{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:25:06Z","timestamp":1774466706822,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17308-3","type":"journal-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T06:01:50Z","timestamp":1699855310000},"page":"51469-51512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Digital forensic framework for smart contract vulnerabilities using ensemble models"],"prefix":"10.1007","volume":"83","author":[{"given":"Lohith","family":"J J","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kunwar","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4978-434X","authenticated-orcid":false,"given":"Bharatesh","family":"Chakravarthi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"issue":"9","key":"17308_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2018.3620971","volume":"51","author":"TN Dinh","year":"2018","unstructured":"Dinh TN, Thai MT (2018) AI and blockchain: a disruptive integration. Computer 51(9):48\u201353","journal-title":"Computer"},{"key":"17308_CR2","doi-asserted-by":"crossref","unstructured":"Parthasarathy S, Harikrishnan A, Narayanan G, Singh K et al (2021) Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation. In: 2021 11th IFIP international conference on new technologies, mobility and security (NTMS), pp 1\u20135","DOI":"10.1109\/NTMS49979.2021.9432643"},{"issue":"4","key":"17308_CR3","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1002\/sres.2710","volume":"37","author":"L Zhang","year":"2020","unstructured":"Zhang L, Xie Y, Zheng Y, Xue W, Zheng X, Xu X (2020) The challenges and countermeasures of blockchain in finance and economics. Syst Res Behav Sci 37(4):691\u2013698","journal-title":"Syst Res Behav Sci"},{"issue":"9","key":"17308_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MC.2017.3571047","volume":"50","author":"P Treleaven","year":"2017","unstructured":"Treleaven P, Brown RG, Yang D (2017) Blockchain technology in finance. Computer 50(9):14\u201317","journal-title":"Computer"},{"key":"17308_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101532","volume":"58","author":"AK Kar","year":"2021","unstructured":"Kar AK, Navin L (2021) Diffusion of blockchain in insurance industry: an analysis through the review of academic and trade literature. Telemat Informat 58:101532","journal-title":"Telemat Informat"},{"key":"17308_CR6","doi-asserted-by":"crossref","unstructured":"Olnes S, Ubacht J, Janssen M (2017) Blockchain in government: benefits and implications of distributed ledger technology for information sharing 355\u2013364","DOI":"10.1016\/j.giq.2017.09.007"},{"key":"17308_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.04.013","volume":"52","author":"V Thakur","year":"2020","unstructured":"Thakur V, Doja M, Dwivedi YK, Ahmad T, Khadanga G (2020) Land records on blockchain for implementation of land titling in India. Int J Inf Manag 52:101940","journal-title":"Int J Inf Manag"},{"key":"17308_CR8","doi-asserted-by":"crossref","unstructured":"Li C Palanisamy B (2019) Incentivized blockchain-based social media platforms: a case study of steemit. In: Proceedings of the 10th ACM conference on web science, pp 145\u2013154","DOI":"10.1145\/3292522.3326041"},{"key":"17308_CR9","doi-asserted-by":"crossref","unstructured":"Jing TW Murugesan RK (2018) A theoretical framework to build trust and prevent fake news in social media using blockchain. In: International conference of reliable information and communication technology, pp 955\u2013962","DOI":"10.1007\/978-3-319-99007-1_88"},{"key":"17308_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.cie.2019.07.026","volume":"136","author":"F Longo","year":"2019","unstructured":"Longo F, Nicoletti L, Padovano A, d\u2019Atri G, Forte M (2019) Blockchain-enabled supply chain: an experimental study. Comput Ind Eng 136:57\u201369","journal-title":"Comput Ind