{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:10:21Z","timestamp":1758057021533,"version":"3.44.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05230-2","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:48:14Z","timestamp":1755604094000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract"],"prefix":"10.1007","volume":"28","author":[{"given":"Ghazi Mergani Ahmead","family":"Ali","sequence":"first","affiliation":[]},{"given":"Hongsong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5230_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. SSRN Electron. J. 1\u20139 (2008) [Online]. https:\/\/www.ssrn.com\/abstract=3440802"},{"key":"5230_CR2","doi-asserted-by":"publisher","unstructured":"Sahoo, S.S., Menon, A.R., Chaurasiya, V.K.: Secure blockchain model for vehicles toll collection by GPS tracking: a case study of India. In: Proc.\u20143rd IEEE India Counc. Int. Subsections Conf. Impactful Innov. Benefits Soc. Ind. INDISCON 2022, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/INDISCON54605.2022.9862921","DOI":"10.1109\/INDISCON54605.2022.9862921"},{"issue":"6","key":"5230_CR3","doi-asserted-by":"publisher","first-page":"16869","DOI":"10.1007\/s11042-023-15634-0","volume":"83","author":"SS Sahoo","year":"2024","unstructured":"Sahoo, S.S., Chaurasiya, V.K.: VIBE: blockchain-based virtual payment in IoT ecosystem: a secure decentralized marketplace. Multimed. Tools Appl. 83(6), 16869\u201316894 (2024). https:\/\/doi.org\/10.1007\/s11042-023-15634-0","journal-title":"Multimed. Tools Appl."},{"key":"5230_CR4","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.4018\/978-1-7998-5351-0.ch069","volume":"1","author":"MI Mehar","year":"2020","unstructured":"Mehar, M.I., et al.: Understanding a revolutionary and flawed grand experiment in blockchain: the DAO attack. Res. Anthol. Blockchain Technol. Bus., Heal. Educ. Gov. 1, 1253\u20131266 (2020). https:\/\/doi.org\/10.4018\/978-1-7998-5351-0.ch069","journal-title":"Res. Anthol. Blockchain Technol. Bus., Heal. Educ. Gov."},{"key":"5230_CR5","doi-asserted-by":"publisher","unstructured":"Destefanis, G., Marchesi, M., Ortu, M., Tonelli, R., Bracciali, A., Hierons, R.: Smart contracts vulnerabilities: A call for blockchain software engineering? In: 2018 IEEE 1st Int. Work. Blockchain Oriented Softw. Eng. IWBOSE 2018\u2014Proc., vol. 2018, pp. 19\u201325 (2018). https:\/\/doi.org\/10.1109\/IWBOSE.2018.8327567.","DOI":"10.1109\/IWBOSE.2018.8327567"},{"issue":"2","key":"5230_CR6","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.matpr.2021.03.647","volume":"81","author":"N Saud Al-Musib","year":"2021","unstructured":"Saud Al-Musib, N., Mohammad Al-Serhani, F., Humayun, M., Jhanjhi, N.Z.: Business email compromise (BEC) attacks. Mater. Today Proc. 81(2), 497\u2013503 (2021). https:\/\/doi.org\/10.1016\/j.matpr.2021.03.647","journal-title":"Mater. Today Proc."},{"issue":"1","key":"5230_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-023-47219-0","volume":"13","author":"X Tang","year":"2023","unstructured":"Tang, X., Du, Y., Lai, A., Zhang, Z., Shi, L.: Deep learning-based solution for smart contract vulnerabilities detection. Sci. Rep. 13(1), 1\u201317 (2023). https:\/\/doi.org\/10.1038\/s41598-023-47219-0","journal-title":"Sci. Rep."},{"key":"5230_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/math11234823","author":"J Li","year":"2023","unstructured":"Li, J., Lu, G., Gao, Y., Gao, F.: A smart contract vulnerability detection mechanism based on deep learning and expert rules. Mathematics (2023). https:\/\/doi.org\/10.3390\/math11234823","journal-title":"Mathematics"},{"key":"5230_CR9","doi-asserted-by":"publisher","DOI":"10.1145\/3360285","author":"AY Majid","year":"2020","unstructured":"Majid, A.Y., et al.: Dynamic task-based intermittent execution for energy-harvesting devices. ACM Trans. Sens. Netw. (2020). https:\/\/doi.org\/10.1145\/3360285","journal-title":"ACM Trans. Sens. Netw."