{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:12:42Z","timestamp":1766139162009,"version":"3.44.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFC3303803"],"award-info":[{"award-number":["2023YFC3303803"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-05051-9","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T12:02:11Z","timestamp":1745841731000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts"],"prefix":"10.1007","volume":"28","author":[{"given":"Ghazi Mergani Ahmead","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8159-4984","authenticated-orcid":false,"given":"Hongsong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"5051_CR1","doi-asserted-by":"publisher","unstructured":"Smart contracts implementation, applications, benefits, and limitations. Public. Policy Adm. Res. (2019). https:\/\/doi.org\/10.7176\/ppar\/9-9-06","DOI":"10.7176\/ppar\/9-9-06"},{"key":"5051_CR2","doi-asserted-by":"crossref","unstructured":"Suvitha, M., Subha, R.: A Survey on Smart Contract Platforms and Features. In: 2021 7th Int. Conf. Adv. Comput. Commun. Syst. ICACCS 2021. pp 1536\u20131539 (2021)","DOI":"10.1109\/ICACCS51430.2021.9441970"},{"key":"5051_CR3","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing - Brute Force Vulnerability Discovery. Pearson Education (2007)"},{"key":"5051_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX Utilities. Commun. ACM. 33, 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"5051_CR5","doi-asserted-by":"publisher","first-page":"102813","DOI":"10.1016\/j.cose.2022.102813","volume":"120","author":"C Beaman","year":"2022","unstructured":"Beaman, C., Redbourne, M., Mummery, J.D., Hakak, S.: Fuzzing vulnerability discovery techniques: Survey, challenges and future directions. Comput. Secur. 120, 102813 (2022)","journal-title":"Comput. Secur."},{"key":"5051_CR6","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TIFS.2023.3237370","volume":"18","author":"Z Liu","year":"2023","unstructured":"Liu, Z., Qian, P., Yang, J., Liu, L., Xu, X., He, Q., Zhang, X.: Rethinking Smart Contract Fuzzing: Fuzzing with Invocation Ordering and important Branch Revisiting. IEEE Trans. Inf. Forensics Secur. 18, 1237\u20131251 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5051_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107213","author":"S Ji","year":"2023","unstructured":"Ji, S., Wu, J., Qiu, J., Dong, J.: Effuzz: Efficient fuzzing by directed search for smart contracts. Inf. Softw. Technol. (2023). https:\/\/doi.org\/10.1016\/j.infsof.2023.107213","journal-title":"Inf. Softw. Technol."},{"key":"5051_CR8","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: SmartCheck: Static analysis of ethereum smart contracts. In: Proc. - Int. Conf. Softw. Eng. pp 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"5051_CR9","doi-asserted-by":"publisher","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., Vechev, M.: Securify: Practical security analysis of smart contracts. Proc. ACM Conf. Comput. Commun. Secur. 67\u201382 2018 CCS\u2019 18, October 15\u201319, (2018). https:\/\/doi.org\/10.1145\/3243734.3243780","DOI":"10.1145\/3243734.3243780"},{"key":"5051_CR10","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: A static analysis framework for smart contracts. Proc\u2013\u20092019 IEEE\/ACM 2nd Int Work Emerg Trends Softw Eng Blockchain, WETSEB 2019 8\u201315 (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"5051_CR11","doi-asserted-by":"crossref","unstructured":"Diao, W., Liu, X., Li, Z., Zhang, K.: Evading android runtime analysis through detecting programmed interactions. In: WiSec 2016 - Proc. 9th ACM Conf. Secur. Priv. Wirel. Mob. Networks. pp 159\u2013164 (2016)","DOI":"10.1145\/2939918.2939926"},{"key":"5051_CR12","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. ACM Int Conf Proceeding