{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T07:24:41Z","timestamp":1773473081916,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972360"],"award-info":[{"award-number":["61972360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072392"],"award-info":[{"award-number":["62072392"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2024MF111"],"award-info":[{"award-number":["ZR2024MF111"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tnse.2024.3470788","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:29:45Z","timestamp":1727717385000},"page":"6382-6395","source":"Crossref","is-referenced-by-count":15,"title":["ContractGNN: Ethereum Smart Contract Vulnerability Detection Based on Vulnerability Sub-Graphs and Graph Neural Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7189-3163","authenticated-orcid":false,"given":"Yichen","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer and Control Engineering, Yantai University, Yantai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5870-5730","authenticated-orcid":false,"given":"Xiangfu","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer and Control Engineering, Yantai University, Yantai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9539-6209","authenticated-orcid":false,"given":"Long","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer and Control Engineering, Yantai University, Yantai, China"}]},{"given":"Zixian","family":"Zhen","sequence":"additional","affiliation":[{"name":"School of Computer and Control Engineering, Yantai University, Yantai, China"}]},{"given":"Haiyue","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer and Control Engineering, Yantai University, Yantai, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2017.8248566"},{"key":"ref4","article-title":"Integer underflow\/overflow","author":"Fontaine","year":"2020"},{"key":"ref5","article-title":"What is timestamp dependence?","author":"Behnke"},{"key":"ref6","article-title":"Reentrancy attack in a smart contract","author":"Aziz","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref11","article-title":"Mythril"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534395"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3639478.3643066"},{"key":"ref15","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1145\/3377811.3380334","article-title":"SFUZZ: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Nguyen","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3237370"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598059"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00158"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref22","article-title":"Towards safer smart contracts: A sequence learning approach to detecting security threats","author":"Tann","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23263"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1088\/2633-1357\/abcd29"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050051"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111550"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/390013.808479"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"ref33","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref34","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref35","article-title":"Gated graph sequence neural networks","author":"Li","year":"2015"},{"key":"ref36","article-title":"Graph attention networks","author":"Velikovi","year":"2017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/faia230374"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111705"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107168"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/10758414\/10700860.pdf?arnumber=10700860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:38:17Z","timestamp":1732667897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10700860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":40,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2024.3470788","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}