{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T06:16:04Z","timestamp":1777875364992,"version":"3.51.4"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.neucom.2026.133741","type":"journal-article","created":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:53:22Z","timestamp":1776927202000},"page":"133741","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["CodeBC: A more secure large language model for smart contract code generation in blockchain"],"prefix":"10.1016","volume":"688","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0160-5701","authenticated-orcid":false,"given":"Lingxiang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7560-1500","authenticated-orcid":false,"given":"Hainan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qinnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ziwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9708-0220","authenticated-orcid":false,"given":"Jin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133741_bib0005","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1126\/science.abq1158","article-title":"Competition-level code generation with alphacode","volume":"378","author":"Li","year":"2022","journal-title":"Science"},{"key":"10.1016\/j.neucom.2026.133741_bib0010","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/3610721","article-title":"Asleep at the keyboard? Assessing the security of Github copilot\u2019s code contributions","volume":"68","author":"Pearce","year":"2025","journal-title":"Commun. ACM"},{"key":"10.1016\/j.neucom.2026.133741_bib0015","series-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1865","article-title":"Large language models for code: security hardening and adversarial testing","author":"He","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0020","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133741_bib0025","series-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2019"},{"key":"10.1016\/j.neucom.2026.133741_bib0030","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133741_bib0035","author":"Touvron"},{"key":"10.1016\/j.neucom.2026.133741_bib0040","author":"Roziere"},{"key":"10.1016\/j.neucom.2026.133741_bib0045","author":"Bavarian"},{"key":"10.1016\/j.neucom.2026.133741_bib0050","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-023-47219-0","article-title":"Deep learning-based solution for smart contract vulnerabilities detection","volume":"13","author":"Tang","year":"2023","journal-title":"Sci. Rep."},{"key":"10.1016\/j.neucom.2026.133741_bib0055","doi-asserted-by":"crossref","DOI":"10.3390\/fi16090321","article-title":"Vulnerability detection and classification of ethereum smart contracts using deep learning","volume":"16","author":"Bani-Hani","year":"2024","journal-title":"Future Internet"},{"key":"10.1016\/j.neucom.2026.133741_bib0060","series-title":"2024 13th Mediterranean Conference on Embedded Computing (MECO)","first-page":"1","article-title":"Smart contract vulnerability detection using deep learning algorithms on EVM bytecode","author":"Prifti","year":"2024"},{"key":"10.1016\/j.neucom.2026.133741_bib0065","series-title":"2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)","first-page":"8","article-title":"Slither: a static analysis framework for smart contracts","author":"Feist","year":"2019"},{"key":"10.1016\/j.neucom.2026.133741_bib0070","author":"Nijkamp"},{"key":"10.1016\/j.neucom.2026.133741_bib0075","author":"Guo"},{"key":"10.1016\/j.neucom.2026.133741_bib0080","first-page":"3","article-title":"Lora: low-rank adaptation of large language models","volume":"1","author":"Hu","year":"2022","journal-title":"ICLR"},{"key":"10.1016\/j.neucom.2026.133741_bib0085","series-title":"Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics","first-page":"311","article-title":"BLEU: a method for automatic evaluation of machine translation","author":"Papineni","year":"2002"},{"key":"10.1016\/j.neucom.2026.133741_bib0090","author":"Ren"},{"key":"10.1016\/j.neucom.2026.133741_bib0095","series-title":"Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics","first-page":"1528","article-title":"Summarize and generate to back-translate: unsupervised translation of programming languages","author":"Ahmad","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0100","series-title":"Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing","first-page":"4388","article-title":"Soleval: benchmarking large language models for repository-level solidity smart contract generation","author":"Peng","year":"2025"},{"key":"10.1016\/j.neucom.2026.133741_bib0105","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3464421","article-title":"A survey of smart contract formal specification and verification","volume":"54","author":"Tolmach","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.1016\/j.neucom.2026.133741_bib0110","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"615","article-title":"Demystifying exploitable bugs in smart contracts","author":"Zhang","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.128431","article-title":"Comprehensive review of smart contract and defi security: attack, vulnerability