Eng"},{"key":"17308_CR11","doi-asserted-by":"crossref","unstructured":"Kannan G, Pattnaik M, Karthikeyan G, Augustine BEP, Lohith JJ (2022) Managing the supply chain for the crops directed from agricultural fields using blockchains. In: International conference on electronics and renewable systems (ICEARS)","DOI":"10.1109\/ICEARS53579.2022.9752088"},{"issue":"12","key":"17308_CR12","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.3390\/app9122400","volume":"9","author":"A Alammary","year":"2019","unstructured":"Alammary A, Alhazmi S, Almasri M, Gillani S (2019) Blockchain-based applications in education: a systematic review. Appl Sci 9(12):2400","journal-title":"Appl Sci"},{"key":"17308_CR13","unstructured":"Antonopoulos AM (2017) Mastering Bitcoin: Programming the open blockchain. Reilly Media, Inc"},{"issue":"1","key":"17308_CR14","first-page":"67","volume":"11","author":"M Thombs","year":"2018","unstructured":"Thombs M, Tillman AA (2018) Designing 21st century curriculum for bitcoin and blockchain studies. Int J Global Business 11(1):67\u201380","journal-title":"Int J Global Business"},{"key":"17308_CR15","unstructured":"Swan M (2015) Blockchain: blueprint for a new economy. Reilly Media, Inc"},{"issue":"3","key":"17308_CR16","first-page":"183","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer M, Gomber P, Hinz O, Schiereck D (2017) Blockchain. Business Inf. Syst Eng 59(3):183\u2013187","journal-title":"Syst Eng"},{"key":"17308_CR17","doi-asserted-by":"crossref","unstructured":"Bogner A, Chanson M, Meeuw A (2016) A decentralised sharing app running a smart contract on the ethereum blockchain. In: Proceedings of the 6th international conference on the Internet of Things, pp 177\u2013178","DOI":"10.1145\/2991561.2998465"},{"issue":"2","key":"17308_CR18","doi-asserted-by":"publisher","first-page":"102462","DOI":"10.1016\/j.ipm.2020.102462","volume":"58","author":"T Hu","year":"2021","unstructured":"Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, Lu J, Zhou K, Liu Y (2021) Transaction-based classification and detection approach for ethereum smart contract. Inf Process Manag 58(2):102462","journal-title":"Inf Process Manag"},{"key":"17308_CR19","unstructured":"Szabo N (1994) Smart contracts"},{"key":"17308_CR20","unstructured":"Nakamoto S (2008) Bitcoin A (2A peer-to-peer electronic cash system). Bitcoin. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"17308_CR21","doi-asserted-by":"crossref","unstructured":"Alkhalifah A, Ng A, Kayes A, Chowdhury J, Alazab M, Watters PA (2020) A taxonomy of blockchain threats and vulnerabilities. In: Blockchain for cybersecurity and privacy, CRC Press, pp 3\u201328","DOI":"10.1201\/9780429324932-2"},{"issue":"3","key":"17308_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391195","volume":"53","author":"H Chen","year":"2020","unstructured":"Chen H, Pendleton M, Njilla L, Xu S (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surveys (CSUR) 53(3):1\u201343","journal-title":"ACM Comput Surveys (CSUR)"},{"issue":"3","key":"17308_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.2991\/ijndc.k.190710.003","volume":"7","author":"W Dingman","year":"2019","unstructured":"Dingman W, Cohen A, Ferrara N, Lynch A, Jasinski P, Black PE, Deng L (2019) Defects and vulnerabilities in smart contracts, a classification using the NIST bugs framework. Int J Netw Distrib Comput 7(3):121\u2013132","journal-title":"Int J Netw Distrib Comput"},{"key":"17308_CR24","unstructured":"Mikolov T, Le QV, Sutskever I. (2013) Exploiting similarities among languages for machine translation. arXiv:1309.4168"},{"key":"17308_CR25","doi-asserted-by":"crossref","unstructured":"Manning CD, Raghavan P, Sch\u00e4utze H (2008) Scoring, term weighting, and the vector space model. Cambridge University Press, pp 100\u2013123","DOI":"10.1017\/CBO9780511809071.007"},{"issue":"3","key":"17308_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting