{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:28:48Z","timestamp":1742970528458,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031516733"},{"type":"electronic","value":"9783031516740"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51674-0_6","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"79-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research Trends in Smart Contracts in Blockchain 3.0 Phase"],"prefix":"10.1007","author":[{"given":"Chuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Fang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xintong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jielin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"6_CR1","volume-title":"Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions","author":"JJ Bambara","year":"2018","unstructured":"Bambara, J.J., Allen, P.R., Iyer, K., et al.: Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions. Mcgraw Hill Professional, New York (2018)"},{"issue":"5","key":"6_CR2","first-page":"969","volume":"41","author":"Q Shao","year":"2018","unstructured":"Shao, Q., Jin, C., Zhang, Z., et al.: Blockchain Technology: architecture and progress. Chin. J. Comput. 41(5), 969\u2013988 (2018)","journal-title":"Chin. J. Comput."},{"issue":"6","key":"6_CR3","first-page":"1577","volume":"30","author":"L Zhu","year":"2019","unstructured":"Zhu, L., Yu, H., Zhan, S., et al.: Research on high performance alliance blockchain Technology. J. Softw. 30(6), 1577\u20131593 (2019)","journal-title":"J. Softw."},{"issue":"9","key":"6_CR4","first-page":"1853","volume":"55","author":"WL Chen","year":"2018","unstructured":"Chen, W.L., Zheng, Z.B.: Blockchain data analysis: status, trends and challenges. J. Comput. Res. Dev. 55(9), 1853\u20131870 (2018)","journal-title":"J. Comput. Res. Dev."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Golosova, J., Romanovs, A.: The advantages and disadvantages of the blockchain technology. In: 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Vilnius, Lithuania, pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/AIEEE.2018.8592253"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, N.A., Bansal, M., Sharma, S., et al.: Detection of vulnerabilities in blockchain smart contracts: a review. In: 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), Ghaziabad, India, pp. 558\u2013562. IEEE (2023)","DOI":"10.1109\/CICTN57981.2023.10140767"},{"issue":"4","key":"6_CR7","first-page":"381","volume":"44","author":"Y Bai","year":"2023","unstructured":"Bai, Y., Shi, Z., Xin, W., et al.: Research on smart contract vulnerability detection method based on word embedding and Shapelet timing features. J. North Univ. China (Nat. Sci. Edn.) 44(4), 381\u2013387 (2023)","journal-title":"J. North Univ. China (Nat. Sci. Edn.)"},{"key":"6_CR8","unstructured":"Lu, L., Lai, J.: Smart contract vulnerability detection method based on capsule network and attention mechanism. J. South China Univ. Technol. (Nat. Sci. Edn.) 51(5), 36\u201344 (2023)"},{"issue":"2","key":"6_CR9","first-page":"7","volume":"60","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Niu, W., Huang, S., et al.: Summary of smart contract vulnerability detection methods based on deep learning. J. Sichuan Univ. (Nat. Sci. Edn.) 60(2), 7\u201318 (2023)","journal-title":"J. Sichuan Univ. (Nat. Sci. Edn.)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ibba, G.: A smart contracts repository for top trending contracts. In: Proceedings of the 5th International Workshop on Emerging Trends in Software Engineering for Blockchain, Pittsburgh, USA, pp. 17\u201320 (2022)","DOI":"10.1145\/3528226.3528374"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"De Brito Goncalves, J.P., Spelta, G., da Silva Villaca, R., et al.: IoT data storage on a blockchain using smart contracts and IPFS. In: 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, pp. 508\u2013511. IEEE (2022)","DOI":"10.1109\/Blockchain55522.2022.00078"},{"issue":"3","key":"6_CR12","first-page":"1491","volume":"34","author":"T Li","year":"2023","unstructured":"Li, T., Yang, A., Weng, J., et al.: Industrial Internet data open audit scheme based on smart contract. J. Softw. 34(3), 1491\u20131511 (2023)","journal-title":"J. Softw."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Omar, A., Jayaraman, R., Debe, M.S., et al.: Automating procurement contracts in the healthcare supply chain using blockchain smart contracts. IEEE Access 9, 37397\u201337409 (2021)","DOI":"10.1109\/ACCESS.2021.3062471"},{"key":"6_CR14","unstructured":"Li, P., Li, X.: A bilinear-pair computing outsourcing algorithm based on smart contracts. Comput. Appl. Softw. 