{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:52Z","timestamp":1772240692948,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819708581","type":"print"},{"value":"9789819708598","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0859-8_3","type":"book-chapter","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T16:02:20Z","timestamp":1708963340000},"page":"42-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SolGPT: A GPT-Based Static Vulnerability Detection Model for\u00a0Enhancing Smart Contract Security"],"prefix":"10.1007","author":[{"given":"Shengqiang","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinsong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,27]]},"reference":[{"key":"3_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)"},{"key":"3_CR2","unstructured":"Szabo, N.: Smart contracts: building blocks for digital markets. EXTROPY: J. Transhumanist Thought (16) 18(2), 28 (1996)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","volume":"10","author":"SS Kushwaha","year":"2022","unstructured":"Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.N.: Systematic review of security vulnerabilities in Ethereum blockchain smart contract. IEEE Access 10, 6605\u20136621 (2022)","journal-title":"IEEE Access"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315. IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Grishchenko, I., Maffei, M., Schneidewind, C.: A semantic framework for the security analysis of Ethereum smart contracts. In: Bauer, L., K\u00fcsters, R. (eds.) Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, 14\u201320 April 2018, Proceedings 7, pp. 243\u2013269. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_10","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Amani, S., B\u00e9gel, M., Bortin, M., Staples, M.: Towards verifying Ethereum smart contract bytecode in Isabelle\/HOL. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, pp. 66\u201377 (2018)","DOI":"10.1145\/3167084"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"3_CR8","unstructured":"Mueller, B.: Introducing Mythril: a framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereumblockchain-9dc5588f82f6. Accessed 6 Mar 2020"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269 (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"He, J., Balunovi\u0107, M., Ambroladze, N., Tsankov, P., Vechev, M.: Learning to fuzz from symbolic execution with application to smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 531\u2013548 (2019)","DOI":"10.1145\/3319535.3363230"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Lin, G., Xiao, W., Zhang, J., Xiang, Y.: Deep learning-based vulnerable function detection: a benchmark. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, 15\u201317 December 2019, Revised Selected Papers 21, pp. 219\u2013232. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_13","DOI":"10.1007\/978-3-030-41579-2_13"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tantithamthavorn, C., Li, L., Liu, Y.: Deep learning for android malware defenses: a systematic literature review. ACM J. ACM (JACM) (2022)","DOI":"10.1145\/3544968"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Guo, N., Li, X., Yin, H., Gao, Y.: VulHunter: an automated vulnerability detection system based on deep learning and bytecode. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, 15\u201317 December 2019, Revised Selected Papers 21, pp. 199\u2013218. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_12","DOI":"10.1007\/978-3-030-41579-2_12"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"3399","DOI":"10.32604\/cmc.2022.020173","volume":"70","author":"T Ghazal","year":"2022","unstructured":"Ghazal, T.: Data fusion-based machine learning architecture for intrusion detection. Comput. Mater. Continua 70(2), 3399\u20133413 (2022)","journal-title":"Comput. Mater. Continua"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Dong, Y., Chen, X., Shen, L., Wang, D.: Privacy-preserving distributed machine learning based on secret sharing. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, 15\u201317 December 2019, Revised Selected Papers 21, pp. 684\u2013702. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_40","DOI":"10.1007\/978-3-030-41579-2_40"},{"key":"3_CR16","unstructured":"Tann, W.J.W., Han, X.J., Gupta, S.S., Ong, Y.S.: Towards safer smart contracts: a sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632 (2018)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., Zimmermann, R., Wang, X.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8, 19685\u201319695 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: automated vulnerability detection models for Ethereum smart contracts. IEEE Trans. Network Sci. Eng. 8(2), 1133\u20131144 (2020)","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Liu, Z., Qian, P., Liu, Q., Wang, X., He, Q.: Smart contract vulnerability detection using graph neural network. In: IJCAI, pp. 3283\u20133290 (2020)","DOI":"10.24963\/ijcai.2020\/454"},{"issue":"2","key":"3_CR20","first-page":"1296","volume":"35","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans. Knowl. Data Eng. 35(2), 1296\u20131310 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"3_CR21","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., et al.: Language models are unsupervised multitask learners. OpenAI Blog 1(8), 9 (2019)","journal-title":"OpenAI Blog"},{"key":"3_CR22","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., et al.: Language models are few-shot learners. Adv. Neural. Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3_CR23","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, P., et al.: Attention-based bidirectional long short-term memory networks for relation classification. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (vol. 2: Short papers), pp. 207\u2013212 (2016)","DOI":"10.18653\/v1\/P16-2034"},{"key":"3_CR25","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units. arXiv preprint arXiv:1508.07909 (2015)","DOI":"10.18653\/v1\/P16-1162"},{"key":"3_CR27","unstructured":"Asia, M.R.: CodeGPT-small-java-adaptedGPT2 model weights. https:\/\/huggingface.co\/microsoft\/CodeGPT-small-java-adaptedGPT2, date of publication not available. Accessed 2 Jan 2023"},{"key":"3_CR28","unstructured":"Qian, P.: Smart contract dataset (resource2) (2022). https:\/\/github.com\/Messi-Q\/Smart-Contract-Dataset. Accessed 28 Dec 2022"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VulDeePecker: a deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681 (2018)","DOI":"10.14722\/ndss.2018.23158"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0859-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T16:07:37Z","timestamp":1708963657000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0859-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708581","9789819708598"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0859-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}