{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:50:41Z","timestamp":1772041841786,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-06951-2","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T07:28:43Z","timestamp":1741332523000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["HSVDetector: a heterogeneous semantic graph-based method for smart contract vulnerability detection"],"prefix":"10.1007","volume":"81","author":[{"given":"Heming","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gehao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"6951_CR1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3440802","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Satoshi Nakamoto. https:\/\/doi.org\/10.2139\/ssrn.3440802","journal-title":"Satoshi Nakamoto"},{"key":"6951_CR2","doi-asserted-by":"publisher","unstructured":"Zheng Z, Xie S, Dai H, et\u00a0al (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data, pp 557\u2013564, https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"3","key":"6951_CR3","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s11276-018-1883-0","volume":"29","author":"N Elisa","year":"2023","unstructured":"Elisa N, Yang L, Chao F et al (2023) A framework of blockchain-based secure and privacy-preserving e-government system. Wireless Netw 29(3):1005\u20131015","journal-title":"Wireless Netw"},{"issue":"1","key":"6951_CR4","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TSMC.2020.3040789","volume":"51","author":"J Leng","year":"2020","unstructured":"Leng J, Ye S, Zhou M et al (2020) Blockchain-secured smart manufacturing in industry 4.0: a survey. IEEE Trans Syst Man Cybernet Syst 51(1):237\u2013252","journal-title":"IEEE Trans Syst Man Cybernet Syst"},{"issue":"9","key":"6951_CR5","doi-asserted-by":"publisher","first-page":"6493","DOI":"10.1002\/int.22852","volume":"37","author":"I Ahmed","year":"2022","unstructured":"Ahmed I, Zhang Y, Jeon G et al (2022) A blockchain-and artificial intelligence-enabled smart iot framework for sustainable city. Int J Intell Syst 37(9):6493\u20136507","journal-title":"Int J Intell Syst"},{"key":"6951_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102064","volume":"52","author":"SF Wamba","year":"2020","unstructured":"Wamba SF, Queiroz MM (2020) Blockchain in the operations and supply chain management: benefits, challenges and future research opportunities. Int J Inf Manag 52:102064","journal-title":"Int J Inf Manag"},{"key":"6951_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.121540","volume":"177","author":"Y Wan","year":"2022","unstructured":"Wan Y, Gao Y, Hu Y (2022) Blockchain application and collaborative innovation in the manufacturing industry: based on the perspective of social trust. Technol Forecast Soc Chang 177:121540","journal-title":"Technol Forecast Soc Chang"},{"key":"6951_CR8","doi-asserted-by":"publisher","unstructured":"Alharby M, Aldweesh A, Moorsel Av (2018) Blockchain-based smart contracts: a systematic mapping study of academic research. In: 2018 International Conference on Cloud Computing, Big Data and Blockchain, pp 1\u20136, https:\/\/doi.org\/10.1109\/ICCBB.2018.8756390","DOI":"10.1109\/ICCBB.2018.8756390"},{"key":"6951_CR9","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jmsy.2020.05.017","volume":"56","author":"M Hasan","year":"2020","unstructured":"Hasan M, Starly B (2020) Decentralized cloud manufacturing-as-a-service (cmaas) platform architecture with configurable digital assets. J Manuf Syst 56:157\u2013174. https:\/\/doi.org\/10.1016\/j.jmsy.2020.05.017","journal-title":"J Manuf Syst"},{"key":"6951_CR10","doi-asserted-by":"publisher","DOI":"10.1145\/3391195","author":"H Chen","year":"2020","unstructured":"Chen H, Pendleton M, Njilla L et al (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3391195","journal-title":"ACM Comput Surv"},{"key":"6951_CR11","doi-asserted-by":"publisher","unstructured":"Badruddoja S, Dantu R, He Y, et\u00a0al (2021) Making smart contracts smarter. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency, pp 1\u20133, https:\/\/doi.org\/10.1109\/ICBC51069.2021.9461148","DOI":"10.1109\/ICBC51069.2021.9461148"},{"key":"6951_CR12","doi-asserted-by":"publisher","unstructured":"f Jiang B, Liu Y, Chan W (2018) Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering, pp 259\u2013269, https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"6951_CR13","doi-asserted-by":"publisher","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, pp 8\u201315, https:\/\/doi.org\/10.1109\/WETSEB.2019.00008","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"6951_CR14","doi-asserted-by":"publisher","first-page":"338","DOI":"10.21437\/Interspeech.2014-80","volume":"2014","author":"H Sak","year":"2014","unstructured":"Sak H, Senior A, Beaufays F (2014) Long short-term memory recurrent neural network architectures for large scale acoustic modeling. Interspeech 2014:338\u2013342. https:\/\/doi.org\/10.21437\/Interspeech.2014-80","journal-title":"Interspeech"},{"key":"6951_CR15","doi-asserted-by":"publisher","unstructured":"Goller C, Kuchler A (1996) Learning task-dependent distributed representations by backpropagation through structure. In: Proceedings of International Conference on Neural Networks, vol 1, pp 347\u2013352, https:\/\/doi.org\/10.1109\/ICNN.1996.548916","DOI":"10.1109\/ICNN.1996.548916"},{"key":"6951_CR16","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Liu Z, Qian P, et\u00a0al (2021) Smart contract vulnerability detection using graph neural networks. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence","DOI":"10.24963\/ijcai.2020\/454"},{"key":"6951_CR17","doi-asserted-by":"crossref","unstructured":"Schlichtkrull M, Kipf TN, Bloem P, et\u00a0al (2017) Modeling relational data with graph convolutional networks","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"6951_CR18","doi-asserted-by":"publisher","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, et\u00a0al (2018) Graph attention networks. https:\/\/doi.org\/10.48550\/arXiv.1710.10903","DOI":"10.48550\/arXiv.1710.10903"},{"key":"6951_CR19","doi-asserted-by":"publisher","unstructured":"Ghaleb A, Rubin J, Pattabiraman K (2022) etainter: detecting gas-related vulnerabilities in smart contracts. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 728\u2013739, https:\/\/doi.org\/10.1145\/3533767.3534378","DOI":"10.1145\/3533767.3534378"},{"key":"6951_CR20","doi-asserted-by":"publisher","unstructured":"Ghaleb A, Rubin J, Pattabiraman K (2023) Achecker: Statically detecting smart contract access control vulnerabilities. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering, pp 945\u2013956, https:\/\/doi.org\/10.1109\/ICSE48619.2023.00087","DOI":"10.1109\/ICSE48619.2023.00087"},{"key":"6951_CR21","doi-asserted-by":"crossref","unstructured":"Tolmach P, Li Y, Lin SW, et\u00a0al (2021) Formal analysis of composable defi protocols. In: Financial Cryptography and Data Security. FC 2021 International Workshops, pp 149\u2013161","DOI":"10.1007\/978-3-662-63958-0_13"},{"key":"6951_CR22","doi-asserted-by":"crossref","unstructured":"Wang Z, Wen B, Luo Z, et\u00a0al (2021b) M-a-r: A dynamic symbol execution detection method for smart contract reentry vulnerability. In: Blockchain and Trustworthy Systems, pp 418\u2013429","DOI":"10.1007\/978-981-16-7993-3_32"},{"key":"6951_CR23","doi-asserted-by":"publisher","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D, et\u00a0al (2018) Securify: Practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p 67\u201382, https:\/\/doi.org\/10.1145\/3243734.3243780","DOI":"10.1145\/3243734.3243780"},{"key":"6951_CR24","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107 I, Kolluri A, Sergey I, et\u00a0al (2018) Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, p 653\u2013663, https:\/\/doi.org\/10.1145\/3274694.3274743","DOI":"10.1145\/3274694.3274743"},{"key":"6951_CR25","doi-asserted-by":"publisher","unstructured":"Nguyen TD, Pham LH, Sun J, et\u00a0al (2020) sfuzz: an efficient