Ser 653\u2013663 (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"5051_CR13","doi-asserted-by":"crossref","unstructured":"Ellul, J., Pace, G.J.: Runtime Verification of Ethereum Smart Contracts. Proc\u2013\u20092018 14th Eur Dependable Comput Conf EDCC 2018 158\u2013163 (2018)","DOI":"10.1109\/EDCC.2018.00036"},{"key":"5051_CR14","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: Automated vulnerability detection models for Ethereum Smart contracts. IEEE Trans. Netw. Sci. Eng. 8, 1133\u20131144 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5051_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02379-z","author":"C Xing","year":"2020","unstructured":"Xing, C., Chen, Z., Chen, L., Guo, X., Zheng, Z., Li, J.: A new scheme of vulnerability analysis in smart contract with machine learning. Wirel. Networks. (2020). https:\/\/doi.org\/10.1007\/s11276-020-02379-z","journal-title":"Wirel. Networks"},{"key":"5051_CR16","doi-asserted-by":"crossref","unstructured":"Gopali, S., Khan, Z.A., Chhetri, B., Karki, B., Namin, A.S.: Vulnerability Detection in Smart Contracts Using Deep Learning. In: Proc.\u2013\u20092022 IEEE 46th Annu. Comput. Software, Appl. Conf. COMPSAC 2022. pp 1249\u20131255 (2022)","DOI":"10.1109\/COMPSAC54236.2022.00197"},{"key":"5051_CR17","first-page":"371","volume":"11928 LNCS","author":"GJ Solomon","year":"2019","unstructured":"Solomon, G.J., Zhang, P., Liu, Y., Brooks, R.: An efficient vulnerability detection model for Ethereum Smart contracts. Lect Notes Comput. Sci. (Including Subser. Lect Notes Artif. Intell. Lect Notes Bioinformatics). 11928 LNCS, 371\u2013386 (2019)","journal-title":"Lect Notes Comput. Sci. (Including Subser. Lect Notes Artif. Intell. Lect Notes Bioinformatics)"},{"key":"5051_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wu, W., Zeng, C., Yao, J., Yang, Y., Xu, H.: Graph Neural Networks Enhanced Smart Contract Vulnerability Detection of Educational Blockchain. (2023)","DOI":"10.1109\/IEIR56323.2022.10050059"},{"key":"5051_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949045","author":"P Momeni","year":"2019","unstructured":"Momeni, P., Wang, Y., Samavi, R.: Machine learning model for smart contracts security analysis. 2019 17th Int. Conf. Priv. Secur. Trust PST 2019 - Proc. (2019). https:\/\/doi.org\/10.1109\/PST47121.2019.8949045","journal-title":"2019 17th Int. Conf. Priv. Secur. Trust PST 2019 - Proc."},{"key":"5051_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.125","author":"KL Narayana","year":"2022","unstructured":"Narayana, K.L., Sathiyamurthy, K.: Automation and smart materials in detecting smart contracts vulnerabilities in Blockchain using deep learning. Mater. Today Proc. (2022). https:\/\/doi.org\/10.1016\/j.matpr.2021.04.125","journal-title":"Mater. Today Proc."},{"key":"5051_CR21","doi-asserted-by":"publisher","first-page":"24695","DOI":"10.1109\/JIOT.2022.3196269","volume":"9","author":"Q Zhou","year":"2022","unstructured":"Zhou, Q., Zheng, K., Zhang, K., Hou, L., Wang, X.: Vulnerability analysis of Smart Contract for Blockchain-based IoT applications: A Machine Learning Approach. IEEE Internet Things J. 9, 24695\u201324707 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5051_CR22","unstructured":"The Art: Science, and Engineering of Fuzzing: A Survey"},{"key":"5051_CR23","unstructured":"Saavedra, G.J., Rodhouse, K.N., Dunlavy, D.M., Kegelmeyer, P.W.: A Review of Machine Learning Applications in Fuzzing. (2019)"},{"key":"5051_CR24","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, B., Wei, L., Liu, Y.: Skyfire: Data-Driven Seed Generation for Fuzzing. In: Proc. - IEEE Symp. Secur. Priv. pp 579\u2013594 (2017)","DOI":"10.1109\/SP.2017.23"},{"key":"5051_CR25","first-page":"1","volume":"15","author":"C Miller","year":"2007","unstructured":"Miller, C., Peterson, Z.: Analysis of mutation and generation-based fuzzing. Defcon. 