":"10.1145\/3457337.3457841"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Mi, F., Wang, Z., Zhao, C., Guo, J., Ahmed, F., Khan, L.: VSCL: automating vulnerability detection in smart contracts with deep learning. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20139. IEEE (2021)","DOI":"10.1109\/ICBC51069.2021.9461050"},{"key":"5_CR31","unstructured":"Atighehchian, P., Branchaud-Charron, F., Lacoste, A.: Bayesian active learning for production, a systematic study and a reusable library. arXiv preprint arXiv:2006.09916 (2020)"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Tsymbalov, E., Makarychev, S., Shapeev, A., Panov, M.: Deeper connections between neural networks and Gaussian processes speed-up active learning. arXiv preprint arXiv:1902.10350 (2019)","DOI":"10.24963\/ijcai.2019\/499"},{"key":"5_CR33","unstructured":"Kirsch, A., Van Amersfoort, J., Gal, Y.: Batchbald: efficient and diverse batch acquisition for deep Bayesian active learning. In: Advances in Neural Information Processing Systems 32 (2019)"},{"key":"5_CR34","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.artint.2014.08.005","volume":"217","author":"M Cakmak","year":"2014","unstructured":"Cakmak, M., Thomaz, A.L.: Eliciting good teaching from humans for machine learners. Artif. Intell. 217, 198\u2013215 (2014)","journal-title":"Artif. Intell."},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Donmez, P., Carbonell, J.G., Schneider, J.: Efficiently learning the accuracy of labeling sources for selective sampling. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 259\u2013268 (2009)","DOI":"10.1145\/1557019.1557053"},{"issue":"12","key":"5_CR36","doi-asserted-by":"publisher","first-page":"3034","DOI":"10.1109\/TNNLS.2015.2401595","volume":"26","author":"X-Y Zhang","year":"2015","unstructured":"Zhang, X.-Y., Wang, S., Yun, X.: Bidirectional active learning: a two-way exploration into unlabeled and labeled data set. IEEE Trans. Neural Netw. Learn. Syst. 26(12), 3034\u20133044 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"6","key":"5_CR37","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1587\/transinf.E95.D.1680","volume":"95","author":"G Luo","year":"2012","unstructured":"Luo, G., Ma, Y., Qin, K.: Active learning for software defect prediction. IEICE Trans. Inf. Syst. 95(6), 1680\u20131683 (2012)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"2","key":"5_CR38","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10515-011-0092-1","volume":"19","author":"M Li","year":"2012","unstructured":"Li, M., Zhang, H., Rongxin, W., Zhou, Z.-H.: Sample-based software defect prediction with active and semi-supervised learning. Autom. Softw. Eng. 19(2), 201\u2013230 (2012)","journal-title":"Autom. Softw. Eng."},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Lu, H., Cukic, B.: An adaptive approach with active learning in software fault prediction. In: Proceedings of the 8th International Conference on Predictive Models in Software Engineering, pp. 79\u201388 (2012)","DOI":"10.1145\/2365324.2365335"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Lu, H., Kocaguneli, E., Cukic, B.: Defect prediction between software versions with active learning and dimensionality reduction. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering, pp. 312\u2013322. IEEE (2014)","DOI":"10.1109\/ISSRE.2014.35"},{"key":"5_CR41","unstructured":"NCC group. https:\/\/www.nccgroup.trust\/us\/. Accessed 21 Mar 2022"},{"key":"5_CR42","unstructured":"DASP top 10. https:\/\/dasp.co\/. Accessed 21 Mar 2022"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 530\u2013541 (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"5_CR44","unstructured":"SoliAudit vulnerability analyzer dataset. https:\/\/goo.gl\/UAUpK5\/. Accessed 21 Mar 2022"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Ghaleb, A., Pattabiraman, K.: How effective are smart contract analysis tools? Evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 415\u2013427 (2020)","DOI":"10.1145\/3395363.3397385"},{"key":"5_CR46","unstructured":"Abe, N.: Query learning strategies using boosting and bagging. In: Proceedings of 15th International Conference on Machine Learning (ICML 1998) (1998)"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Ebert, S., Fritz, M., Schiele, B.: RALF: a reinforced active learning formulation for object class recognition. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3626\u20133633. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6248108"},{"key":"5_CR48","first-page":"441","volume":"2","author":"N Roy","year":"2001","unstructured":"Roy, N., McCallum, A.: Toward optimal active learning through Monte Carlo estimation of error reduction. ICML Williamstown 2, 441\u2013448 (2001)","journal-title":"ICML Williamstown"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16815-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T13:08:56Z","timestamp":1742044136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16815-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031168147","9783031168154"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16815-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/acns2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}