{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:36:30Z","timestamp":1767713790149},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11265-023-01859-7","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T09:02:26Z","timestamp":1683882146000},"page":"215-237","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS"],"prefix":"10.1007","volume":"96","author":[{"given":"Lejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guopeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guangxia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Huiling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"issue":"3","key":"1859_CR1","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/TR.2021.3054617","volume":"70","author":"Y Zhu","year":"2021","unstructured":"Zhu, Y., Song, W., Wang, D., Ma, D., & Chu, W.C.-C. (2021). TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain. IEEE Transactions on Reliability, 70(3), 1255\u20131270. https:\/\/doi.org\/10.1109\/TR.2021.3054617","journal-title":"IEEE Transactions on Reliability"},{"key":"1859_CR2","doi-asserted-by":"publisher","unstructured":"Gai, K., Zhang, Y., Qiu,\u00a0M., & Thuraisingham, B. (2022). Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin. In IEEE Transactions on Services Computing.\u00a0https:\/\/doi.org\/10.1109\/TSC.2022.3192166","DOI":"10.1109\/TSC.2022.3192166"},{"key":"1859_CR3","doi-asserted-by":"publisher","unstructured":"Gai, K., Guo, J., Zhu, L., & Yu, S. (2020) Blockchain Meets Cloud Computing: A Survey. In IEEE Communications Surveys & Tutorials (vol. 22, no. 3, pp. 2009\u20132030, thirdquarter).\u00a0https:\/\/doi.org\/10.1109\/COMST.2020.2989392","DOI":"10.1109\/COMST.2020.2989392"},{"issue":"12","key":"1859_CR4","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.1109\/JSAC.2022.3213353","volume":"40","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Gai, K., Xiao, J., Zhu, L., & Choo, K.-K.R. (2022). Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings. IEEE Journal on Selected Areas in Communications, 40(12), 3422\u20133436. https:\/\/doi.org\/10.1109\/JSAC.2022.3213353","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"1859_CR5","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","volume":"15","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Qiu, M., & Shen, M. (2019). Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid. IEEE Transactions on Industrial Informatics, 15(6), 3548\u20133558. https:\/\/doi.org\/10.1109\/TII.2019.2893433","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"1859_CR6","first-page":"192","volume":"5","author":"KF Zhang","year":"2019","unstructured":"Zhang, K. F., Zhang, S. L., & Jin, S. (2019). The Security Research of Blockchain Smart Contract. Journal of Information Security Research, 5(3), 192\u2013206.","journal-title":"Journal of Information Security Research"},{"key":"1859_CR7","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"WQ Zou","year":"2019","unstructured":"Zou, W. Q., Lo, D., Kochhar, P. S., et al. (2019). Smart contract development: Challenges and opportunities. IEEE Transactions on Software Engineering, 47, 2084\u20132106. https:\/\/doi.org\/10.1109\/TSE.2019.2942301","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1859_CR8","doi-asserted-by":"publisher","unstructured":"Hu, T., Liu, X., Chen, T., et al. (2021). Transaction-based classification and detection approach for Ethereum smart contract. Information Processing & Management, 58(2), 102462.\u00a0https:\/\/doi.org\/10.1016\/j.ipm.2020.102462","DOI":"10.1016\/j.ipm.2020.102462"},{"key":"1859_CR9","doi-asserted-by":"crossref","unstructured":"Amiet, N. (2021). Blockchain Vulnerabilities in Practice. ACM Digital Library (vol. 2, no. 2, article 8).","DOI":"10.1145\/3407230"},{"issue":"2","key":"1859_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019600","volume":"14","author":"T Wang","year":"2011","unstructured":"Wang, T., Wei, T., Gu, G., et al. (2011). Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution. ACM Transactions on Information and System Security (TISSEC), 14(2), 1\u201328.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"1859_CR11","unstructured":"Chung, J., Gulcehre, C., Cho, K., et al. (2014). Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS 2014 Workshop on Deep Learning, December 2014."},{"key":"1859_CR12","first-page":"1607","volume":"22","author":"GE Hinton","year":"2009","unstructured":"Hinton, G. E., & Salakhutdinov, R. R. (2009). Replicated softmax: An undirected topic model. Advances in Neural Information Processing Systems, 22, 1607\u20131614.","journal-title":"Advances in neural information processing systems"},{"issue":"3","key":"1859_CR13","first-page":"7","volume":"2","author":"W Liu","year":"2016","unstructured":"Liu, W., Wen, Y., Yu, Z., et al. (2016). Large-margin softmax loss for convolutional neural networks. ICML, 2(3), 7.","journal-title":"ICML"},{"issue":"3","key":"1859_CR14","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networksm. Machine Learning, 20(3), 273\u2013297.","journal-title":"Machine learning"},{"key":"1859_CR15","doi-asserted-by":"crossref","unstructured":"Agarap,\u00a0A. F. M. (2018). A neural network architecture combining gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data. Proceedings: the 2018 10th international conference on machine learning and computing (ICMLC), (pp. 26\u201330).","DOI":"10.1145\/3195106.3195117"},{"key":"1859_CR16","first-page":"42","volume":"2013","author":"A Alalshekmubarak","year":"2013","unstructured":"Alalshekmubarak, A., & Smith, L. S. (2013). A novel approach combining recurrent neural network and support vector machines for time series classification. In 2013 9th International Conference. Proceedings: Innovations in Information Technology (IIT), (pp. 42\u201347). Al Ain, United Arab Emirates.","journal-title":"Al Ain, United Arab Emirates"},{"key":"1859_CR17","unstructured":"Agarap,\u00a0A. F. (2017). An architecture combining convolutional neural network (CNN) and support vector machine (SVM) for image classification."