tf-idf term weights as making relevance decisions. ACM Trans Inf Syst (TOIS) 26(3):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"17308_CR27","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: ACM SIGSAC conference on computer and communications security, pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"key":"17308_CR28","doi-asserted-by":"crossref","unstructured":"Chen T, Li Z, Zhang Y, Luo X, Wang T, Hu T, X X, Wang D, Huang J, Zhang X (2019) A large-scale empirical study on control flow identification of smart contracts. In: 2019 ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM), pp 1\u201311 Paik JH (2013) A novel tf-idf weighting scheme for effective ranking. In: Proceedings of the 36th international ACM SIGIR conference on research and development in information retrieval, pp 343\u2013352","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"17308_CR29","unstructured":"Revere R, Antunes JP (Oct 2018) Solgraph"},{"key":"17308_CR30","doi-asserted-by":"crossref","unstructured":"Kushwaha SS, Joshi S, Singh D, Kaur M, H.-N. Lee (2022) Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"17308_CR31","doi-asserted-by":"publisher","first-page":"101129","DOI":"10.1016\/j.pmcj.2020.101129","volume":"63","author":"T Osterland","year":"2020","unstructured":"Osterland T, Rose T (2020) Model checking smart contracts for ethereum. Pervas Mobile Comput 63:101129","journal-title":"Pervas Mobile Comput"},{"key":"17308_CR32","unstructured":"Mueller B Introducing mythril: a framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereumblockchain"},{"key":"17308_CR33","doi-asserted-by":"crossref","unstructured":"Yu F, Alkhalaf M, Bultan T (2009) Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In: 2009 IEEE\/ACM international conference on automated software engineering, pp 605\u2013609","DOI":"10.1109\/ASE.2009.20"},{"key":"17308_CR34","doi-asserted-by":"crossref","unstructured":"Raychev V, Vechev M, Yahav E (2014) Code completion with sta istical language models. In: Proceedings of the 35th ACM SIGPLAN conference on programming language design and implementation, pp 419\u2013428","DOI":"10.1145\/2594291.2594321"},{"key":"17308_CR35","doi-asserted-by":"crossref","unstructured":"Cummins C, Petoumenos P, Murray A, Leather H (2018) Compiler fuzzing through deep learning. In: Proceedings of the 27th ACM SIGSOFT international symposium on software testing and analysis, pp 95\u2013105","DOI":"10.1145\/3213846.3213848"},{"key":"17308_CR36","doi-asserted-by":"crossref","unstructured":"Tufano M, Watson C, Bavota G, Di Penta M, White M, Poshyvanyk D (2018) An empirical investigation into learning bugfixing patches in the wild via neural machine translation. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, pp 832\u2013837","DOI":"10.1145\/3238147.3240732"},{"key":"17308_CR37","unstructured":"He N, Zhang R, Wang H, Wu L, Luo X, Guo Y, Yu T, Jiang X (2021) Eosafe: security analysis of EOSIO smart contracts. In: 30th USENIX security symposium USENIX security 21"},{"key":"17308_CR38","unstructured":"Frank J, Aschermann C, Holz T (2020) ETHBMC: a bounded model checker for smart contracts. In: 29th USENIX security symposium USENIX security 20, pp 2757\u20132774"},{"issue":"2","key":"17308_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-020-9284-9","volume":"15","author":"Z Wang","year":"2021","unstructured":"Wang Z, Jin H, Dai W, Choo K-KR, Zou D (2021) Ethereum smart contract security research: survey and future research opportunities. Front Comput Sci 15(2):1\u201318","journal-title":"Front Comput Sci"},{"key":"17308_CR40","doi-asserted-by":"crossref","unstructured":"Mense A, Flatscher M (2018) Security vulnerabilities in ethereum smart contracts. In: Proceedings of the 20th international conference on information integration and web-based applications and services, pp 