{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T11:13:37Z","timestamp":1776770017461,"version":"3.51.2"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11432-024-4402-2","type":"journal-article","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T11:29:24Z","timestamp":1747913364000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Agent4Vul: multimodal LLM agents for smart contract vulnerability detection"],"prefix":"10.1007","volume":"68","author":[{"given":"Wanqing","family":"Jie","sequence":"first","affiliation":[]},{"given":"Wangjie","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Haofu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Muyuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Qinnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"4402_CR1","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"4402_CR2","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2021","unstructured":"Zou W, Lo D, Kochhar P S, et al. Smart contract development: challenges and opportunities. IEEE Trans Software Eng, 2021, 47: 2084\u20132106","journal-title":"IEEE Trans Software Eng"},{"key":"4402_CR3","doi-asserted-by":"publisher","first-page":"101519","DOI":"10.1016\/j.tele.2020.101519","volume":"57","author":"L Ante","year":"2021","unstructured":"Ante L. Smart contracts on the blockchain\u2014a bibliometric analysis and review. Telematics Inf, 2021, 57: 101519","journal-title":"Telematics Inf"},{"key":"4402_CR4","first-page":"23","volume-title":"Proceedings of the Web Conference","author":"F Victor","year":"2021","unstructured":"Victor F, Weintraud A M. Detecting and quantifying wash trading on decentralized cryptocurrency exchanges. In: Proceedings of the Web Conference, New York, 2021. 23\u201332"},{"key":"4402_CR5","volume-title":"Defillama hacks","author":"DefiLlama","year":"2024","unstructured":"DefiLlama. Defillama hacks, 2024. Accessed: June 2024. https:\/\/defillama.com\/hacks"},{"key":"4402_CR6","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Xie S, Dai H N, et al. An overview on smart contracts: challenges, advances and platforms. Future Generation Comput Syst, 2020, 105: 475\u2013491","journal-title":"Future Generation Comput Syst"},{"key":"4402_CR7","doi-asserted-by":"publisher","first-page":"12004","DOI":"10.1109\/JIOT.2021.3074544","volume":"8","author":"K Peng","year":"2021","unstructured":"Peng K, Li M, Huang H, et al. Security challenges and opportunities for smart contracts in Internet of Things: a survey. IEEE Internet Things J, 2021, 8: 12004\u201312020","journal-title":"IEEE Internet Things J"},{"key":"4402_CR8","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Ouyang L, Yuan Y, et al. Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst, 2019, 49: 2266\u20132277","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4402_CR9","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1145\/3377811.3380334","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"T D Nguyen","year":"2020","unstructured":"Nguyen T D, Pham L H, Sun J, et al. sFuzz: an efficient adaptive fuzzer for solidity smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 2020. 778\u2013788"},{"key":"4402_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/3194113.3194115","volume-title":"Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain","author":"S Tikhomirov","year":"2018","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, et al. Smartcheck: static analysis of Ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, 2018. 9\u201316"},{"key":"4402_CR11","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1145\/3274694.3274737","volume-title":"Proceedings of the 34th Annual Computer Security Applications Conference","author":"C F Torres","year":"2018","unstructured":"Torres C F, Sch\u00fctte J, State R. Osiris: hunting for integer bugs in Ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, 2018. 664\u2013676"},{"key":"4402_CR12","first-page":"254","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"L Luu","year":"2016","unstructured":"Luu L, Chu D H, Olickel H, et al. Making smart contracts smarter. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2016. 254\u2013269"},{"key":"4402_CR13","first-page":"54","volume":"9","author":"B Mueller","year":"2018","unstructured":"Mueller B. Smashing Ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam, 2018, 9: 54","journal-title":"HITB SECCONF Amsterdam"},{"key":"4402_CR14","first-page":"67","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"P Tsankov","year":"2018","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D, et al. Securify: practical security analysis of smart contracts. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2018. 67\u201382"},{"key":"4402_CR15","first-page":"8","volume-title":"Proceedings of IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)","author":"J Feist","year":"2019","unstructured":"Feist J, Grieco G, Groce A. Slither: a static analysis framework for smart contracts. In: Proceedings of IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 2019. 8\u201315"},{"key":"4402_CR16","unstructured":"Tann W J W, Han X J, Gupta S S, et al. Towards safer smart contracts: a sequence learning approach to detecting security threats. 2018. ArXiv:1811.06632"},{"key":"4402_CR17","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian P, Liu Z, He Q, et al. Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access, 2020, 8: 19685\u201319695","journal-title":"IEEE Access"},{"key":"4402_CR18","unstructured":"Kipf T N, Welling M. Semi-supervised classification with graph convolutional networks. 2016. ArXiv:1609.02907"},{"key":"4402_CR19","first-page":"3283","volume-title":"Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence","author":"Y Zhuang","year":"2021","unstructured":"Zhuang Y, Liu Z, Qian P, et al. Smart contract vulnerability detection using graph neural networks. In: Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence, 2021. 3283\u20133290"},{"key":"4402_CR20","doi-asserted-by":"crossref","unstructured":"Liu Z, Qian P, Wang X, et al. Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion. 2021. ArXiv:2106.09282","DOI":"10.24963\/ijcai.2021\/379"},{"key":"4402_CR21","first-page":"2220","volume-title":"Proceedings of the ACM Web Conference","author":"P Qian","year":"2023","unstructured":"Qian P, Liu Z, Yin Y, et al. Cross-modality mutual learning for enhancing smart contract vulnerability detection on bytecode. In: Proceedings of the ACM Web Conference, 2023. 