},{"key":"5230_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3182373","author":"Y Xue","year":"2022","unstructured":"Xue, Y., et al.: xFuzz: machine learning guided cross-contract fuzzing. IEEE Trans. Depend. Secur. Comput. (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3182373","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"5230_CR11","doi-asserted-by":"publisher","unstructured":"Torres, C.F., Iannillo, A.K., Gervais, A., State, R.: Towards smart hybrid fuzzing for smart contracts. In: Proc.\u20142021 IEEE Eur. Symp. Secur. Privacy, Euro S P 2021, no. i, pp. 103\u2013119 (2021). https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00018","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"5230_CR12","doi-asserted-by":"publisher","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J., Lin, Y., Minh, Q.T. Sfuzz: an efficient adaptive fuzzer for solidity smart contracts. In: Proceedings\u2014International Conference on Software Engineering, pp. 778\u2013788 (2020). https:\/\/doi.org\/10.1145\/3377811.3380334.","DOI":"10.1145\/3377811.3380334"},{"key":"5230_CR13","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., et al.: Formal verification of smart contracts: short paper. In: PLAS 2016\u2014Proc. 2016 ACM Work. Program. Lang. Anal. Secur. Co-located with CCS 2016, pp. 91\u201396 (2016). https:\/\/doi.org\/10.1145\/2993600.2993611","DOI":"10.1145\/2993600.2993611"},{"key":"5230_CR14","doi-asserted-by":"publisher","unstructured":"Hirai, Y.: Defining the ethereum virtual machine for interactive theorem provers. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10323 LNCS, pp. 520\u2013535 (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_33","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"5230_CR15","doi-asserted-by":"publisher","unstructured":"Hildenbrandt, E., et al.: KEVM: a complete formal semantics of the ethereum virtual machine. In: Proceedings\u2014IEEE Computer Security Foundations Symposium, pp. 204\u2013217 (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00022","DOI":"10.1109\/CSF.2018.00022"},{"key":"5230_CR16","doi-asserted-by":"publisher","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: \u2018A\u2019 unified lattice model for static analysis of programs by construction or approximation of fixpoints. Conf. Rec. Annu. ACM Symp. Princ. Program. Lang., Part F1307, 238\u2013252 (1977). https:\/\/doi.org\/10.1145\/512950.512973","DOI":"10.1145\/512950.512973"},{"key":"5230_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780","author":"P Tsankov","year":"2018","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. Proc. ACM Confer. Comput. Commun. Secur. (2018). https:\/\/doi.org\/10.1145\/3243734.3243780","journal-title":"Proc. ACM Confer. Comput. Commun. Secur."},{"key":"5230_CR18","doi-asserted-by":"publisher","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: Proc.\u20142019 IEEE\/ACM 2nd Int. Work. Emerg. Trends Softw. Eng. Blockchain, WETSEB 2019, pp. 8\u201315 (2019). https:\/\/doi.org\/10.1109\/WETSEB.2019.00008","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"5230_CR19","doi-asserted-by":"publisher","unstructured":"Darringer, J.A., King, J.C.: Applications of symbolic execution to program testing. Computer (Long. Beach. Calif). 11(4), 51\u201360 (1978). https:\/\/doi.org\/10.1109\/C-M.1978.218139","DOI":"10.1109\/C-M.1978.218139"},{"key":"5230_CR20","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/2976749.2978309","volume":"24","author":"L Luu","year":"2016","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. Proc. ACM Confer. Comput. Commun. Secur. 24, 254\u2013269 (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","journal-title":"Proc. ACM Confer. Comput. Commun. Secur."},{"key":"5230_CR21","doi-asserted-by":"publisher","unstructured":"Prechtel, D., Gro\u00df, T., M\u00fcller, T.: Evaluating spread of \u2018gasless send\u2019 in ethereum smart contracts. In: 2019 10th IFIP Int. Conf. New Technol. Mobil. Secur. NTMS 2019\u2014Proc. Work. (2019). https:\/\/doi.org\/10.1109\/NTMS.2019.8763848","DOI":"10.1109\/NTMS.2019.8763848"},{"key":"5230_CR22","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: ACM International Conference Proceeding Series, pp. 653\u2013663 (2018). https:\/\/doi.org\/10.1145\/3274694.3274743","DOI":"10.1145\/3274694.3274743"},{"key":"5230_CR23","doi-asserted-by":"publisher","unstructured":"Ellul, J., Pace, G.J.: Runtime verification of ethereum smart contracts. In: Proc.