adaptive fuzzer for solidity smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, p 778\u2013788, https:\/\/doi.org\/10.1145\/3377811.3380334","DOI":"10.1145\/3377811.3380334"},{"key":"6951_CR26","doi-asserted-by":"crossref","unstructured":"Rodler M, Li W, Karame GO, et\u00a0al (2018) Sereum: Protecting existing smart contracts against re-entrancy attacks","DOI":"10.14722\/ndss.2019.23413"},{"key":"6951_CR27","doi-asserted-by":"publisher","unstructured":"Torres CF, Sch\u00fctte J, State R (2018) Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp 664\u2013676, https:\/\/doi.org\/10.1145\/3274694.3274737","DOI":"10.1145\/3274694.3274737"},{"key":"6951_CR28","doi-asserted-by":"publisher","unstructured":"Kalra S, Goel S, Dhawan M, et\u00a0al (2018) Zeus: Analyzing safety of smart contracts. In: Network and Distributed System Security Symposium, https:\/\/doi.org\/10.14722\/ndss.2018.23082","DOI":"10.14722\/ndss.2018.23082"},{"key":"6951_CR29","doi-asserted-by":"publisher","unstructured":"Hildenbrandt E, Saxena M, Rodrigues N, et\u00a0al (2018) Kevm: A complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium, pp 204\u2013217, https:\/\/doi.org\/10.1109\/CSF.2018.00022","DOI":"10.1109\/CSF.2018.00022"},{"key":"6951_CR30","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, et\u00a0al (2018) Smartcheck: Static analysis of ethereum smart contracts. In: 2018 IEEE\/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"6951_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111550","volume":"195","author":"J Cai","year":"2023","unstructured":"Cai J, Li B, Zhang J et al (2023) Combine sliced joint graph with graph neural networks for smart contract vulnerability detection. J Syst Softw 195:111550. https:\/\/doi.org\/10.1016\/j.jss.2022.111550","journal-title":"J Syst Softw"},{"issue":"1","key":"6951_CR32","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TR.2023.3233999","volume":"73","author":"T Hu","year":"2024","unstructured":"Hu T, Li B, Pan Z et al (2024) Detect defects of solidity smart contract based on the knowledge graph. IEEE Trans Reliab 73(1):186\u2013202. https:\/\/doi.org\/10.1109\/TR.2023.3233999","journal-title":"IEEE Trans Reliab"},{"key":"6951_CR33","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2021.08.023","volume":"128","author":"L Liu","year":"2022","unstructured":"Liu L, Tsai WT, Bhuiyan MZA et al (2022) Blockchain-enabled fraud discovery through abnormal smart contract detection on ethereum. Futur Gener Comput Syst 128:158\u2013166. https:\/\/doi.org\/10.1016\/j.future.2021.08.023","journal-title":"Futur Gener Comput Syst"},{"key":"6951_CR34","doi-asserted-by":"publisher","unstructured":"Shakya S, Mukherjee A, Halder R, et\u00a0al (2022) Smartmixmodel: Machine learning-based vulnerability detection of solidity smart contracts. In: 2022 IEEE International Conference on Blockchain, pp 37\u201344, https:\/\/doi.org\/10.1109\/Blockchain55522.2022.00016","DOI":"10.1109\/Blockchain55522.2022.00016"},{"key":"6951_CR35","unstructured":"Tann WJW, Han XJ, Gupta SS, et\u00a0al (2019) Towards safer smart contracts: a sequence learning approach to detecting security threats"},{"key":"6951_CR36","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian P, Liu Z, He Q et al (2020) Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8:19685\u201319695. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE Access"},{"issue":"2","key":"6951_CR37","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang W, Song J, Xu G et al (2021) Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133\u20131144. https:\/\/doi.org\/10.1109\/TNSE.2020.2968505","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"6951_CR38","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO et al (2002) Smote: synthetic minority over-sampling technique. J Artif Int Res 16(1):321\u2013357","journal-title":"J Artif Int Res"},{"issue":"1","key":"6951_CR39","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GEAPA Batista","year":"2004","unstructured":"Batista