detection, and automated repair","author":"Qian","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133741_bib0120","series-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","first-page":"530","article-title":"Empirical review of automated analysis tools on 47, 587 ethereum smart contracts","author":"Durieux","year":"2020"},{"key":"10.1016\/j.neucom.2026.133741_bib0125","author":"Hui"},{"key":"10.1016\/j.neucom.2026.133741_bib0130","author":"Chen"},{"key":"10.1016\/j.neucom.2026.133741_bib0135","series-title":"Proceedings of the 6th ACM SIGPLAN International Symposium on Machine Programming","first-page":"1","article-title":"A systematic evaluation of large language models of code","author":"Xu","year":"2022"},{"key":"10.1016\/j.neucom.2026.133741_bib0140","author":"Zan"},{"key":"10.1016\/j.neucom.2026.133741_bib0145","author":"Lu"},{"key":"10.1016\/j.neucom.2026.133741_bib0150","author":"Nijkamp"},{"key":"10.1016\/j.neucom.2026.133741_bib0155","author":"Fried"},{"key":"10.1016\/j.neucom.2026.133741_bib0160","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"5673","article-title":"Codegeex: a pre-trained model for code generation with multilingual benchmarking on humaneval-x","author":"Zheng","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0165","series-title":"Findings of the Association for Computational Linguistics: ACL 2022","first-page":"9","article-title":"Compilable neural code generation with compiler feedback","author":"Wang","year":"2022"},{"key":"10.1016\/j.neucom.2026.133741_bib0170","series-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"769","article-title":"Self-edit: fault-aware code editor for code generation","author":"Zhang","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0175","series-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"126","article-title":"Natural language to code generation in interactive data science notebooks","author":"Yin","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0180","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"683","article-title":"Efficient avoidance of vulnerabilities in auto-completed smart contract code using vulnerability-constrained decoding","author":"Storhaug","year":"2023"},{"key":"10.1016\/j.neucom.2026.133741_bib0185","first-page":"27591","article-title":"Quark: controllable text generation with reinforced unlearning","volume":"35","author":"Lu","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133741_bib0190","author":"Brent"},{"key":"10.1016\/j.neucom.2026.133741_bib0195","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/JCIT.2019010102","article-title":"Understanding a revolutionary and flawed grand experiment in blockchain: the dao attack","volume":"21","author":"Mehar","year":"2019","journal-title":"Journal of Cases on Information Technology (JCIT)"},{"key":"10.1016\/j.neucom.2026.133741_bib0200","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"254","article-title":"Making smart contracts smarter","author":"Luu","year":"2016"},{"key":"10.1016\/j.neucom.2026.133741_bib0205","series-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","first-page":"259","article-title":"Contractfuzzer: fuzzing smart contracts for vulnerability detection","author":"Jiang","year":"2018"},{"key":"10.1016\/j.neucom.2026.133741_bib0210","series-title":"Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14\u201320, 2018, Proceedings 7","first-page":"243","article-title":"A semantic framework for the security analysis of ethereum smart contracts","author":"Grishchenko","year":"2018"},{"key":"10.1016\/j.neucom.2026.133741_bib0215","author":"Rodler"},{"key":"10.1016\/j.neucom.2026.133741_bib0220","author":"Tann"},{"key":"10.1016\/j.neucom.2026.133741_bib0225","series-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","first-page":"814","article-title":"S-gram: towards semantic-aware security auditing for ethereum smart contracts","author":"Liu","year":"2018"},{"key":"10.1016\/j.neucom.2026.133741_bib0230","series-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","first-page":"531","article-title":"Learning to fuzz from symbolic execution with application to smart contracts","author":"He","year":"2019"},{"key":"10.1016\/j.neucom.2026.133741_bib0235","doi-asserted-by":"crossref","first-page":"2874","DOI":"10.1109\/TSE.2020.2971482","article-title":"Checking smart contracts with structural code embedding","volume":"47","author":"Gao","year":"2020","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226011380?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226011380?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T21:43:47Z","timestamp":1777585427000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226011380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":47,"alternative-id":["S0925231226011380"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133741","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"CodeBC: A more secure large language model for smart contract code generation in blockchain","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133741","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133741"}}