\u20142018 14th Eur. Dependable Comput. Conf. EDCC 2018, pp. 158\u2013163 (2018). https:\/\/doi.org\/10.1109\/EDCC.2018.00036","DOI":"10.1109\/EDCC.2018.00036"},{"key":"5230_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102813","volume":"120","author":"C Beaman","year":"2022","unstructured":"Beaman, C., Redbourne, M., Mummery, J.D., Hakak, S.: Fuzzing vulnerability discovery techniques: survey, challenges and future directions. Comput. Secur. 120, 102813 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102813","journal-title":"Comput. Secur."},{"key":"5230_CR25","doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: ASE 2018\u2014Proc. 33rd ACM\/IEEE Int. Conf. Autom. Softw. Eng., pp. 259\u2013269 (2018). https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"issue":"1","key":"5230_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-05051-9","volume":"11","author":"GMA Hongsong Chen","year":"2025","unstructured":"Hongsong Chen, G.M.A.: MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts. Clust. Comput. 11(1), 1\u201314 (2025). https:\/\/doi.org\/10.1007\/s10586-024-05051-9","journal-title":"Clust. Comput."},{"issue":"8","key":"5230_CR27","doi-asserted-by":"publisher","first-page":"3059","DOI":"10.13328\/j.cnki.jos.006375","volume":"33","author":"P Qian","year":"2022","unstructured":"Qian, P., Liu, Z.G., He, Q.M., Huang, B.T., Tian, D.Z., Wang, X.: Smart contract vulnerability detection technique: a survey. Ruan Jian Xue BaoJ. Softw. 33(8), 3059\u20133085 (2022). https:\/\/doi.org\/10.13328\/j.cnki.jos.006375","journal-title":"Ruan Jian Xue BaoJ. Softw."},{"key":"5230_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6","author":"I Grishchenko","year":"2017","unstructured":"Grishchenko, I., Maffei, M., et al.: A survey of attacks on ethereum smart contracts (SoK) (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6","journal-title":"A survey of attacks on ethereum smart contracts (SoK)"},{"key":"5230_CR29","unstructured":"Feng, X., Wang, Q., Zhu, X., Wen, S.: Bug searching in smart contract (2019) [Online]. http:\/\/arxiv.org\/abs\/1905.00799"},{"key":"5230_CR30","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377650","author":"E Lai","year":"2020","unstructured":"Lai, E., Luo, W.: Static analysis of integer overflow of smart contracts in ethereum. ACM Int. Confer. Proc. Ser. (2020). https:\/\/doi.org\/10.1145\/3377644.3377650","journal-title":"ACM Int. Confer. Proc. Ser."},{"issue":"3","key":"5230_CR31","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1007\/s13369-023-07899-2","volume":"49","author":"SS Sahoo","year":"2024","unstructured":"Sahoo, S.S., Menon, A.R., Chaurasiya, V.K.: Blockchain based n-party virtual payment model with concurrent execution. Arab. J. Sci. Eng. 49(3), 3285\u20133312 (2024). https:\/\/doi.org\/10.1007\/s13369-023-07899-2","journal-title":"Arab. J. Sci. Eng."},{"key":"5230_CR32","doi-asserted-by":"publisher","unstructured":"Staderini, M., Palli, C., Bondavalli, A.: Classification of ethereum vulnerabilities and their propagations. In: 2020 2nd Int. Conf. Blockchain Comput. Appl. BCCA 2020, pp. 44\u201351 (2020). https:\/\/doi.org\/10.1109\/BCCA50787.2020.9274458","DOI":"10.1109\/BCCA50787.2020.9274458"},{"issue":"2","key":"5230_CR33","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: automated vulnerability detection models for ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. 8(2), 1133\u20131144 (2021). https:\/\/doi.org\/10.1109\/TNSE.2020.2968505","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5230_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02379-z","author":"C Xing","year":"2020","unstructured":"Xing, C., Chen, Z., Chen, L., Guo, X., Zheng, Z., Li, J.: A new scheme of vulnerability analysis in smart contract with machine learning. Wirel. Netw. (2020). https:\/\/doi.org\/10.1007\/s11276-020-02379-z","journal-title":"Wirel. Netw."