375\u2013380","DOI":"10.1145\/3282373.3282419"},{"key":"17308_CR41","doi-asserted-by":"crossref","unstructured":"Nakamura Y, Zhang Y, Sasabe M, Kasahara S (2019) Capabilitybased access control for the Internet of Things: an ethereum blockchain-based scheme. In: 2019 IEEE global communications conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9013321"},{"key":"17308_CR42","unstructured":"Gupta BC (2019) Analysis of ethereum smart contracts\u2013a security perspective. Indian Inst Technol Kanpur 1\u201359"},{"key":"17308_CR43","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st international workshop on emerging trends in software engineering for blockchain, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"17308_CR44","doi-asserted-by":"crossref","unstructured":"Chen H, Pendleton M, Njilla L, Xu S (2019) A survey on ethereum systems security: vulnerabilities, attacks and defenses. arXiv:1908.04507","DOI":"10.1145\/3391195"},{"key":"17308_CR45","unstructured":"Greene R, Johnstone MN (2018) An investigation into a denial of service attack on an ethereum network"},{"key":"17308_CR46","unstructured":"Su L, Shen X, Du X, Liao X, Wang X, Xing L, Liu B (2021) Evil under the sun: understanding and discovering attacks on ethereum decentralized applications. In: 30th USENIXg security symposium (USENIXg Security 21)"},{"key":"17308_CR47","doi-asserted-by":"crossref","unstructured":"B\u00e4unz B, Agrawal S, Zamani M, Boneh D (2020) Zether: towards privacy in a smart contract world. In: International conference on financial cryptography and data security, Springer, pp 423\u2013443","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"17308_CR48","doi-asserted-by":"crossref","unstructured":"Grishchenko I, Maffei M, Schneidewind C (2018) A semantic framework for the security analysis of ethereum smart contracts. In: International conference on principles of security and trust, Springer, pp 243\u2013269","DOI":"10.1007\/978-3-319-89722-6_10"},{"issue":"3","key":"17308_CR49","doi-asserted-by":"publisher","first-page":"102471","DOI":"10.1016\/j.ipm.2020.102471","volume":"58","author":"G Estevam","year":"2021","unstructured":"Estevam G, Palma LM, Silva LR, Martina JE, Vigil M (2021) Accurate and decentralized timestamping using smart contracts on the ethereum blockchain. Inf Process Manag 58(3):102471","journal-title":"Inf Process Manag"},{"key":"17308_CR50","doi-asserted-by":"crossref","unstructured":"Zhang P, Xiao F, Luo X (2020) A framework and dataset for bugs in ethereum smart contracts. In: 2020 IEEE international conference on software maintenance and evolution (ICSME), pp 139\u2013150","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"17308_CR51","doi-asserted-by":"crossref","unstructured":"Durieux T, Ferreira JF, Abreu R, Cruz P (2020) Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 530\u2013541","DOI":"10.1145\/3377811.3380364"},{"key":"17308_CR52","doi-asserted-by":"crossref","unstructured":"Raju RS, Gurung S, Rai P (2022) An overview of 51 attack over bitcoin network. In: Contemporary issues in communication, cloud and big data analytics, pp 39\u201355","DOI":"10.1007\/978-981-16-4244-9_4"},{"issue":"9","key":"17308_CR53","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/app9091788","volume":"9","author":"S Sayeed","year":"2019","unstructured":"Sayeed S, Marco-Gisbert H (2019) Assessing blockchain consensus and security mechanisms against the 51 attack. Appl Sci 9(9):1788","journal-title":"Appl Sci"},{"key":"17308_CR54","doi-asserted-by":"crossref","unstructured":"Oksiiuk O, Dmyrieva I (2020) Security and privacy issues of blockchain technology. In: 2020 IEEE 15th international conference on advanced trends in radioelectronics, telecommunications and computer engineering (TCSET), pp 1\u20135","DOI":"10.1109\/TCSET49122.2020.235489"},{"key":"17308_CR55","doi-asserted-by":"crossref","unstructured":"Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in wpa2. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 1313\u20131328","DOI":"10.1145\/3133956.3134027"},{"key":"17308_CR56","doi-asserted-by":"crossref","unstructured":"Sastry JB, Banik BG (2022) Recent trends in blockchain technology. In: Computational intelligence in pattern recognition, Springer, pp 129\u2013142","DOI":"10.1007\/978-981-16-2543-5_12"},{"key":"17308_CR57","doi-asserted-by":"crossref","unstructured":"Jonathan K, Sari AK (2019) Security issues and vulnerabilities on a blockchain system: a review. In: 2019 international seminar on research of information technology and intelligent systems (ISRITI), pp 228\u2013232","DOI":"10.1109\/ISRITI48646.2019.9034659"},{"key":"17308_CR58","doi-asserted-by":"crossref","unstructured":"Yahaya AS, Javaid N, Javed MU, Almogren A, Radwan A (2022) Blockchain based secure energy trading with mutual verifiable fairness in a smart community. IEEE Trans Ind Informat","DOI":"10.1109\/TII.2022.3141867"},{"key":"17308_CR59","doi-asserted-by":"publisher","first-page":"76153","DOI":"10.1109\/ACCESS.2021.3081998","volume":"9","author":"M Iqbal","year":"2021","unstructured":"Iqbal M, Matulevi\u010dius R (2021) Exploring sybil and doublespending risks in blockchain systems. IEEE Access 9:76153\u201376177","journal-title":"IEEE Access"},{"key":"17308_CR60","doi-asserted-by":"crossref","unstructured":"Vats VK, Katarya R (2022) Analyzing the attacks on blockchain technologies. In: Machine learning, advances in computing, renewable energy and communication, Springer, pp 379\u2013390","DOI":"10.1007\/978-981-16-2354-7_35"},{"key":"17308_CR61","doi-asserted-by":"crossref","unstructured":"Six N, Herbaut N, Salinesi C (2022) Blockchain software patterns for the design of decentralized applications: a systematic literature review. Blockchain: Res Appl 100061","DOI":"10.1016\/j.bcra.2022.100061"},{"key":"17308_CR62","doi-asserted-by":"crossref","unstructured":"Six N, Herbaut N, Salinesi C (2022) Blockchain software patterns for the design of decentralized applications: A systematic literature review. Blockchain: Res Appl 100061","DOI":"10.1016\/j.bcra.2022.100061"},{"key":"17308_CR63","doi-asserted-by":"crossref","unstructured":"Islam MR, Rahman MM, Mahmud M, Rahman MA, Mohamad MHS et al (2021) A review on blockchain security issues and challenges. In: 2021 IEEE 12th control and system graduate research colloquium (ICSGRC), pp 227\u2013232","DOI":"10.1109\/ICSGRC53186.2021.9515276"},{"issue":"5","key":"17308_CR64","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.1093\/rfs\/hhy122","volume":"32","author":"J Chiu","year":"2019","unstructured":"Chiu J, Koeppl TV (2019) Blockchain-based settlement for asset trading. Rev Financ Stud 32(5):1716\u20131753","journal-title":"Rev Financ Stud"},{"key":"17308_CR65","doi-asserted-by":"publisher","first-page":"36500","DOI":"10.1109\/ACCESS.2019.2903554","volume":"7","author":"J Al-Jaroodi","year":"2019","unstructured":"Al-Jaroodi J, Mohamed N (2019) Blockchain in industries: a survey. IEEE Access 7:36500\u201336515","journal-title":"IEEE Access"},{"key":"17308_CR66","doi-asserted-by":"publisher","first-page":"101654","DOI":"10.1016\/j.cose.2019.101654","volume":"88","author":"A Singh","year":"2020","unstructured":"Singh A, Parizi RM, Zhang Q, Choo K-KR, Dehghantanha A (2020) Blockchain smart contracts formalization: approaches and challenges to address vulnerabilities. Comput Security 88:101654","journal-title":"Comput Security"},{"key":"17308_CR67","unstructured":"Mikolov T, QV L, Sutskever I (2013) Exploiting similarities among languages for machine translation. arXiv:1309.4168"},{"key":"17308_CR68","doi-asserted-by":"crossref","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Scoring, term weighting, and the vector space model. Cambridge University Press, pp 