39(10), 246\u2013253+273 (2022)"},{"issue":"6","key":"6_CR15","doi-asserted-by":"publisher","first-page":"14743","DOI":"10.1007\/s10586-018-2387-5","volume":"22","author":"M Niranjanamurthy","year":"2019","unstructured":"Niranjanamurthy, M., Nithya, B.N., Jagannatha, S.: Analysis of blockchain technology: pros, cons and swot. Clust. Comput. 22(6), 14743\u201314757 (2019)","journal-title":"Clust. Comput."},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.3390\/e24040557","volume":"24","author":"F Liu","year":"2022","unstructured":"Liu, F., Fan, H.Y., Qi, J.Y.: Blockchain technology, cryptocurrency: entropy-based perspective. Entropy 24(4), 557 (2022)","journal-title":"Entropy"},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"6_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev., 21260\u201321260 (2008)"},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6","volume-title":"Introducing Ethereum and Solidity","author":"C Dannen","year":"2017","unstructured":"Dannen, C.: Introducing Ethereum and Solidity. Apress, Berkeley (2017)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Anoaica, A., Levard, H.: Quantitative description of internal activity on the ethereum public blockchain. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/NTMS.2018.8328741"},{"issue":"1","key":"6_CR21","first-page":"134","volume":"41","author":"S Zeng","year":"2020","unstructured":"Zeng, S., Huo, R., Huang, T., et al.: Summary of blockchain technology research: principle, progress and application. J. Commun. 41(1), 134\u2013151 (2020)","journal-title":"J. Commun."},{"issue":"9","key":"6_CR22","first-page":"2571","volume":"30","author":"Q Shao","year":"2019","unstructured":"Shao, Q., Zhang, Z., Zhu, Y., et al.: Overview of enterprise-level blockchain technology. J. Softw. 30(9), 2571\u20132592 (2019)","journal-title":"J. Softw."},{"issue":"1","key":"6_CR23","first-page":"84","volume":"44","author":"X Cai","year":"2021","unstructured":"Cai, X., Deng, X., Zhang, L., et al.: Blockchain principles and its core technologies. J. Comput. 44(1), 84\u2013131 (2021)","journal-title":"J. Comput."},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-70278-0_31","volume-title":"Financial cryptography and data security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 494\u2013509. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_31"},{"issue":"2","key":"6_CR25","first-page":"271","volume":"48","author":"S Guo","year":"2021","unstructured":"Guo, S., Wang, R., Zhang, F.: Summary of the principles and applications of blockchain technology. Comput. Sci. 48(2), 271\u2013281 (2021)","journal-title":"Comput. Sci."},{"issue":"11","key":"6_CR26","first-page":"2452","volume":"55","author":"H He","year":"2018","unstructured":"He, H., Yan, A., Chen, Z.: Summary of blockchain-based smart contract technologies and applications. Comput. Res. Dev. 55(11), 2452\u20132466 (2018)","journal-title":"Comput. Res. Dev."},{"issue":"4","key":"6_CR27","first-page":"792","volume":"49","author":"J Zhu","year":"2021","unstructured":"Zhu, J., Hu, K., Zhang, B.: Review of formal validation methods for smart contracts. J. Electron. Sci. 49(4), 792\u2013804 (2021)","journal-title":"J. Electron. Sci."},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H., et al.: An overview on smart contracts: challenges, advances and platforms. Futur. Gener. Comput. Syst. 105, 475\u2013491 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"37397","DOI":"10.1109\/ACCESS.2021.3062471","volume":"9","author":"IA Omar","year":"2021","unstructured":"Omar, I.A., Jayaraman, R., Debe, M.S., et al.: Automating procurement contracts in the healthcare supply chain using blockchain smart contracts. IEEE Access 9, 37397\u201337409 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"6_CR30","first-page":"227","volume":"39","author":"X Jing","year":"2023","unstructured":"Jing, X., Jiang, Y.: The blockchain ciphertext strategy of cluster agricultural products supply chain can verify the multi-department supervision scheme. J. Agric. Eng. 39(3), 227\u2013236 (2023)","journal-title":"J. Agric. Eng."},{"issue":"3","key":"6_CR31","first-page":"408","volume":"51","author":"J Ye","year":"2022","unstructured":"Ye, J., Pang, C.J., Li, X.H., et al.: Blockchain-based hierarchical access control mechanism for supply chain data. J. Univ. Electron. Sci. Technol. China 51(3), 408\u2013415 (2022)","journal-title":"J. Univ. Electron. Sci. Technol. China"},{"issue":"1","key":"6_CR32","first-page":"370","volume":"53","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Peng, X.X., Xu, J.P., et al.: Dynamic supervision model of rice supply chain based on blockchain smart contract. J. Agric. Mach. 53(1), 370\u2013382 (2022)","journal-title":"J. Agric. Mach."