{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T18:42:49Z","timestamp":1766083369704,"version":"3.48.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62262031"],"award-info":[{"award-number":["62262031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20242BAB23011"],"award-info":[{"award-number":["20242BAB23011"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Guided Local Science and Technology Development Special Project","award":["20222ZDH04090"],"award-info":[{"award-number":["20222ZDH04090"]}]},{"name":"National Social Science Foundation Major Bidding Project","award":["20&ZD068"],"award-info":[{"award-number":["20&ZD068"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tr.2025.3551356","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T13:05:10Z","timestamp":1745499910000},"page":"4207-4221","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Fine-Grained Smart Contract Vulnerability Detection Through Domain Features and Transparent Interpretation"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-4267","authenticated-orcid":false,"given":"Qing","family":"Huang","sequence":"first","affiliation":[{"name":"Jiangxi Prov. Key Lab. for HPC, the State Int&#x0027;1S&amp;T Coop. Base of Net. Support. Softw., and the Language Intelligence Res. Center, Jiangxi Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1492-1407","authenticated-orcid":false,"given":"Yu","family":"He","sequence":"additional","affiliation":[{"name":"Institute of High Energy Physics and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7663-1421","authenticated-orcid":false,"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9299-4804","authenticated-orcid":false,"given":"Min","family":"Yu","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2273-1862","authenticated-orcid":false,"given":"Xiwei","family":"Xu","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9466-1672","authenticated-orcid":false,"given":"Qinghua","family":"Lu","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61, Eveleigh, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94478-4_6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09796-5"},{"key":"ref3","first-page":"778","article-title":"sFuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Nguyen","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264596"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.2019010102"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"article-title":"Mythrilreversing and bug hunting framework for the ethereum blockchain","year":"2017","author":"Mueller","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2971482"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref12","first-page":"9240","article-title":"GNNExplainer: Generating explanations for graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ying","year":"2019"},{"key":"ref13","first-page":"19620","article-title":"Parameterized explainer for graph neural network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Luo","year":"2020"},{"key":"ref14","first-page":"12241","article-title":"On explainability of graph neural networks via subgraph explorations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yuan","year":"2021"},{"key":"ref15","article-title":"How powerful are graph neural networks?","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xu","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05565-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"article-title":"Word2Vec explained: Deriving Mikolov s negative-sampling word-embedding method","year":"2014","author":"Goldberg","key":"ref19"},{"key":"ref20","first-page":"530","article-title":"Empirical review of automated analysis tools on 47,587 ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Durieux","year":"2020"},{"key":"ref21","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Torres","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref24","first-page":"9","article-title":"SmartCheck: Static analysis of ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 1st Int. Workshop Emerg. Trends Softw. Eng. Blockchain","author":"Tikhomirov","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/2529786"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3204236"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3437378.3437879"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23413","article-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks","volume-title":"Proc. 26th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Rodler","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref35","first-page":"65","article-title":"ReGuard: Finding reentrancy bugs in smart contracts","volume-title":"Proc. 40th Int. Conf. Softw. Eng.: Companion Proc.","author":"Liu","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/3194113.3194115","article-title":"Smartcheck: Static analysis of ethereum smart contracts","volume-title":"Proc. 1st Int. Workshop Emerg. Trends Softw. Eng. Blockchain","author":"Tikhomirov","year":"2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2949561"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/379"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2711\/1\/012009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01103"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3115452"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11152618\/10976248.pdf?arnumber=10976248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T18:33:06Z","timestamp":1766082786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10976248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2025.3551356","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}