GEAPA, Prati RC, Monard MC (2004) A study of the behavior of several methods for balancing machine learning training data. SIGKDD Explor Newsl 6(1):20\u201329. https:\/\/doi.org\/10.1145\/1007730.1007735","journal-title":"SIGKDD Explor Newsl"},{"issue":"1","key":"6951_CR40","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu Z, Pan S, Chen F et al (2021) A comprehensive survey on graph neural networks. IEEE Trans Neural Netw Learn Syst 32(1):4\u201324. https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6951_CR41","unstructured":"Kipf TN, Welling M (2017) Semi-supervised classification with graph convolutional networks"},{"key":"6951_CR42","doi-asserted-by":"publisher","DOI":"10.1145\/3391195","author":"H Chen","year":"2020","unstructured":"Chen H, Pendleton M, Njilla L et al (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3391195","journal-title":"ACM Comput Surv"},{"key":"6951_CR43","doi-asserted-by":"publisher","unstructured":"Gao J, Liu H, Liu C, et\u00a0al (2019) Easyflow: keep ethereum away from overflow. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings, pp 23\u201326, https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00029","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"6951_CR44","unstructured":"Praitheeshan P, Pan L, Yu J, et\u00a0al (2020) Security analysis methods on ethereum smart contract vulnerabilities: a survey"},{"key":"6951_CR45","doi-asserted-by":"publisher","unstructured":"Qian P, Liu Z, Yin Y, et\u00a0al (2023) Cross-modality mutual learning for enhancing smart contract vulnerability detection on bytecode. In: Proceedings of the ACM Web Conference 2023, p 2220\u20132229, https:\/\/doi.org\/10.1145\/3543507.3583367","DOI":"10.1145\/3543507.3583367"},{"key":"6951_CR46","doi-asserted-by":"publisher","unstructured":"di\u00a0Angelo M, Durieux T, Ferreira JF, et\u00a0al (2023) SmartBugs 2.0: An execution framework for weakness detection in ethereum smart contracts. In: 38th IEEE\/ACM International Conference on Automated Software Engineering, pp 2102\u20132105, https:\/\/doi.org\/10.1109\/ASE56229.2023.00060","DOI":"10.1109\/ASE56229.2023.00060"},{"key":"6951_CR47","unstructured":"Mueller B (2017) A framework for bug hunting on the ethereum blockchain"},{"key":"6951_CR48","doi-asserted-by":"publisher","unstructured":"Chung J, Gulcehre C, Cho K, et\u00a0al (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. https:\/\/doi.org\/10.48550\/arXiv.1412.3555, 1412.3555","DOI":"10.48550\/arXiv.1412.3555"},{"issue":"2","key":"6951_CR49","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1109\/TKDE.2021.3095196","volume":"35","author":"Z Liu","year":"2023","unstructured":"Liu Z, Qian P, Wang X et al (2023) Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans Knowl Data Eng 35(2):1296\u20131310. https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"6951_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102462","volume":"58","author":"T Hu","year":"2021","unstructured":"Hu T, Liu X, Chen T et al (2021) Transaction-based classification and detection approach for ethereum smart contract. Inf Process Manag 58(2):102462","journal-title":"Inf Process Manag"},{"key":"6951_CR51","unstructured":"Hamilton WL, Ying R, Leskovec J (2017) Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, p 1025\u20131035"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06951-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-06951-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06951-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T07:28:52Z","timestamp":1741332532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-06951-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,7]]},"references-count":51,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["6951"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-06951-2","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,7]]},"assertion":[{"value":"14 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"584"}}