},{"key":"6_CR33","first-page":"1","volume":"2021","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Hu, G., You, L., et al.: A novel machine learning-based analysis model for smart contract vulnerability. Secur. Commun. Netw. 2021, 1\u201312 (2021)","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"6_CR34","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"3","key":"6_CR35","doi-asserted-by":"publisher","DOI":"10.1088\/2633-1357\/abcd29","volume":"1","author":"AK Gogineni","year":"2020","unstructured":"Gogineni, A.K., Swayamjyoti, S., Sahoo, D., et al.: Multi-Class classification of vulnerabilities in Smart Contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing. IOP SciNotes 1(3), 035002 (2020)","journal-title":"IOP SciNotes"},{"issue":"5","key":"6_CR36","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.3390\/s22051829","volume":"22","author":"J Huang","year":"2022","unstructured":"Huang, J., Zhou, K., Xiong, A., et al.: Smart contract vulnerability detection model based on multi-task learning. Sensors 22(5), 1829 (2022)","journal-title":"Sensors"},{"issue":"9","key":"6_CR37","doi-asserted-by":"publisher","first-page":"3577","DOI":"10.3390\/s22093577","volume":"22","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Chen, W., Wang, W., et al.: CBGRU: a detection method of smart contract vulnerability based on a hybrid model. Sensors 22(9), 3577 (2022)","journal-title":"Sensors"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Ashizawa, N., Yanai, N., Cruz, J. P., et al.: Eth2Vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts. In: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 47\u201359 (2021)","DOI":"10.1145\/3457337.3457841"},{"key":"6_CR39","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., et al.: Enriching word vectors with subword information. TransAssoc. Comput. Linguist. 5, 135 (2017)","journal-title":"TransAssoc. Comput. Linguist."},{"issue":"3","key":"6_CR40","first-page":"1491","volume":"34","author":"T Li","year":"2023","unstructured":"Li, T., Yang, J.A., Wong, J., et al.: Industrial Internet data open audit scheme based on smart contract. J. Softw. 34(3), 1491\u20131511 (2023)","journal-title":"J. Softw."},{"key":"6_CR41","doi-asserted-by":"publisher","unstructured":"Xue, J., Xu, C., Zhang, Y., et al.: DStore: a distributed cloud storage system based on smart contracts and blockchain. In: Vaidya, J., Li, J. (eds.) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. LNCS, vol. 11336, pp. 37\u201342. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05057-3_30","DOI":"10.1007\/978-3-030-05057-3_30"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Friebe, S., Sobik, I., Zitterbart, M.: DecentID: decentralized and privacy-preserving identity storage system using smart contracts, In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), New York, USA, pp. 37\u201342 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00016"},{"issue":"8","key":"6_CR43","first-page":"361","volume":"53","author":"CH Sun","year":"2022","unstructured":"Sun, C.H., Yu, H.J., Luo, N., et al.: Research on the data storage method of fruit and vegetable blockchain traceability based on smart contract. J. Agric. Mach. 53(8), 361\u2013370 (2022)","journal-title":"J. Agric. Mach."},{"key":"6_CR44","unstructured":"Li, P.Y., Li, X.Y.: A bilinear-pair computing outsourcing algorithm based on smart contracts. Comput. Appl. Softw. 39(10), 246\u2013253+273 (2022)"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Abdul-Sada, H.H., Furkan R.: The genetic algorithm implementation in smart contract for the blockchain technology. Al-Salam J. Eng. Technol. 2(2), 37\u201347 (2023)","DOI":"10.55145\/ajest.2023.02.02.005"},{"issue":"7","key":"6_CR46","doi-asserted-by":"publisher","first-page":"4904","DOI":"10.1007\/s11227-018-2697-7","volume":"76","author":"S Myung","year":"2020","unstructured":"Myung, S., Lee, J.H.: Ethereum smart contract-based automated power trading algorithm in a microgrid environment. J. Supercomput. 76(7), 4904\u20134914 (2020)","journal-title":"J. Supercomput."}],"container-title":["Lecture Notes in Computer Science","Services Computing \u2013 SCC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51674-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:06:21Z","timestamp":1704863181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51674-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031516733","9783031516740"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51674-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Services Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scco2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/scc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}