15, 1\u20137 (2007)","journal-title":"Defcon"},{"key":"5051_CR26","first-page":"560","volume":"557","author":"G Grieco","year":"2020","unstructured":"Grieco, G., Song, W., Cygan, A., Feist, J., Groce, A.: Echidna: Effective, usable, and fast fuzzing for smart contracts. ISSTA 2020 - Proc. 29th ACM SIGSOFT Int. Symp. Softw. Test. Anal. 557, 560 (2020)","journal-title":"ISSTA 2020 - Proc. 29th ACM SIGSOFT Int. Symp. Softw. Test. Anal."},{"key":"5051_CR27","doi-asserted-by":"publisher","unstructured":"W\u00fcstholz, V., Christakis, M.: Harvey: A greybox fuzzer for smart contracts. ESEC\/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1398\u20131409 (2020). https:\/\/doi.org\/10.1145\/3368089.3417064","DOI":"10.1145\/3368089.3417064"},{"key":"5051_CR28","unstructured":"Li, Y., Ji, S., Lv, C., Chen, Y., Chen, J., Gu, Q., Wu, C.: V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. 1\u201316 (2019)"},{"key":"5051_CR29","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Iannillo, A.K., Gervais, A., State, R.: Towards Smart Hybrid Fuzzing for Smart Contracts. Proc\u2013\u20092021 IEEE Eur Symp Secur Privacy, Euro S P 2021 103\u2013119 (2021)","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"5051_CR30","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0237749","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Jia, P., Liu, L., Huang, C., Liu, Z.: A systematic review of fuzzing based on machine learning techniques. PLoS One. (2020). https:\/\/doi.org\/10.1371\/journal.pone.0237749","journal-title":"PLoS One"},{"key":"5051_CR31","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560429","author":"J Su","year":"2022","unstructured":"Su, J., Dai, H.N., Zhao, L., Zheng, Z., Luo, X.: Effectively Generating vulnerable transaction sequences in Smart contracts with reinforcement learning-guided Fuzzing. ACM Int. Conf. Proceeding Ser. (2022). https:\/\/doi.org\/10.1145\/3551349.3560429","journal-title":"ACM Int. Conf. Proceeding Ser."},{"key":"5051_CR32","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.vetimm.2013.08.005","volume":"155","author":"S Goodfellow","year":"2013","unstructured":"Goodfellow, S., Kim, D.S., Jasmine, H., van der Meer, F., Czub, M., Abdul-Careem, M.F.: Induction of toll-like receptor 4 signaling in avian macrophages inhibits infectious laryngotracheitis virus replication in a nitric oxide dependent way. Vet. Immunol. Immunopathol. 155, 270\u2013275 (2013)","journal-title":"Vet. Immunol. Immunopathol."},{"key":"5051_CR33","unstructured":"Che, T., Li, Y., Zhang, R., Hjelm, R.D., Li, W., Song, Y., Bengio, Y.: Maximum-Likelihood Augmented Discrete Generative Adversarial Networks. (2017)"},{"key":"5051_CR34","unstructured":"Kusner, M.J., Hern\u00e1ndez-Lobato, J.M.: GANS for Sequences of Discrete Elements with the Gumbel-softmax Distribution. (2016)"},{"key":"5051_CR35","doi-asserted-by":"crossref","unstructured":"Yu, L., Zhang, W., Wang, J., Yu, Y.: SeqGAN: Sequence generative adversarial nets with policy gradient. In: 31st AAAI Conf. Artif. Intell. AAAI 2017. pp 2852\u20132858 (2017)","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"5051_CR36","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TR.2022.3161634","volume":"71","author":"B Li","year":"2022","unstructured":"Li, B., Pan, Z., Hu, T.: ReDefender: Detecting reentrancy vulnerabilities in smart contracts automatically. IEEE Trans. Reliab. 71, 984\u2013999 (2022)","journal-title":"IEEE Trans. Reliab."},{"key":"5051_CR37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404","author":"S Rawat","year":"2017","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: VUzzer: Application-aware evolutionary fuzzing. 