},{"key":"1859_CR18","first-page":"1598","volume":"2020","author":"X Hao","year":"2020","unstructured":"Hao, X., Ren, W., Zheng, W. (2020). SCScan: An SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. In 2020 IEEE 19th International Conference. Proceedings: Trust, Security and Privacy in Computing and Communications (TrustCom), (pp. 1598\u20131605). Guangzhou, China.","journal-title":"Guangzhou, China"},{"key":"1859_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108277","volume":"167","author":"D She","year":"2021","unstructured":"She, D., & Jia, M. (2021). A BiGRU method for remaining useful life prediction of machinery. Measurement, 167, 108277.","journal-title":"Measurement"},{"key":"1859_CR20","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., et al. (2020). Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access, 8, 19685\u201319695. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE Access"},{"key":"1859_CR21","first-page":"254","volume":"2016","author":"L Luu","year":"2016","unstructured":"Luu, L., Chu, D. H., Olickel, H. (2016). Making smart contracts smarter. In 2016 ACM SIGSAC Conference. Proceedings: Computer and Communications Security (CCS), (pp. 254\u2013269). New York City, NY, USA.","journal-title":"New York City, NY, USA"},{"key":"1859_CR22","doi-asserted-by":"crossref","unstructured":"Ferreira Torres, C., Baden, M., Norvill,\u00a0R., et al. (2020). \u00c6gis: Shielding vulnerable smart contracts against attacks. In the 15th ACM Asia Conference. Proceedings: Computer and Communications Security, (pp. 584\u2013597).","DOI":"10.1145\/3320269.3384756"},{"key":"1859_CR23","unstructured":"Mueller, B. (2017). Mythril-Reversing and bug hunting framework for the Ethereum blockchain. 2021\u201308\u201331]. https:\/\/pypi.org\/project\/mythril\/0.8.2"},{"key":"1859_CR24","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., et al. (2018). Smartcheck: Static analysis of ethereum smart contracts. In International Conference on Software Engineering, ICSE 2018. Proceedings: the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. Gothenburg, Sweden,\u00a0(pp. 9\u201316).","DOI":"10.1145\/3194113.3194115"},{"key":"1859_CR25","first-page":"67","volume":"2018","author":"P Tsankov","year":"2018","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D. (2018). Securify: Practical security analysis of smart contracts. In\u00a02018 ACM SIGSAC Conference. Proceedings: Computer and Communications Security, (pp. 67\u201382). Toronto, Canada.","journal-title":"Toronto, Canada"},{"issue":"7","key":"1859_CR26","first-page":"1959","volume":"39","author":"ML Fu","year":"2019","unstructured":"Fu, M. L., Wu, L. F., Hong, Z., & Feng, W. B. (2019). Research on vulnerability mining technique for smart contracts. Journal of Computer Applications, 39(7), 1959\u20131966.","journal-title":"Journal of Computer Applications"},{"key":"1859_CR27","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., et al. (2018). Vuldeepecker: A deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681","DOI":"10.14722\/ndss.2018.23158"},{"key":"1859_CR28","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Liu, Z., Qian, P., et al. (2020). Smart Contract Vulnerability Detection using Graph Neural Network. In Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI,\u00a0(pp. 3283\u20133290).","DOI":"10.24963\/ijcai.2020\/454"},{"key":"1859_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., et al. (2021). Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Transactions on Knowledge and Data Engineering. https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1859_CR30","unstructured":"Tann, W. J. W., Han, X. J., Gupta, S. S., et al. (2018). Towards safer smart contracts: A sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632"},{"key":"1859_CR31","first-page":"531","volume":"2019","author":"J He","year":"2019","unstructured":"He, J., Balunovi\u0107, M., Ambroladze, N. (2019). Learning to fuzz from symbolic execution with application to smart contracts. In 2019 ACM SIGSAC Conference. Proceedings: Computer and Communications Security, (pp. 531\u2013548). London, United Kingdom.","journal-title":"London, United Kingdom"},{"key":"1859_CR32","doi-asserted-by":"crossref","unstructured":"Hildenbrandt, E., Saxena, M., Rodrigues, N., et al. Kevm: A complete formal semantics of the ethereum virtual machine. In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, (204\u2013217).","DOI":"10.1109\/CSF.2018.00022"},{"key":"1859_CR33","doi-asserted-by":"publisher","first-page":"282","DOI":"10.3390\/info10090282","volume":"10","author":"H