{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:24:34Z","timestamp":1774466674715,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T00:00:00Z","timestamp":1740960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T00:00:00Z","timestamp":1740960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Major Public Welfare Special Fund of Henan Province","award":["201300210200"],"award-info":[{"award-number":["201300210200"]}]},{"name":"Major Science and Technology Research Special Fund of Henan Province","award":["221100210400"],"award-info":[{"award-number":["221100210400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272163"],"award-info":[{"award-number":["62272163"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011151","name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education","doi-asserted-by":"publisher","award":["KLCS20240302"],"award-info":[{"award-number":["KLCS20240302"]}],"id":[{"id":"10.13039\/501100011151","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s40747-025-01782-3","type":"journal-article","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T02:08:38Z","timestamp":1740967718000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Small sample smart contract vulnerability detection method based on multi-layer feature fusion"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9035-1927","authenticated-orcid":false,"given":"Jinlin","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4452-5787","authenticated-orcid":false,"given":"Yaqiong","family":"He","sequence":"additional","affiliation":[]},{"given":"Huaiguang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,3]]},"reference":[{"key":"1782_CR1","unstructured":"Bitcoin P (2023) Bitcoin\u2014Open source P2P money. https:\/\/bitcoin.org\/en\/. Accessed 2023\u20133\u201310"},{"key":"1782_CR2","doi-asserted-by":"publisher","unstructured":"Nofer M, Gomber P, Hinz O, Schiereck D (2017) Blockchain. Bus Inform Syst Eng+, 59(3): 183\u2013187. https:\/\/doi.org\/10.1007\/s12599-017-0467-3","DOI":"10.1007\/s12599-017-0467-3"},{"key":"1782_CR3","doi-asserted-by":"crossref","unstructured":"Lotfi R, Hazrati H, Ali SS, Sharifmousavi SM, Khanbaba A, Amra M (2023) Antifragile, sustainable and agile healthcare waste chain network design by considering blockchain, resiliency, robustness and risk. Cent Eur J Oper Res, 1\u201334","DOI":"10.1007\/s10100-023-00874-0"},{"key":"1782_CR4","doi-asserted-by":"crossref","unstructured":"Lotfi R, Rajabzadeh M, Zamani A, Rajabi MS (2022) Viable supply chain with vendor-managed inventory approach by considering blockchain, risk and robustness. Ann Oper Res, 1\u201320","DOI":"10.1007\/s10479-022-05119-y"},{"issue":"42","key":"1782_CR5","doi-asserted-by":"crossref","first-page":"63560","DOI":"10.1007\/s11356-022-20334-7","volume":"29","author":"R Lotfi","year":"2022","unstructured":"Lotfi R, Kargar B, Gharehbaghi A, Hazrati H, Nazari S, Amra M (2022) Resource-constrained time\u2013cost-quality-energy-environment tradeoff problem by considering blockchain technology, risk and robustness: a case study of healthcare project. Environ Sci Pollut R 29(42):63560\u201363576","journal-title":"Environ Sci Pollut R"},{"key":"1782_CR6","doi-asserted-by":"crossref","unstructured":"Lotfi R, Khanbaba A, Alkhazaleh HA, Changizi M, Kad\u0142ubek M, Aghakhani S, SamarAli S (2024) A viable supplier selection with order allocation by considering robustness, risk-averse and blockchain technology. Comput Ind Eng, 110319","DOI":"10.1016\/j.cie.2024.110319"},{"key":"1782_CR7","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2023.140369","volume":"436","author":"R Lotfi","year":"2024","unstructured":"Lotfi R, Hazrati R, Aghakhani S, Afshar M, Amra M, Ali SS (2024) A data-driven robust optimization in viable supply chain network design by considering open innovation and blockchain technology. J CLEAN PROD 436:140369","journal-title":"J