{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:30:39Z","timestamp":1774074639616,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2700900"],"award-info":[{"award-number":["2021YFB2700900"]}]},{"DOI":"10.13039\/501100012156","name":"Shenzhen Key Technical Project","doi-asserted-by":"publisher","award":["2022N009"],"award-info":[{"award-number":["2022N009"]}],"id":[{"id":"10.13039\/501100012156","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012156","name":"Shenzhen Key Technical Project","doi-asserted-by":"publisher","award":["202210213000050"],"award-info":[{"award-number":["202210213000050"]}],"id":[{"id":"10.13039\/501100012156","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936120"],"award-info":[{"award-number":["U1936120"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010261","name":"Fok Ying Tung Education Foundation of China","doi-asserted-by":"publisher","award":["171058"],"award-info":[{"award-number":["171058"]}],"id":[{"id":"10.13039\/501100010261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"University Grants Committee of the Hong Kong Special Administrative Region, China","doi-asserted-by":"publisher","award":["11201421"],"award-info":[{"award-number":["11201421"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,7,15]]},"DOI":"10.1109\/jiot.2023.3241544","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T19:31:50Z","timestamp":1675279910000},"page":"12178-12185","source":"Crossref","is-referenced-by-count":79,"title":["Detection of Vulnerabilities of Blockchain Smart Contracts"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3820-8128","authenticated-orcid":false,"given":"Daojing","family":"He","sequence":"first","affiliation":[{"name":"School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6154-2610","authenticated-orcid":false,"given":"Rui","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou, China"}]},{"given":"Xinji","family":"Li","sequence":"additional","affiliation":[{"name":"Software Engineering Institute, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8524-229X","authenticated-orcid":false,"given":"Sammy","family":"Chan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, china"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Machine Learning Department, MohamedBin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref14","first-page":"1317","article-title":"teEther: Gnawing at Ethereum to automatically exploit smart contracts","author":"krupp","year":"2018","journal-title":"Proc 27th USENIX Security Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/379"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.598780"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102635"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2949561"},{"key":"ref20","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"brent","year":"2018","journal-title":"arXiv 1809 03981"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"ref28","article-title":"Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities","author":"tann","year":"2018","journal-title":"arXiv 1811 06632"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3167084"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3147693"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377650"},{"key":"ref6","first-page":"79","article-title":"Vulnerability and transaction behavior based detection of malicious smart contracts","author":"agarwal","year":"2021","journal-title":"Proc 13th Int Symp Cyberspace Safety Security (CSS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.03.008"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10175002\/10034747.pdf?arnumber=10034747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:40:35Z","timestamp":1690825235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10034747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":31,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3241544","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,15]]}}}