{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:02:21Z","timestamp":1743123741411,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811592126"},{"type":"electronic","value":"9789811592133"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9213-3_32","type":"book-chapter","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T13:03:23Z","timestamp":1605099803000},"page":"403-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["How Similar Are Smart Contracts on the Ethereum?"],"prefix":"10.1007","author":[{"given":"Nan","family":"Jia","sequence":"first","affiliation":[]},{"given":"Queping","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,12]]},"reference":[{"key":"32_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list, March 2009. https:\/\/metzdowd.com"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Huang, Y., Kong, Q., Jia, N., Chen, X., Zheng, Z.: Recommending differentiated code to support smart contract update. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp. 260\u2013270, May 2019","DOI":"10.1109\/ICPC.2019.00045"},{"issue":"7","key":"32_CR3","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"TTA Dinh","year":"2018","unstructured":"Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366\u20131385 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Zheng, P., Zheng, Z., Luo, X., Chen, X., Liu, X.: A detailed and real-time performance monitoring framework for blockchain systems. In: International Conference on Software Engineering Software Engineering in Practice - ICSE-SEIP 2018, pp. 134\u2013143, May 2018","DOI":"10.1145\/3183519.3183546"},{"key":"32_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21915-8_1","volume-title":"Perspectives in Business Informatics Research","author":"A Norta","year":"2015","unstructured":"Norta, A.: Creation of smart-contracting collaborations for decentralized autonomous organizations. In: Matulevi\u010dius, R., Dumas, M. (eds.) BIR 2015. LNBIP, vol. 229, pp. 3\u201317. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21915-8_1"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Kiffer, L., Levin, D., Mislove, A.: Analyzing ethereum\u2019s contract topology. In: Proceedings of the Internet Measurement Conference 2018, pp. 494\u2013499 (2018)","DOI":"10.1145\/3278532.3278575"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"He, N., Wu, L., Wang, H., Guo, Y., Jiang, X.: Characterizing code clones in the ethereum smart contract ecosystem. arXiv preprint arXiv:1905.00272 (2019)","DOI":"10.1007\/978-3-030-51280-4_35"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Liu, H., Yang, Z., Jiang, Y., Zhao, W., Sun, J.: Enabling clone detection for ethereum via smart contract birthmarks. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp. 105\u2013115. IEEE (2019)","DOI":"10.1109\/ICPC.2019.00024"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"32_CR10","unstructured":"Juels, A., Kosba, A., Shi, E.: The ring of gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016. ACM, New York, pp. 283\u2013295 (2016). http:\/\/doi.acm.org\/10.1145\/2976749.2978362"},{"key":"32_CR11","unstructured":"Nick, S.: The idea of smart contracts (1997). http:\/\/www.fon.hum.uva.nl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabo.best.vwh.net\/idea.html. Accessed 2008"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Chen, T., et al.: Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1484\u20131492, April 2018","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Gao, Z., Jiang, L., Xia, X., Lo, D., Grundy, J.: Checking smart contracts with structural code embedding. IEEE Trans. Softw. Eng. (2020)","DOI":"10.1109\/TSE.2020.2971482"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Porru, S., Pinna, A., Marchesi, M., Tonelli, R.: Blockchain-oriented software engineering: challenges and new directions. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 169\u2013171, May 2017","DOI":"10.1109\/ICSE-C.2017.142"},{"key":"32_CR15","series-title":"Springer Proceedings in Complexity","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-319-96661-8_45","volume-title":"Unifying Themes in Complex Systems IX","author":"S Somin","year":"2018","unstructured":"Somin, S., Gordon, G., Altshuler, Y.: Network analysis of ERC20 tokens trading on ethereum blockchain. In: Morales, A.J., Gershenson, C., Braha, D., Minai, A.A., Bar-Yam, Y. (eds.) ICCS 2018. SPC, pp. 439\u2013450. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96661-8_45"},{"issue":"6","key":"32_CR16","first-page":"518","volume":"99","author":"A Gionis","year":"1999","unstructured":"Gionis, A., Indyk, P., Motwani, R., et al.: Similarity search in high dimensions via hashing. Vldb 99(6), 518\u2013529 (1999)","journal-title":"Vldb"},{"key":"32_CR17","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy, 1st edn. O\u2019Reilly Media Inc., Newton (2015)","edition":"1"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-94478-4_2","volume-title":"Blockchain \u2013 ICBC 2018","author":"B Wang","year":"2018","unstructured":"Wang, B., Chen, S., Yao, L., Liu, B., Xu, X., Zhu, L.: A simulation approach for studying behavior and quality of blockchain networks. In: Chen, S., Wang, H., Zhang, L.-J. (eds.) ICBC 2018. LNCS, vol. 10974, pp. 18\u201331. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94478-4_2"},{"key":"32_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-94478-4_6","volume-title":"Blockchain \u2013 ICBC 2018","author":"RM Parizi","year":"2018","unstructured":"Parizi, R.M., Amritraj, Dehghantanha, A.: Smart contract programming languages on blockchains: an empirical evaluation of usability and security. In: Chen, S., Wang, H., Zhang, L.J. (eds.) ICBC 2018. LNCS, vol. 10974, pp. 75\u201391. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94478-4_6"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Huang, Y., Chen, X., Zou, Q., Luo, X.: A probabilistic neural network-based approach for related software changes detection. In: 2014 21st Asia-Pacific Software Engineering Conference, vol. 1, pp. 279\u2013286, December 2014","DOI":"10.1109\/APSEC.2014.50"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858, May 2016","DOI":"10.1109\/SP.2016.55"},{"key":"32_CR22","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. ArXiv e-prints, March 2017"},{"issue":"3","key":"32_CR23","first-page":"227","volume":"50","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Jia, N., Shu, J., Hu, X., Chen, X., Zhou, Q.: Does your code need comment? Softw.: Pract. Exp. 50(3), 227\u2013245 (2020). https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/spe.2772","journal-title":"Softw.: Pract. Exp."},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Huang, Y., Zheng, Q., Chen, X., Xiong, Y., Liu, Z., Luo, X.: Mining version control system for automatically generating commit comment. In: 2017 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 414\u2013423, November 2017","DOI":"10.1109\/ESEM.2017.56"},{"issue":"7","key":"32_CR25","first-page":"e1859","volume":"29","author":"Y Huang","year":"2017","unstructured":"Huang, Y., Chen, X., Liu, Z., Luo, X., Zheng, Z.: Using discriminative feature in software entities for relevance identification of code changes. J. Softw.: Evol. Process 29(7), e1859 (2017). e1859 smr.1859. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/smr.1859","journal-title":"J. Softw.: Evol. Process"},{"key":"32_CR26","unstructured":"Huang, Y., Jia, N., Chen, X., Hong, K., Zheng, Z.: Salient-class location: help developers understand code change in code review. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ser. ESEC\/FSE 2018, pp. 770\u2013774. ACM, New York (2018). http:\/\/doi.acm.org\/10.1145\/3236024.3264841"},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"Huang, Y., Hu, X., Jia, N., Chen, X., Xiong, Y., Zheng, Z.: Learning code context information to predict comment locations. IEEE Trans. Reliab. 1\u201318 (2019)","DOI":"10.1109\/TR.2019.2931725"},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Jiang, H., Xiao, Y., Wang, W.: English explaining a bag of words with hierarchical conceptual labels. World Wide Web (2020). Bag-of-words models; Concept graph; De-noising algorithm; Explicit semantics; High-accuracy;Knowledge base; NAtural language processing; Rose tree. http:\/\/dx.doi.org\/10.1007\/s11280-019-00752-3","DOI":"10.1007\/s11280-019-00752-3"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Gao, Z., Jayasundara, V., Jiang, L., Xia, X., Lo, D., Grundy, J.: SmartEmbed: a tool for clone and bug detection in smart contracts through structural code embedding. In: 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 394\u2013397. IEEE (2019)","DOI":"10.1109\/ICSME.2019.00067"},{"key":"32_CR30","doi-asserted-by":"crossref","unstructured":"Liu, H., Yang, Z., Liu, C., Jiang, Y., Zhao, W., Sun, J.: EClone: detect semantic clones in ethereum via symbolic transaction sketch. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 900\u2013903 (2018)","DOI":"10.1145\/3236024.3264596"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9213-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:30:47Z","timestamp":1619310647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9213-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811592126","9789811592133"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9213-3_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}