{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:04Z","timestamp":1750824364640,"version":"3.41.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033607","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"1220-1227","source":"Crossref","is-referenced-by-count":0,"title":["HDFG: Ethereum Smart Contract Honeypot Detection Based on Pre-Training Techniques"],"prefix":"10.1109","author":[{"given":"Jiaying","family":"Song","sequence":"first","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]},{"given":"Yingchao","family":"Qin","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]},{"given":"Bingxu","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]},{"given":"Hanwen","family":"Miao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering Chinese Academy of Sciences"}]}],"member":"263","reference":[{"issue":"2014","key":"ref1","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"issue":"2","key":"ref2","first-page":"28","article-title":"Smart contracts: building blocks for digital markets","volume":"18","author":"Szabo","year":"1996","journal-title":"EXTROPY: The Journal of Transhumanist Thought, (16)"},{"issue":"37","key":"ref3","first-page":"2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"white paper"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system. cryptography mailing list","year":"2009","author":"Nakamoto","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978362"},{"volume-title":"Understanding the dao attack","year":"2016","author":"Siegel","key":"ref6"},{"volume-title":"Another parity wallet hack explained","year":"2017","author":"Petrov","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140091"},{"volume-title":"Hacking the hackers: Honeypots on ethereum network","year":"2018","author":"Sherbachev","key":"ref10"},{"key":"ref11","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Torres","year":"2019"},{"key":"ref12","first-page":"045","article-title":"Cadetector:cross-family anisotropic contract honeypot detection method","author":"Tian-Tian","year":"2022","journal-title":"CHINESE JOURNAL OF COMPUTERS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169396"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JCC49151.2020.00009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00099"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00047"},{"key":"ref21","article-title":"Graphcodebert: Pre-training code repre-sentations with data flow","author":"Guo","year":"2020","journal-title":"arXiv preprint"},{"volume-title":"Mastering ethereum: building smart contracts and dapps","year":"2018","author":"Antonopoulos","key":"ref22"},{"key":"ref23","article-title":"Learning to represent programs with graphs","author":"Allamanis","year":"2017","journal-title":"arXiv preprint"},{"key":"ref24","article-title":"Global relational models of source code","volume-title":"International conference on learning representations","author":"Hellendoorn","year":"2019"},{"key":"ref25","first-page":"2227","article-title":"Deep contextualized word representations","volume-title":"Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers)","author":"Peters","year":"2018"},{"journal-title":"Improving language understanding by generative pre-training","year":"2018","author":"Radford","key":"ref26"},{"key":"ref27","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint"},{"key":"ref28","first-page":"5110","article-title":"Learning and evaluating contextual embedding of source code","volume-title":"International conference on machine learning","author":"Kanade","year":"2020"},{"key":"ref29","article-title":"Scelmo: Source code embeddings from language models","author":"Karampatsis","year":"2020","journal-title":"arXiv preprint"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417058"},{"key":"ref32","article-title":"Exploring software naturalness through neural language models","author":"Buratti","year":"2020","journal-title":"arXiv preprint"},{"issue":"043\u2013001","key":"ref33","article-title":"Honeypot contract detection of blockchain based on deep learning","author":"Hongxia","year":"2022","journal-title":"Journal on Communications"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033607.pdf?arnumber=11033607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:18:47Z","timestamp":1750745927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033607","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}