100\u2013123","DOI":"10.1017\/CBO9780511809071.007"},{"issue":"3","key":"17308_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting tf-idf term weights as making relevance decisions. ACM Trans Inf Syst (TOIS) 26(3):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"17308_CR70","doi-asserted-by":"crossref","unstructured":"Paik JH (2013) A novel tf-idf weighting scheme for effective ranking. In: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, pp 343\u2013352","DOI":"10.1145\/2484028.2484070"},{"key":"17308_CR71","doi-asserted-by":"crossref","unstructured":"Ashizawa N, Yanai N, Cruz JP, Okamura S (2021) Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts. In Proceedings of the 3rd ACM international symposium on blockchain and secure critical infrastructure, pp 47\u201359","DOI":"10.1145\/3457337.3457841"},{"key":"17308_CR72","unstructured":"Jeon S, Lee G, Kim H, Woo SS (2021) Smartcondetect: highly accurate smart contract code vulnerability detection mechanism using bert"},{"key":"17308_CR73","unstructured":"Lutz O, Chen H, Fereidooni H, Sendner C, Dmitrienko A, Sadeghi AR, Koushanfar F (2021) Escort: ethereum smart contracts vulnerability detection using deep neural network and transfer learning. arXiv:2103.12607"},{"issue":"4","key":"17308_CR74","doi-asserted-by":"publisher","first-page":"3148","DOI":"10.1109\/TNSE.2020.3017493","volume":"7","author":"X Ruan","year":"2020","unstructured":"Ruan X, Feng J, Xu C, Wang J (2020) Observer-based dynamic event-triggered strategies for leader-following consensus of multi-agent systems with disturbances. IEEE Trans Netw Sci Eng 7(4):3148\u20133158","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"17308_CR75","doi-asserted-by":"crossref","unstructured":"Kalra S, Goel S, Dhawan M, Sharma S (2018) Zeus: analyzing safety of smart contracts. In: Ndss, pp 1\u201312","DOI":"10.14722\/ndss.2018.23082"},{"key":"17308_CR76","doi-asserted-by":"crossref","unstructured":"Bartoletti M, Pompianu L (2017) An empirical analysis of smart contracts: platforms, applications, and design patterns. In: International conference on financial cryptography and data security, Springer, pp 494\u2013509","DOI":"10.1007\/978-3-319-70278-0_31"},{"key":"17308_CR77","unstructured":"Mikolov T, QV L, Sutskever I (2013) Exploiting similarities among languages for machine translation. arXiv:1309.4168"},{"issue":"3","key":"17308_CR78","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting tf-idf term weights as making relevance decisions. ACM Trans Inf Syst (TOIS) 26(3):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"17308_CR79","doi-asserted-by":"crossref","unstructured":"] Paik JH (2013) A novel tf-idf weighting scheme for effective ranking. In: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, pp 343\u2013352","DOI":"10.1145\/2484028.2484070"},{"issue":"2","key":"17308_CR80","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"key":"17308_CR81","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15042-4","author":"JJ Lohith","year":"2023","unstructured":"Lohith JJ, Anusree Manoj K, Guru Nanma P et al (2023) TP-detect: trigram-pixel based vulnerability detection for ethereum smart contracts. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-15042-4","journal-title":"Multimedia Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17308-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17308-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17308-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:39:25Z","timestamp":1715758765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17308-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,13]]},"references-count":81,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17308"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17308-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,13]]},"assertion":[{"value":"6 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}