{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:03:53Z","timestamp":1769774633991,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557189","type":"print"},{"value":"9789819557196","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5719-6_35","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:50Z","timestamp":1769718890000},"page":"549-563","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Graph Contrastive Learning for\u00a0Blockchain Smart Contract Vulnerability Detection"],"prefix":"10.1007","author":[{"given":"Junjie","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiangguo","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"issue":"4","key":"35_CR1","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Y Zhou","year":"2018","unstructured":"Zhou, Y., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"35_CR2","unstructured":"Buterin, V.: A Next Generation Smart Contract & Decentralized Application Platform (2015)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Javaid, M., Haleem, A., Singh, R.P., Suman, R., Khan, S.: A review of blockchain technology applications for financial services. BenchCouncil Trans. Benchmarks Stand. Eval. 2(3), 100073 (2022)","DOI":"10.1016\/j.tbench.2022.100073"},{"issue":"5","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1007\/s11280-021-00870-x","volume":"24","author":"M de Vos","year":"2021","unstructured":"de Vos, M., Ileri, C.U., Pouwelse, J.: XChange: a universal mechanism for asset exchange between permissioned blockchains. World Wide Web 24(5), 1691\u20131728 (2021)","journal-title":"World Wide Web"},{"key":"35_CR5","unstructured":"Qian, P., Liu, Z., He, Q., Huang, B., Tian, D., Wang, X.: Smart contract vulnerability detection technique: a survey. arXiv preprint arXiv:2209.05872 (2022)"},{"key":"35_CR6","unstructured":"CoinTelegraph: Qubit Finance suffers \\$80 million loss following hack (2022)"},{"key":"35_CR7","unstructured":"CoinTelegraph: Bitcoin Gold Blockchain Hit by 51% Attack Leading to \\$70K Double Spend (2020)"},{"key":"35_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107221","volume":"159","author":"H Chu","year":"2023","unstructured":"Chu, H., Zhang, P., Dong, H., Xiao, Y., Ji, S., Li, W.: A survey on smart contract vulnerabilities: data sources, detection and repair. Inf. Softw. Technol. 159, 107221 (2023)","journal-title":"Inf. Softw. Technol."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of ACM CCS, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of ACM CCS, pp. 67\u201382 (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"35_CR11","unstructured":"Mythril: Mythril: A framework for bug hunting on the Ethereum blockchain (2017). https:\/\/mythx.io\/. Accessed 08 May 2024"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of IEEE\/ACM ASE, pp. 259\u2013269 (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: WETSEB, pp. 8\u201315 (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., et al.: SmartCheck: static analysis of ethereum smart contracts. In: WETSEB, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., et al.: Smart contract vulnerability detection using graph neural networks. In: Proceedings of IJCAI, pp. 454\u2013461 (2020)","DOI":"10.24963\/ijcai.2020\/454"},{"key":"35_CR16","unstructured":"Veli\u010dkovi\u0107, P., et al.: Deep graph infomax. arXiv preprint arXiv:1809.10341 (2018)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Jing, B., Park, C., Tong, H.: HDMI: high-order deep multiplex infomax. In: WWW, pp. 2414\u20132424 (2021)","DOI":"10.1145\/3442381.3449971"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Li, K., et al.: Reliable representations make a stronger defender: unsupervised structure refinement for robust GNN. In: Proceedings of ACM KDD, pp. 925\u2013935 (2022)","DOI":"10.1145\/3534678.3539484"},{"key":"35_CR19","unstructured":"Opolka, F.L., et al.: Spatio-temporal deep graph infomax. arXiv preprint arXiv:1904.06316 (2019)"},{"key":"35_CR20","unstructured":"Pinheiro, G.A., et al.: SMICLR: Contrastive learning on multiple molecular representations. J. Chem. Inf. Model (2022)"},{"key":"35_CR21","unstructured":"Feng, W., et al.: Graph random neural networks for semi-supervised learning on graphs. In: Proceedings of NeurIPS, pp. 1\u201312 (2020)"},{"key":"35_CR22","unstructured":"Jovanovi\u0107, N., et al.: Towards robust graph contrastive learning. arXiv preprint arXiv:2102.13085 (2021)"},{"key":"35_CR23","unstructured":"Veli\u010dkovi\u0107, P., et al.: Graph attention networks. In: ICLR (2018)"},{"key":"35_CR24","unstructured":"Zbontar, J., et al.: Barlow twins: self-supervised learning via redundancy reduction. arXiv preprint arXiv:2103.03230 (2021)"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Carbin, M., et al.: Detecting and escaping infinite loops with jolt. In: ECOOP, pp. 609\u2013633 (2011)","DOI":"10.1007\/978-3-642-22655-7_28"},{"key":"35_CR26","doi-asserted-by":"crossref","unstructured":"Ibing, A., Mai, A.: A fixed-point algorithm for automated static detection of infinite loops. In: IEEE HASE, pp. 44\u201351 (2015)","DOI":"10.1109\/HASE.2015.16"},{"key":"35_CR27","doi-asserted-by":"crossref","unstructured":"Burnim, J., et al.: Looper: lightweight detection of infinite loops at runtime. In: ASE, pp. 161\u2013169 (2009)","DOI":"10.1109\/ASE.2009.87"},{"issue":"10","key":"35_CR28","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/2398857.2384648","volume":"47","author":"M Kling","year":"2012","unstructured":"Kling, M., et al.: Bolt: on-demand infinite loop escape in unmodified binaries. SIGPLAN Not. 47(10), 431\u2013450 (2012)","journal-title":"SIGPLAN Not."},{"issue":"8","key":"35_CR29","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"35_CR30","unstructured":"Chung, J., et al.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"key":"35_CR31","unstructured":"Kipf, T., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"35_CR32","unstructured":"Zaremba, W., et al.: Recurrent neural network regularization. arXiv preprint arXiv:1409.2329 (2014)"},{"key":"35_CR33","unstructured":"Hafidi, H., et al.: GraphCL: contrastive self-supervised learning of graph representations. arXiv preprint arXiv:2007.08025 (2020)"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5719-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:58Z","timestamp":1769718898000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5719-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557189","9789819557196"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5719-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2025.sau.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}