{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T09:16:13Z","timestamp":1770714973571,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,26]]},"DOI":"10.1109\/bcca62388.2024.10844483","type":"proceedings-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T18:46:32Z","timestamp":1737571592000},"page":"505-515","source":"Crossref","is-referenced-by-count":1,"title":["VulnFusion: Exploiting Multimodal Representations for Advanced Smart Contract Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Jiblal","family":"Upadhya","sequence":"first","affiliation":[{"name":"Middle Tennessee State University,Computational and Data Science,Murfreesboro,TN,37132"}]},{"given":"Arpan","family":"Sainju","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]},{"given":"Kritagya","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]},{"given":"Samir","family":"Poudel","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]},{"given":"Md Nahid","family":"Hasan","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Computational and Data Science,Murfreesboro,TN,37132"}]},{"given":"Khem","family":"Poudel","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]},{"given":"Jaishree","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Detection of vulnerabilities in smart contracts specifications in ethereum platforms","volume-title":"9th Symposium on Languages, Applications and Technologies (SLATE 2020)","volume":"83","author":"Arganaraz"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_31"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5821\/mt.10848"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100135"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s23167246"},{"key":"ref8","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00965-2"},{"key":"ref10","article-title":"Etherscan\u2014the ethereum blockchain explorer","author":"Etherscan","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01127-0"},{"key":"ref12","author":"Khodadadi","year":"2023","journal-title":"Hymo: Vulnerability detection in smart contracts using a novel multi-modal hybrid model"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEA54677.2022.9936330"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/math11234823"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref17","first-page":"689","article-title":"Multimodal deep learning","volume-title":"28th international conference on machine learning (ICML-11)","author":"Ngiam"},{"key":"ref18","author":"Oosthoek","year":"2021","journal-title":"Flash crash for cash: Cyber threats in decentralized finance"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54204-6_24"},{"key":"ref20","author":"Qian","year":"2022","journal-title":"Smart contract vulnerability detection technique: A survey"},{"key":"ref21","author":"Rossini","year":"2022","journal-title":"Slither audited smart contracts dataset"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60836-0_11"},{"issue":"2","key":"ref24","article-title":"Blockchain-based smart contract technology application in the insurance industry: The case of \u201cfizzy\u201d","author":"Sedkaoui","year":"2021","journal-title":"MJBS"},{"key":"ref25","first-page":"1535","article-title":"The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in {US}. federal elections","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Specter"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-47219-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.20469\/ijtes.4.10002-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMI60790.2024.10586129"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3632634.3655878"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA56441.2022.00015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00029"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3298672"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111699"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00052"}],"event":{"name":"2024 6th International Conference on Blockchain Computing and Applications (BCCA)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2024,11,26]]},"end":{"date-parts":[[2024,11,29]]}},"container-title":["2024 6th International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10844360\/10844378\/10844483.pdf?arnumber=10844483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T06:26:03Z","timestamp":1737613563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10844483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bcca62388.2024.10844483","relation":{},"subject":[],"published":{"date-parts":[[2024,11,26]]}}}