{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:16:43Z","timestamp":1775564203923,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11276-020-02379-z","type":"journal-article","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T05:33:39Z","timestamp":1594186419000},"page":"6325-6334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A new scheme of vulnerability analysis in smart contract with machine learning"],"prefix":"10.1007","volume":"30","author":[{"given":"Cipai","family":"Xing","sequence":"first","affiliation":[]},{"given":"Zhuorong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lexin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"key":"2379_CR1","unstructured":"Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Manubot."},{"key":"2379_CR2","doi-asserted-by":"crossref","unstructured":"Zheng, Z., et al. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557\u2013564).","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"2379_CR3","first-page":"37","volume":"3","author":"V Buterin","year":"2014","unstructured":"Buterin, V. (2014). A next-generation smart contract and decentralized application platform. White Paper, 3, 37.","journal-title":"White Paper"},{"key":"2379_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., et al. (2018). Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 world wide web conference. International world wide web conferences steering committee (pp. 1409\u20131418).","DOI":"10.1145\/3178876.3186046"},{"key":"2379_CR5","doi-asserted-by":"crossref","unstructured":"Chen, T., et al. (2017). Under-optimized smart contracts devour your money. In 2017 IEEE 24th international conference on software analysis, evolution and reengineering (SANER) (pp. 442\u2013446).","DOI":"10.1109\/SANER.2017.7884650"},{"key":"2379_CR6","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Yoshua, B., & Geoffrey, H. (2015). Deep learning. Nature, 521, 436.","journal-title":"Nature"},{"key":"2379_CR7","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu, J., et al. (2018). Recent advances in convolutional neural networks. Pattern Recognition, 77, 354\u2013377.","journal-title":"Pattern Recognition"},{"issue":"3","key":"2379_CR8","first-page":"18","volume":"2","author":"Andy Liaw","year":"2002","unstructured":"Liaw, Andy, & Wiener, Matthew. (2002). Classification and regression by random forest. R News, 2(3), 18\u201322.","journal-title":"R News"},{"key":"2379_CR9","doi-asserted-by":"crossref","unstructured":"Alam, M. S., & Son T. V. (2013). Random forest classification for detecting android malware. In 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing (pp. 663\u2013669).","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"2379_CR10","unstructured":"Zhou, Y., et al. (2018). Erays: Reverse engineering ethereum\u2019s opaque smart contracts. In 27th USENIX security symposium (pp. 1371\u20131385)."},{"key":"2379_CR11","doi-asserted-by":"crossref","unstructured":"Frantz, C. K., & Nowostawski, M. (2016). From institutions to code: Towards automated generation of smart contracts. In 2016 IEEE 1st international workshops on foundations and applications of self*systems (FAS*W) (pp. 210\u2013215).","DOI":"10.1109\/FAS-W.2016.53"},{"key":"2379_CR12","unstructured":"Kasampalis, T., et al. (2018). IELE: An intermediate-level blockchain language designed and implemented using formal semantics."},{"key":"2379_CR13","doi-asserted-by":"crossref","unstructured":"Lattner, C., & Adve, V. (2004). LLVM: A compilation framework for lifelong program analysis & transformation. In Proceedings of the international symposium on code generation and optimization: Feedback-directed and runtime optimization (p. 75).","DOI":"10.1109\/CGO.2004.1281665"},{"key":"2379_CR14","doi-asserted-by":"crossref","unstructured":"Coblenz, M. (2017). Obsidian: A safer blockchain programming language. In Proceedings of the 39th international conference on software engineering companion (pp. 97\u201399).","DOI":"10.1109\/ICSE-C.2017.150"},{"key":"2379_CR15","doi-asserted-by":"crossref","unstructured":"Mavridou, A., & Laszka, A. (2018). Tool demonstration: FSolidM for designing secure Ethereum smart contracts. In International conference on principles of security and trust (pp. 270\u2013277).","DOI":"10.1007\/978-3-319-89722-6_11"},{"key":"2379_CR16","doi-asserted-by":"crossref","unstructured":"Liu, C., et al. (2018). Reguard: Finding reentrancy bugs in smart contracts. In Proceedings of the 40th international conference on software engineering: companion proceedings (pp. 65\u201368).","DOI":"10.1145\/3183440.3183495"},{"key":"2379_CR17","unstructured":"Bonneau, J., Clark, J., & Goldfeder, S. (2015). On Bitcoin as a public randomness source. In IACR cryptology ePrint archive (p. 1015)."},{"key":"2379_CR18","unstructured":"Lenstra, A. K., & Wesolowski, B. (2015). A random zoo: Sloth, unicorn, and trx. In IACR cryptology ePrint archive (p. 366)."},{"key":"2379_CR19","unstructured":"Bnz, B., Steven G., & Bonneau, J. (2017). Proofs-of-delay and randomness beacons in ethereum. In IEEE security and privacy on the blockchain (IEEE S&B)."},{"key":"2379_CR20","doi-asserted-by":"crossref","unstructured":"Chen, T., et al. (2018). Towards saving money in using smart contracts. In 2018 IEEE\/ACM 40th international conference on software engineering: New ideas and emerging technologies results (ICSE-NIER) (pp. 81\u201384).","DOI":"10.1145\/3183399.3183420"},{"key":"2379_CR21","unstructured":"Krupp, J., & Rossow, C. (2018). teether: Gnawing at ethereum to automatically exploit smart contracts. In 27th USENIX security symposium (pp. 1317\u20131333)."},{"key":"2379_CR22","doi-asserted-by":"crossref","unstructured":"Luu, L., et al. (2016). Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 254\u2013269).","DOI":"10.1145\/2976749.2978309"},{"key":"2379_CR23","doi-asserted-by":"crossref","unstructured":"Albert, E., et al. (2018). Ethir: A framework for high-level analysis of ethereum bytecode. In International symposium on automated technology for verification and analysis (pp. 513\u2013520).","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"2379_CR24","doi-asserted-by":"crossref","unstructured":"Knecht, M., & Stiller, B. (2017). Smartdemap: A smart contract deployment and management platform. In IFIP international conference on autonomous infrastructure, management and security (pp. 159\u2013164).","DOI":"10.1007\/978-3-319-60774-0_15"},{"key":"2379_CR25","doi-asserted-by":"crossref","unstructured":"Delmolino, K., et al. (2016) Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In International conference on financial cryptography and data security (pp. 79\u201394).","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"2379_CR26","doi-asserted-by":"crossref","unstructured":"Nikoli, I., et al. (2018). Finding the greedy, prodigal, and suicidal contracts at scale. In Proceedings of the 34th annual computer security applications conference (pp. 653\u2013663).","DOI":"10.1145\/3274694.3274743"},{"key":"2379_CR27","doi-asserted-by":"crossref","unstructured":"Kalra, S., et al. (2018). ZEUS: Analyzing safety of smart contracts. NDSS.","DOI":"10.14722\/ndss.2018.23082"},{"key":"2379_CR28","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., et al. (2016) Formal verification of smart contracts: Short paper. In Proceedings of the 2016 ACM workshop on programming languages and analysis for security (pp. 91\u201396).","DOI":"10.1145\/2993600.2993611"},{"key":"2379_CR29","unstructured":"Huang, T.H.-D. (2018). Hunting the ethereum smart contract: Color-inspired inspection of potential attacks. arXiv preprint arXiv:1807.01868 (2018)."},{"key":"2379_CR30","unstructured":"Tann, W.J.-W., et al. (2018). Towards safer smart contracts: A sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632 (2018)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02379-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02379-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02379-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T05:07:54Z","timestamp":1731042474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02379-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["2379"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02379-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"8 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}