},{"key":"5230_CR35","doi-asserted-by":"publisher","unstructured":"Gopali, S., Khan, Z.A., Chhetri, B., Karki, B., Namin, A.S.: Vulnerability detection in smart contracts using deep learning. In: Proceedings\u20142022 IEEE 46th Annual Computers, Software, and Applications Conference, COMPSAC 2022, pp. 1249\u20131255 (2022). https:\/\/doi.org\/10.1109\/COMPSAC54236.2022.00197","DOI":"10.1109\/COMPSAC54236.2022.00197"},{"key":"5230_CR36","doi-asserted-by":"publisher","unstructured":"Solomon, G.J., Zhang, P., Liu, Y., Brooks, R.: An efficient vulnerability detection model for ethereum smart contracts. In: Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11928 LNCS, pp. 371\u2013386 (2019). https:\/\/doi.org\/10.1007\/978-3-030-36938-5_22","DOI":"10.1007\/978-3-030-36938-5_22"},{"key":"5230_CR37","unstructured":"Wang, Z., Wu, W., Zeng, C., Yao, J., Yang, Y., Xu, H.: Graph neural networks enhanced smart contract vulnerability detection of educational blockchain (2023) [Online]. http:\/\/arxiv.org\/abs\/2303.04477"},{"key":"5230_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109289","volume":"217","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Wang, J., Wang, W., Jin, Z., Su, Y., Chen, H.: Smart contract vulnerability detection combined with multi-objective detection. Comput. Netw. 217, 109289 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109289","journal-title":"Comput. Netw."},{"key":"5230_CR39","doi-asserted-by":"publisher","unstructured":"Momeni, P., Wang, Y., Samavi, R.: Machine learning model for smart contracts security analysis. In: 2019 17th Int. Conf. Privacy, Secur. Trust. PST 2019\u2014Proc. (2019). https:\/\/doi.org\/10.1109\/PST47121.2019.8949045","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"5230_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.125","author":"KL Narayana","year":"2022","unstructured":"Narayana, K.L., Sathiyamurthy, K.: Automation and smart materials in detecting smart contracts vulnerabilities in Blockchain using deep learning. Mater. Today Proc. (2022). https:\/\/doi.org\/10.1016\/j.matpr.2021.04.125","journal-title":"Mater. Today Proc."},{"issue":"24","key":"5230_CR41","doi-asserted-by":"publisher","first-page":"24695","DOI":"10.1109\/JIOT.2022.3196269","volume":"9","author":"Q Zhou","year":"2022","unstructured":"Zhou, Q., Zheng, K., Zhang, K., Hou, L., Wang, X.: Vulnerability analysis of smart contract for blockchain-based IoT applications: a machine learning approach. IEEE Internet Things J. 9(24), 24695\u201324707 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3196269","journal-title":"IEEE Internet Things J."},{"key":"5230_CR42","unstructured":"smartbugs-wild\/contracts [Online]. https:\/\/github.com\/smartbugs\/smartbugs-wild\/tree\/master\/contracts. . Accessed 19 Jan 2025"},{"key":"5230_CR43","unstructured":"solidity-parser [Online]. https:\/\/github.com\/federicobond\/solidity-parser-antlr. Accessed 15 Sep 2023"},{"key":"5230_CR44","unstructured":"Harer, J.A., et al.: Automated software vulnerability detection with machine learning (2018) [Online]. http:\/\/arxiv.org\/abs\/1803.04497"},{"key":"5230_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107517","volume":"174","author":"J Cheng","year":"2024","unstructured":"Cheng, J., Chen, Y., Cao, Y., Wang, H.: A vulnerability detection framework by focusing on critical execution paths. Inf. Softw. Technol. 174, 107517 (2024). https:\/\/doi.org\/10.1016\/j.infsof.2024.107517","journal-title":"Inf. Softw. Technol."},{"key":"5230_CR46","doi-asserted-by":"publisher","first-page":"788","DOI":"10.3233\/FAIA231090","volume":"378","author":"GM Ali","year":"2023","unstructured":"Ali, G.M., Chen, H.: Power of fuzzing and machine learning in smart contract security validation. Front. Artif. Intell. Appl. 378, 788\u2013796 (2023). https:\/\/doi.org\/10.3233\/FAIA231090","journal-title":"Front. Artif. Intell. Appl."