{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:17:09Z","timestamp":1757618229743,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819687275"},{"type":"electronic","value":"9789819687282"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8728-2_5","type":"book-chapter","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T10:30:30Z","timestamp":1750588230000},"page":"50-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Pretrained Models with\u00a0Graph Neural Networks for\u00a0Smart Contract Interpretability"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Hao","sequence":"first","affiliation":[]},{"given":"Rui","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"102857","DOI":"10.1016\/j.jnca.2020.102857","volume":"177","author":"T Hewa","year":"2021","unstructured":"Hewa, T., Ylianttila, M., Liyanage, M.: Survey on blockchain based smart contracts: applications, opportunities and challenges. J. Netw. Comput. Appl. 177, 102857 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Ding, Y., Jin, J., Zhang, J., Wu, Z., Hu, K.: SC-RBAC: a smart contract based RBAC model for DApps. In: International Conference on Human Centered Computing, pp. 75\u201385. Springer (2019)","DOI":"10.1007\/978-3-030-37429-7_8"},{"key":"5_CR3","unstructured":"CoinMarketCap Homepage. https:\/\/coinmarketcap.com\/. Accessed 18 Dec 2024"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W. K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269 (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., et al.: CodeBERT: a pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Tang, Z., Li, C., Ge, J., et al.: AST-transformer: encoding abstract syntax trees efficiently for code summarization. In: Proceedings of the 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1193\u20131195. IEEE (2021)","DOI":"10.1109\/ASE51524.2021.9678882"},{"key":"5_CR7","unstructured":"Kennedy, K.: A survey of data flow analysis techniques. IBM Thomas J. Watson Research Division (1979)"},{"key":"5_CR8","unstructured":"Mikolov, T.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013). 3781"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Gharibi, G., Tripathi, R., Lee, Y.: Code2Graph: automatic generation of static call graphs for Python source code. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 880\u2013883 (2018)","DOI":"10.1145\/3238147.3240484"},{"key":"5_CR10","unstructured":"Allamanis, M., Brockschmidt, M., Khademi, M.: Learning to represent programs with graphs. arXiv preprint arXiv:1711.00740 (2017)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., et al.: Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE Symposium on Security and Privacy, pp. 590\u2013604. IEEE (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Ribeiro, M. T., Singh, S., Guestrin, C.: \u201cWhy should I trust you?\u201d Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144. ACM (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"5_CR13","unstructured":"Lundberg, S.: A unified approach to interpreting model predictions. arXiv preprint arXiv:1705.07874 (2017)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., et al.: SmartCheck: static analysis of Ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Mossberg, M., Manzano, F., Hennenfent, E., et al.: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1186\u20131189 (2019)","DOI":"10.1109\/ASE.2019.00133"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Choi, J., Kim, D., Kim, S., et al.: Smartian: enhancing smart contract fuzzing with static and dynamic data-flow analyses. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 227\u2013239 (2021)","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"5_CR17","unstructured":"Veloso, N.: Conkas: a modular and static analysis tool for Ethereum bytecode (2023). https:\/\/example.com. Accessed 2023"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663 (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., et al.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8, 19685\u201319695 (2020)","journal-title":"IEEE Access"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Liu, Z., Qian, P., et al.: Smart contract vulnerability detection using graph neural networks. In: Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, pp. 3283\u20133290 (2021)","DOI":"10.24963\/ijcai.2020\/454"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8728-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T21:37:29Z","timestamp":1757194649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8728-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819687275","9789819687282"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8728-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2025\/index.html#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}