Huang","year":"2019","unstructured":"Huang, H., Wei, Z., & Yao, L. (2019). A Novel Approach to Component Assembly Inspection Based on Mask R-CNN and Support Vector Machines. Information, 10, 282. https:\/\/doi.org\/10.3390\/info10090282","journal-title":"Information"},{"issue":"9","key":"1859_CR34","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TPAMI.2009.167","volume":"32","author":"PF Felzenszwalb","year":"2010","unstructured":"Felzenszwalb, P. F., Girshick, R. B., McAllester, D., & Ramanan, D. (2010). Object Detection with Discriminatively Trained Part-Based Models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(9), 1627\u20131645. https:\/\/doi.org\/10.1109\/TPAMI.2009.167","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1859_CR35","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/CVPR.2014.81","volume":"2014","author":"R Girshick","year":"2014","unstructured":"Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2014). Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. IEEE Conference on Computer Vision and Pattern Recognition, 2014, 580\u2013587. https:\/\/doi.org\/10.1109\/CVPR.2014.81","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"1859_CR36","unstructured":"Tang, Y. (2013). Deep learning using linear support vector machines. arXiv preprint arXiv:1306.0239"},{"key":"1859_CR37","unstructured":"Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"1859_CR38","doi-asserted-by":"publisher","unstructured":"Sherstinsky, A. (2020). Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D: Nonlinear Phenomena, (vol. 404, pp. 132306).\u00a0https:\/\/doi.org\/10.1016\/j.physd.2019.132306","DOI":"10.1016\/j.physd.2019.132306"},{"key":"1859_CR39","unstructured":"Mao, J., Xu, W., Yang, Y., et al. (2015). Deep captioning with multimodal recurrent neural networks (m-rnn). In International Conference on Learning Representations, ICLR 2015."},{"key":"1859_CR40","first-page":"1597","volume":"2017","author":"R Dey","year":"2017","unstructured":"Dey, R., Salem, F. M. (2017). Gate-variants of gated recurrent unit (GRU) neural networks. Proceedings in 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS), (pp. 1597\u20131600). IEEE.","journal-title":"IEEE"},{"key":"1859_CR41","doi-asserted-by":"crossref","unstructured":"Fu, R., Zhang, Z., Li, L. (2016). Using LSTM and GRU neural network methods for traffic flow prediction. In 2016 31st Youth Academic Annual Conference on Chinese Association of Automation (YAC), (pp. 324\u2013328).","DOI":"10.1109\/YAC.2016.7804912"},{"key":"1859_CR42","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.neucom.2020.01.006","volume":"387","author":"W Li","year":"2020","unstructured":"Li, W., Qi, F., Tang, M., et al. (2020). Bidirectional LSTM with self-attention mechanism and multi-channel features for sentiment classification. Neurocomputing, 387, 63\u201377. https:\/\/doi.org\/10.1016\/j.neucom.2020.01.006","journal-title":"Neurocomputing"},{"key":"1859_CR43","first-page":"182","volume":"2018","author":"P Cao","year":"2018","unstructured":"Cao, P., Chen, Y., Liu, K., et al. (2018). Adversarial transfer learning for Chinese named entity recognition with self-attention mechanism. Proceedings: The\u00a0Conference on Empirical Methods in Natural Language Processing,\u00a0pp. 182\u2013192.","journal-title":"Conference on Empirical Methods in Natural Language Processing."},{"key":"1859_CR44","doi-asserted-by":"publisher","unstructured":"Reyna, R. A., Esteve, D., Houzet, D., & Albenge, M. (2000). Implementation of the SVM neural network generalization function for image processing. Proceedings Fifth IEEE International Workshop on Computer Architectures for Machine Perception, (pp. 147\u2013151).\u00a0https:\/\/doi.org\/10.1109\/CAMP.2000.875972","DOI":"10.1109\/CAMP.2000.875972"},{"key":"1859_CR45","doi-asserted-by":"publisher","unstructured":"Otchere, D. A., Ganat, T. O. A., Gholami, R., et al. (2021). Application of supervised machine learning paradigms in the prediction of petroleum reservoir properties: Comparative analysis of ANN and SVM models. Journal of Petroleum Science and Engineering, 200, 108182.\u00a0https:\/\/doi.org\/10.1016\/j.petrol.2020.108182","DOI":"10.1016\/j.petrol.2020.108182"},{"key":"1859_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICBC5106","volume":"2021","author":"F Mi","year":"2021","unstructured":"Mi, F., Wang, Z., Zhao, C., Guo, J., Ahmed, F., & Khan, L. (2021). VSCL: Automating Vulnerability Detection in Smart Contracts with Deep Learning. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2021, 1\u20139. https:\/\/doi.org\/10.1109\/ICBC5106","journal-title":"IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01859-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-023-01859-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01859-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T13:10:58Z","timestamp":1717679458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-023-01859-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,12]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["1859"],"URL":"https:\/\/doi.org\/10.1007\/s11265-023-01859-7","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,12]]},"assertion":[{"value":"6 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}