24th Annu. Netw. Distrib. Syst. Secur. Symp. NDSS 2017. (2017). https:\/\/doi.org\/10.14722\/ndss.2017.23404","journal-title":"24th Annu. Netw. Distrib. Syst. Secur. Symp. NDSS 2017"},{"key":"5051_CR38","doi-asserted-by":"crossref","unstructured":"Peng, H., Shoshitaishvili, Y., Payer, M.: T-Fuzz: Fuzzing by Program Transformation. In: Proc. - IEEE Symp. Secur. Priv. pp 697\u2013710 (2018)","DOI":"10.1109\/SP.2018.00056"},{"key":"5051_CR39","doi-asserted-by":"crossref","unstructured":"Chen, P., Chen, H.: Angora: Efficient Fuzzing by Principled Search. In: Proc. - IEEE Symp. Secur. Priv. pp 711\u2013725 (2018)","DOI":"10.1109\/SP.2018.00046"},{"key":"5051_CR40","doi-asserted-by":"crossref","unstructured":"Han, G., Li, Z., Tang, P., Hu, C., Guo, S.: FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. In: Proc.\u2013\u200924th IEEE Int. Conf. High Perform. Comput. Commun. 8th IEEE Int. Conf. Data Sci. Syst. 20th IEEE Int. Conf. Smart City 8th IEEE Int. Conf. Dep. pp 1601\u20131608 (2022)","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00244"},{"key":"5051_CR41","first-page":"298","volume":"2017 1","author":"M Arjovsky","year":"2017","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. 34th Int. Conf. Mach. Learn. ICML. 2017 1, 298\u2013321 (2017)","journal-title":"34th Int. Conf. Mach. Learn. ICML"},{"key":"5051_CR42","doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: Fuzzing smart contracts for vulnerability detection. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE\u201918). Association for Computing Machinery, New York, NY, USA, 259\u2013269. https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"5051_CR43","unstructured":"Zhiheng Huang, Wei Xu, Kai Yu: Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 (2015). https:\/\/arxiv.org\/pdf\/1508.01991"},{"key":"5051_CR44","doi-asserted-by":"crossref","unstructured":"Zhou, T., Liu, K., Li, L., Liu, Z., Klein, J., Bissyande, T.F.: SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In: Proc.\u2013\u20092021 IEEE Int. Conf. Softw. Maint. Evol. ICSME 2021. pp 23\u201334 (2021)","DOI":"10.1109\/ICSME52107.2021.00009"},{"key":"5051_CR45","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MS.2020.3003921","volume":"37","author":"D Wang","year":"2020","unstructured":"Wang, D., Liu, K., Li, L.: On the need of understanding the failures of Smart contracts. IEEE Softw. 37, 49\u201354 (2020)","journal-title":"IEEE Softw."},{"key":"5051_CR46","unstructured":"smartbugs-wild: https:\/\/github.com\/smartbugs\/smartbugs-wild. Accessed 22 Feb 2024"},{"key":"5051_CR47","unstructured":"Etherscan: https:\/\/etherscan.io\/. Accessed 27 Sep 2023"},{"key":"5051_CR48","doi-asserted-by":"publisher","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J., Lin, Y., Minh, Q.T.: Sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering (ICSE\u201920). Association for Computing Machinery, New York, NY, USA, 778\u2013788. https:\/\/doi.org\/10.1145\/3377811.3380334","DOI":"10.1145\/3377811.3380334"},{"key":"5051_CR49","unstructured":"Driessen, S., Di Nucci, D., Monsieur, G., Tamburri, D.A., van den Heuvel, W.-J.: Automated Test-Case Generation for Solidity Smart Contracts. the AGSolT Approach and its Evaluation (2022)"},{"key":"5051_CR50","unstructured":"ContractFuzzer benchmark: (2024). https:\/\/github.com\/gongbell\/ContractFuzzer\/tree\/master\/examples. Accessed 16"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05051-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05051-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05051-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:32:55Z","timestamp":1757161975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05051-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["5051"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05051-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"22 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"337"}}