2220\u20132229"},{"key":"4402_CR22","doi-asserted-by":"publisher","first-page":"118907","DOI":"10.1016\/j.ins.2023.03.132","volume":"636","author":"W Jie","year":"2023","unstructured":"Jie W, Chen Q, Wang J, et al. A novel extended multimodal AI framework towards vulnerability detection in smart contracts. Inf Sci, 2023, 636: 118907","journal-title":"Inf Sci"},{"key":"4402_CR23","unstructured":"Chen C, Su J, Chen J, et al. When ChatGPT meets smart contract vulnerability detection: how far are we? 2023. ArXiv:2309.05520"},{"key":"4402_CR24","unstructured":"Du Y, Tang X. Evaluation of ChatGPT\u2019s smart contract auditing capabilities based on chain of thought. 2024. ArXiv:2402.12023"},{"key":"4402_CR25","first-page":"297","volume-title":"Proceedings of the 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","author":"S Hu","year":"2023","unstructured":"Hu S, Huang T, Ilhan F, et al. Large language model-powered smart contract vulnerability detection: new perspectives. In: Proceedings of the 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2023. 297\u2013306"},{"key":"4402_CR26","unstructured":"Ma W, Wu D, Sun Y, et al. Combining fine-tuning and LLM-based agents for intuitive smart contract auditing with justifications. 2024. ArXiv:2403.16073"},{"key":"4402_CR27","first-page":"1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering","author":"Y Sun","year":"2024","unstructured":"Sun Y, Wu D, Xue Y, et al. GPTScan: detecting logic vulnerabilities in smart contracts by combining GPT with program analysis. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, 2024. 1\u201313"},{"key":"4402_CR28","first-page":"127","volume-title":"Proceedings of IEEE\/ACM 29th International Conference on Program Comprehension (ICPC)","author":"F Contro","year":"2021","unstructured":"Contro F, Crosara M, Ceccato M, et al. EtherSolve: computing an accurate control-flow graph from Ethereum bytecode. In: Proceedings of IEEE\/ACM 29th International Conference on Program Comprehension (ICPC), 2021. 127\u2013137"},{"key":"4402_CR29","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering","author":"F Luo","year":"2024","unstructured":"Luo F, Luo R, Chen T, et al. SCVHUNTER: smart contract vulnerability detection based on heterogeneous graph attention network. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, New York, 2024"},{"key":"4402_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2512530.2512532","volume-title":"Proceedings of the 3rd ACM International Workshop on Audio\/Visual Emotion Challenge","author":"H Meng","year":"2013","unstructured":"Meng H, Huang D, Wang H, et al. Depression recognition based on dynamic facial and vocal expression features using partial least square regression. In: Proceedings of the 3rd ACM International Workshop on Audio\/Visual Emotion Challenge, New York, 2013. 21\u201330"},{"key":"4402_CR31","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/3347320.3357695","volume-title":"Proceedings of the 9th International on Audio\/Visual Emotion Challenge and Workshop","author":"W Fan","year":"2019","unstructured":"Fan W, He Z, Xing X, et al. Multi-modality depression detection via multi-scale temporal dilated CNNs. In: Proceedings of the 9th International on Audio\/Visual Emotion Challenge and Workshop, New York, 2019. 73\u201380"},{"key":"4402_CR32","doi-asserted-by":"publisher","first-page":"13","DOI":"10.18653\/v1\/W18-0602","volume-title":"Proceedings of the 5th Workshop on Computational Linguistics and Clinical Psychology: From Keyboard to Clinic","author":"M Morales","year":"2018","unstructured":"Morales M, Scherer S, Levitan R. A linguistically-informed fusion approach for multimodal depression detection. In: Proceedings of the 5th Workshop on Computational Linguistics and Clinical Psychology: From Keyboard to Clinic, New Orleans, 2018. 13\u201324"},{"key":"4402_CR33","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"G Ke","year":"2017","unstructured":"Ke G, Meng Q, Finley T, et al. LightGBM: a highly efficient gradient boosting decision tree. In: Proceedings of Advances in Neural Information Processing Systems, 2017"},{"key":"4402_CR34","first-page":"2451","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"D Sun","year":"2013","unstructured":"Sun D, Wulff J, Sudderth E B, et al. A fully-connected layered model of foreground and background flow. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013. 2451\u20132458"},{"key":"4402_CR35","volume-title":"Proceedings of the 11th International Conference on Learning Representations","author":"A Zeng","year":"2023","unstructured":"Zeng A, Liu X, Du Z, et al. GLM-130B: an open bilingual pre-trained model. In: Proceedings of the 11th International Conference on Learning Representations, Kigali, 2023"},{"key":"4402_CR36","unstructured":"Bai J Z, Bai S, Chu Y F, et al. Qwen technical report. 2023. ArXiv:2309.16609"},{"key":"4402_CR37","volume-title":"Voyage-lite-02-instruct: optimized text embedding model","author":"Pinecone","year":"2024","unstructured":"Pinecone. Voyage-lite-02-instruct: optimized text embedding model. 2024. https:\/\/www.pinecone.io\/models\/voyage-lite-02-instruct\/"},{"key":"4402_CR38","unstructured":"Muennighoff N, Su H, Wang L, et al. Generative representational instruction tuning. 2024. ArXiv:2402.09906"},{"key":"4402_CR39","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S1351324916000334","volume":"23","author":"K W Church","year":"2017","unstructured":"Church K W. Word2Vec. Nat Lang Eng, 2017, 23: 155\u2013162","journal-title":"Nat Lang Eng"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4402-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4402-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4402-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T11:29:31Z","timestamp":1747913371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4402-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4402"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4402-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"1 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"160101"}}