CLEAN PROD"},{"issue":"1","key":"1782_CR8","first-page":"7347389","volume":"2021","author":"R Lotfi","year":"2021","unstructured":"Lotfi R, Safavi S, Gharehbaghi A, Ghaboulian Zare S, Hazrati R, Weber G (2021) Viable supply chain network design by considering blockchain technology and cryptocurrency. Math Probl Eng 2021(1):7347389","journal-title":"Math Probl Eng"},{"key":"1782_CR9","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548","author":"N Szabo","year":"1997","unstructured":"Szabo N (1997) Formalizing and securing relationships on public networks. First monday. https:\/\/doi.org\/10.5210\/fm.v2i9.548","journal-title":"First monday"},{"issue":"2014","key":"1782_CR10","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"1782_CR11","unstructured":"Phil Daian: Analysis of the DAO exploit. https:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/ (2016). Accessed Dec 20 2023"},{"key":"1782_CR12","unstructured":"Breidenbach L, Daian P, Juels A, Sirer EG (2017) An in-depth look at the parity multisig bug. https:\/\/hackingdistributed.com\/2017\/07\/22\/deep-dive-parity-bug\/. Accessed 2023\u20133\u201315 2023"},{"key":"1782_CR13","unstructured":"Etherscan: BeautyChain (BEC) Token Tracker | Etherscan. (2023) https:\/\/etherscan.io\/token\/0xc5d105e63711398af9bbff092d4b6769c82f793d. Accessed 2023\u20133\u201315"},{"issue":"1","key":"1782_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s40854-021-00314-5","volume":"8","author":"V Mohan","year":"2022","unstructured":"Mohan V (2022) Automated market makers and decentralized exchanges: a DeFi primer. Financ Innov 8(1):20. https:\/\/doi.org\/10.1186\/s40854-021-00314-5","journal-title":"Financ Innov"},{"key":"1782_CR15","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarterProceedings of the 2016 ACM SIGSAC conference on computer and communications security, Vienna, Austria, 2016254\u2013269","DOI":"10.1145\/2976749.2978309"},{"key":"1782_CR16","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y(2018) Smartcheck: Static analysis of ethereum smart contractsProceedings of the 1st international workshop on emerging trends in software engineering for blockchain, Gothenburg, Sweden, 20189\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"1782_CR17","doi-asserted-by":"crossref","unstructured":"Jiang B, Liu Y, Chan WK (2018) Contractfuzzer: Fuzzing smart contracts for vulnerability detectionProceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, Montpellier, France, 2018259\u2013269","DOI":"10.1145\/3238147.3238177"},{"key":"1782_CR18","doi-asserted-by":"crossref","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D, Gervais A, Buenzli F, Vechev M (2018) Securify: Practical security analysis of smart contractsProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 201867\u201382","DOI":"10.1145\/3243734.3243780"},{"key":"1782_CR19","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Liu Z, Qian P, Liu Q, Wang X, He Q (2021) Smart contract vulnerability detection using graph neural networksProceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, 2021:3283\u20133290.","DOI":"10.24963\/ijcai.2020\/454"},{"issue":"9","key":"1782_CR20","doi-asserted-by":"crossref","first-page":"3577","DOI":"10.3390\/s22093577","volume":"22","author":"L Zhang","year":"2022","unstructured":"Zhang L, Chen W, Wang W, Jin Z, Zhao C, Cai Z, Chen H (2022) Cbgru: A detection method of smart contract vulnerability based on a hybrid model. Sensors-Basel 22(9):3577","journal-title":"Sensors-Basel"},{"key":"1782_CR21","unstructured":"Devlin J, Chang M, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. https:\/\/arxiv.org\/abs\/1810.04805"},{"key":"1782_CR22","doi-asserted-by":"publisher","unstructured":"Xu G, Liu L, Dong J (2023) Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model. CMES-Comp Model Eng 