},{"key":"5230_CR47","doi-asserted-by":"publisher","first-page":"175467","DOI":"10.1109\/ACCESS.2020.3026044","volume":"8","author":"J Yang","year":"2020","unstructured":"Yang, J., Sheng, Y., Wang, J.: A GBDT-paralleled quadratic ensemble learning for intrusion detection system. IEEE Access 8, 175467\u2013175482 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3026044","journal-title":"IEEE Access"},{"issue":"3","key":"5230_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/risks8030083","volume":"8","author":"R Richman","year":"2020","unstructured":"Richman, R., W\u00fcthrich, M.V.: Nagging predictors. Risks 8(3), 1\u201326 (2020). https:\/\/doi.org\/10.3390\/risks8030083","journal-title":"Risks"},{"key":"5230_CR49","unstructured":"Clyde, M., Lee, H.: Bagging and the Bayesian bootstrap. Artif. Intell. Stat. 2001, 169\u2013174 (2001) [Online]. ftp:\/\/ftp.stat.duke.edu\/pub\/WorkingPapers\/00-34.pdf"},{"key":"5230_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119030","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119030","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"5230_CR51","first-page":"1189","volume":"53","author":"M Petrere-Jr","year":"2014","unstructured":"Petrere-Jr, M.: Greedy function approximation: a gradient boosting machine\u2019. Ci\u00eancia Hoje 53(5), 1189\u20131232 (2014)","journal-title":"Ci\u00eancia Hoje"},{"key":"5230_CR52","doi-asserted-by":"publisher","unstructured":"Machado, M.R., Karray, S., De Sousa, I.T.: LightGBM: an effective decision tree gradient boosting method to predict customer loyalty in the finance industry. In: 14th Int. Conf. Comput. Sci. Educ. ICCSE 2019, no. Nips, pp. 1111\u20131116 (2019). https:\/\/doi.org\/10.1109\/ICCSE.2019.8845529","DOI":"10.1109\/ICCSE.2019.8845529"},{"issue":"Section 4","key":"5230_CR53","first-page":"6638","volume":"2018","author":"L Prokhorenkova","year":"2018","unstructured":"Prokhorenkova, L., Gusev, G., Vorobev, A., Dorogush, A.V., Gulin, A.: Catboost: unbiased boosting with categorical features. Adv. Neural. Inf. Process. Syst. 2018(Section 4), 6638\u20136648 (2018)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5230_CR54","doi-asserted-by":"publisher","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785.","DOI":"10.1145\/2939672.2939785"},{"key":"5230_CR55","unstructured":"Etherscan [Online]. https:\/\/etherscan.io\/. Accessed 27 Sep 2023"},{"key":"5230_CR56","unstructured":"SolidiFI-benchmark [Online]. https:\/\/github.com\/DependableSystemsLab\/SolidiFI\/tree\/master. Accessed: 27 Nov 2023"},{"issue":"4","key":"5230_CR57","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/s40484-016-0081-2","volume":"4","author":"Y Jiao","year":"2016","unstructured":"Jiao, Y., Du, P.: Performance measures in evaluating machine learning based bioinformatics predictors for classifications. Quant. Biol. 4(4), 320\u2013330 (2016). https:\/\/doi.org\/10.1007\/s40484-016-0081-2","journal-title":"Quant. Biol."},{"issue":"2","key":"5230_CR58","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1109\/TKDE.2021.3095196","volume":"35","author":"Z Liu","year":"2023","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans. Knowl. Data Eng. 35(2), 1296\u20131310 (2023). https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5230_CR59","doi-asserted-by":"publisher","unstructured":"Ashizawa, N., Yanai, N., Cruz, J.P., Okamura, S.: Eth2Vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts. In: BSCI 2021\u2014Proc. 3rd ACM Int. Symp. Blockchain Secur. Crit. Infrastructure, Co-located with ASIA CCS 2021, pp. 47\u201359 (2021). https:\/\/doi.org\/10.1145\/3457337.3457841","DOI":"10.1145\/3457337.3457841"},{"key":"5230_CR60","doi-asserted-by":"crossref","unstructured":"Liao, J., Tsai, T., He, C., Tien, C.: SoliAudit: smart contract vulnerability assessment based on machine learning and fuzz testing. In: 2019 6th Int. Conf. Internet Things Syst. Manag. Secur., pp. 458\u2013465 (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939256"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05230-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05230-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05230-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:06:54Z","timestamp":1757963214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05230-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":60,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5230"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05230-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"19 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"528"}}