137(1). https:\/\/doi.org\/10.32604\/cmes.2023.026627","DOI":"10.32604\/cmes.2023.026627"},{"issue":"1","key":"1782_CR23","doi-asserted-by":"publisher","first-page":"20106","DOI":"10.1038\/s41598-023-47219-0","volume":"13","author":"X Tang","year":"2023","unstructured":"Tang X, Du Y, Lai A, Zhang Z, Shi L (2023) Deep learning-based solution for smart contract vulnerabilities detection. Sci Rep-UK 13(1):20106. https:\/\/doi.org\/10.1038\/s41598-023-47219-0","journal-title":"Sci Rep-UK"},{"key":"1782_CR24","doi-asserted-by":"crossref","unstructured":"Xue Y, Ma M, Lin Y, Sui Y, Ye J, Peng T (2020) Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2020: 1029\u20131040","DOI":"10.1145\/3324884.3416553"},{"issue":"2","key":"1782_CR25","first-page":"216","volume":"13","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2019) Chronos +: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE T SERV COMPUT 13(2):216\u2013229","journal-title":"IEEE T SERV COMPUT"},{"key":"1782_CR26","doi-asserted-by":"crossref","unstructured":"NVD\u2014CVE-2018\u201310299: NVD\u2014CVE-2018\u201310299. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10299. Accessed 2023\u20133\u201310 2023","DOI":"10.1039\/C8NR90119H"},{"key":"1782_CR27","doi-asserted-by":"crossref","unstructured":"X., Y., H., Z., B., H., Z., Y., B., W.: DeeSCVHunter: a deep learning-based framework for smart contract vulnerability detection. In: 2021 International Joint Conference on Neural Networks (IJCNN), 2021. IEEE, p 1\u20138. (2021)","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"issue":"4","key":"1782_CR28","doi-asserted-by":"crossref","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li Z, Zou D, Xu S, Jin H, Zhu Y, Chen Z (2021) Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE T Depend Secure 19(4):2244\u20132258","journal-title":"IEEE T Depend Secure"},{"issue":"1","key":"1782_CR29","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102756","volume":"59","author":"J Briskilal","year":"2022","unstructured":"Briskilal J, Subalalitha CN (2022) An ensemble model for classifying idioms and literal texts using BERT and RoBERTa. Inform Process Manag 59(1):102756","journal-title":"Inform Process Manag"},{"key":"1782_CR30","doi-asserted-by":"crossref","unstructured":"Hong Y, Wu Q, Qi Y, Rodriguez-Opazo C, Gould S Vln bert: a recurrent vision-and-language bert for navigation. In: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition, 20211643\u20131653. (2021)","DOI":"10.1109\/CVPR46437.2021.00169"},{"key":"1782_CR31","doi-asserted-by":"crossref","unstructured":"Wang R, Chen D, Wu Z, Chen Y, Dai X, Liu M, Jiang Y, Zhou L, Yuan L (2022) Bevt: Bert pretraining of video transformers. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022: 14733\u201314743","DOI":"10.1109\/CVPR52688.2022.01432"},{"key":"1782_CR32","doi-asserted-by":"crossref","unstructured":"Zhang Z, Wu Y, Zhao H, Li Z, Zhang S, Zhou X, Zhou X (2020) Semantics-aware BERT for language understanding. In: Proceedings of the AAAI conference on artificial intelligence, 2020: 9628\u20139635","DOI":"10.1609\/aaai.v34i05.6510"},{"key":"1782_CR33","doi-asserted-by":"crossref","unstructured":"Durieux T, Ferreira JF, Abreu R, Cruz P (2020) Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, Seoul, South Korea, 2020: 530\u2013541","DOI":"10.1145\/3377811.3380364"},{"key":"1782_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196","author":"Z Liu","year":"2021","unstructured":"Liu Z, Qian P, Wang X, Zhuang Y, Qiu L, Wang X (2021) Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE T Knowl Data En. https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE T Knowl Data En"},{"key":"1782_CR35","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian P, Liu Z, He Q, Zimmermann R, Wang X (2020) Towards automated reentrancy detection for smart contracts based on sequential models. IEEE ACCESS 8:19685\u201319695. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE ACCESS"},{"key":"1782_CR36","doi-asserted-by":"crossref","unstructured":"Ferreira JF, Cruz P, Durieux T, Abreu R (2020) Smartbugs: a framework to analyze solidity smart contracts. IN: Proceedings of the 35th IEEE\/ACM international conference on automated software engineering, Australia, 2020: 1349\u20131352","DOI":"10.1145\/3324884.3415298"},{"key":"1782_CR37","doi-asserted-by":"crossref","unstructured":"Qian P, Liu Z, Yin Y, He Q(2023) Cross-modality mutual learning for enhancing smart contract vulnerability detection on bytecode. Proceedings of the ACM Web Conference 2023, 2023: 2220\u20132229.","DOI":"10.1145\/3543507.3583367"},{"key":"1782_CR38","doi-asserted-by":"crossref","unstructured":"Jawahar G, Sagot B, Seddah D (2019) What does BERT learn about the structure of language?ACL 2019\u201357th Annual Meeting of the Association for Computational Linguistics, 2019.","DOI":"10.18653\/v1\/P19-1356"},{"key":"1782_CR39","doi-asserted-by":"crossref","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: a static analysis framework for smart contracts2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Montreal, QC, Canada, 2019. IEEE, p 8\u201315","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"1782_CR40","doi-asserted-by":"crossref","unstructured":"Torres CF, Sch\u00fctte J, State R (2018) Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th annual computer security applications conference, San Juan, PR, USA, 2018664\u2013676.","DOI":"10.1145\/3274694.3274737"},{"issue":"1","key":"1782_CR41","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1002\/int.22633","volume":"37","author":"Z Tian","year":"2022","unstructured":"Tian Z, Tian J, Wang Z, Chen Y, Xia H, Chen L (2022) Landscape estimation of solidity version usage on Ethereum via version identification. Int J Intell Syst 37(1):450\u2013477","journal-title":"Int J Intell Syst"},{"key":"1782_CR42","doi-asserted-by":"crossref","unstructured":"Qian C, Hu T, Li B (2022) A BiLSTM-attention model for detecting smart contract defects more accurately 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), 2022. IEEE, p 53\u201362.","DOI":"10.1109\/QRS57517.2022.00016"},{"key":"1782_CR43","unstructured":"Lu S, Guo D, Ren S, Huang J, Svyatkovskiy A, Blanco A, Clement C, Drain D, Jiang D, Tang D (2021) Codexglue: A machine learning benchmark dataset for code understanding and generation. arXiv preprint arXiv:2102.04664"},{"key":"1782_CR44","unstructured":"Zhou Y, Liu S, Siow J, Du X, Liu Y (2019) Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Adv Neural Inform Process Syst 32"},{"key":"1782_CR45","unstructured":"Microsoft: CodeXGLUE. https:\/\/github.com\/microsoft\/CodeXGLUE (2024) 2024"},{"key":"1782_CR46","doi-asserted-by":"crossref","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D(2020) Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"1782_CR47","unstructured":"Guo D, Ren S, Lu S, Feng Z, Tang D, Liu S, Zhou L, Duan N, Svyatkovskiy A, Fu S(2020) Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366"},{"key":"1782_CR48","doi-asserted-by":"crossref","unstructured":"Ahmad WU, Chakraborty S, Ray B, Chang K (2021) Unified pre-training for program understanding and generation. arXiv preprint arXiv:2103.06333","DOI":"10.18653\/v1\/2021.naacl-main.211"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01782-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01782-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01782-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T21:23:50Z","timestamp":1743369830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01782-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,3]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["1782"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01782-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,3]]},"assertion":[{"value":"11 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"198"}}