{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:24:20Z","timestamp":1773840260455,"version":"3.50.1"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong RGC Project","award":["PolyU15222320"],"award-info":[{"award-number":["PolyU15222320"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202306"],"award-info":[{"award-number":["62202306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC for Young Scientists of China","award":["62202400"],"award-info":[{"award-number":["62202400"]}]},{"name":"Sichuan Provincial Natural Science Foundation for Distinguished Young Scholars","award":["2023NSFSC1963"],"award-info":[{"award-number":["2023NSFSC1963"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332004"],"award-info":[{"award-number":["62332004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tse.2024.3491578","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T13:41:06Z","timestamp":1732023666000},"page":"879-903","source":"Crossref","is-referenced-by-count":6,"title":["Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2065-9211","authenticated-orcid":false,"given":"Jinan","family":"Jiang","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4382-577X","authenticated-orcid":false,"given":"Zihao","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2350-7698","authenticated-orcid":false,"given":"Haoran","family":"Qin","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2196-6894","authenticated-orcid":false,"given":"Muhui","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3130-0554","authenticated-orcid":false,"given":"Xiaoming","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5677-4564","authenticated-orcid":false,"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6201-6011","authenticated-orcid":false,"given":"Chenxiong","family":"Qian","sequence":"additional","affiliation":[{"name":"Computer Science Department, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9165-8331","authenticated-orcid":false,"given":"Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Breakdown by smart contract languages","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE50093.2020.9050163"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2979019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3494106.3528683"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS52497.2021.9569819"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3563308"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45237-7_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111193"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"ref10","first-page":"81","article-title":"Towards saving money in using smart contracts","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: New Ideas Emerg. Technol. Results (ICSE-NIER)","author":"Chen","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2017.10.12.06"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-1674-4"},{"key":"ref13","article-title":"Solidity-the optimizer","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3506800"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53288-8_10"},{"key":"ref16","article-title":"GPT-4 technical report","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.ijcnlp-main.20"},{"key":"ref18","first-page":"14","article-title":"Language models don\u2019t always say what they think: Unfaithful explanations in chain-of-thought prompting","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","author":"Turpin","year":"2024"},{"key":"ref19","article-title":"Clam: Selective clarification for ambiguous questions with generative language models","author":"Kuhn","year":"2023"},{"key":"ref20","article-title":"Task ambiguity in humans and language models","volume-title":"Proc. 11th Int. Conf. Learn. Represent. (ICLR)","author":"Tamkin","year":"2023"},{"key":"ref21","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Brown","year":"2020"},{"key":"ref22","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Wei","year":"2022"},{"key":"ref23","article-title":"Towards revealing the mystery behind chain of thought: A theoretical perspective","volume-title":"Proc. 37th Conf. Neural Inform. Process. Syst.","author":"Feng","year":"2023"},{"key":"ref24","article-title":"Language models are multilingual chain-of-thought reasoners","author":"Shi","year":"2022"},{"key":"ref25","article-title":"Reflexion: Language agents with verbal reinforcement learning","author":"Shinn","year":"2023"},{"key":"ref26","first-page":"22199","article-title":"Large language models are zero-shot reasoners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Kojima","year":"2022"},{"key":"ref27","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2023","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00042"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2022.3221444"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS56424.2022.10227770"},{"key":"ref31","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Vaswani","year":"2017"},{"key":"ref32","article-title":"CodeGen: An open large language model for code with multi-turn program synthesis","author":"Nijkamp","year":"2023"},{"key":"ref33","article-title":"WizardCoder: Empowering code large language models with evol-instruct","author":"Luo","year":"2023"},{"key":"ref34","article-title":"Llama: Open efficient Found. Lang. models","author":"Touvron","year":"2023"},{"key":"ref35","article-title":"Models","year":"2024"},{"key":"ref36","article-title":"Verified contracts","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.90"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00021"},{"key":"ref39","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in Ethereum smart contracts","volume-title":"Proc. 28th USENIX Conf. Secur. Symp. (SEC)","author":"Torres","year":"2019"},{"key":"ref40","author":"Chen","year":"2024","journal-title":"Application of large language models in automated question generation: A case study on ChatGLM\u2019s structured questions for National Teacher Certification Exams"},{"key":"ref41","first-page":"2833","article-title":"Memory-assisted prompt editing to improve GPT-3 after deployment","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Madaan","year":"2022"},{"key":"ref42","article-title":"Fine-tuning language models from human preferences","author":"Ziegler","year":"2020"},{"key":"ref43","article-title":"Learning to summarize from human feedback","author":"Stiennon","year":"2022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2024.3382365"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3392499"},{"key":"ref46","article-title":"Refining chatGPT-generated code: Characterizing and mitigating code quality issues","author":"Liu","year":"2023"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.130"},{"key":"ref48","first-page":"244","article-title":"Story centaur: Large language model few shot learning as a creative writing tool","volume-title":"Proc. Conf. Eur. Chapter Assoc. Comput. Linguistics","author":"Swanson","year":"2021"},{"key":"ref49","first-page":"8483","article-title":"Language models with image descriptors are strong few-shot video-language learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Wang","year":"2022"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"issue":"1","key":"ref52","first-page":"7","article-title":"Systematic literature reviews in software engineering \u2013 A systematic literature review","volume-title":"Inf. Softw. Technol.","volume":"51","author":"Kitchenham","year":"2009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3695988"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3174092"},{"key":"ref55","article-title":"The gas patterns report","year":"2023"},{"key":"ref56","article-title":"The remix IDE","year":"2024"},{"key":"ref57","article-title":"Integrated development environments (IDEs)","year":"2024"},{"key":"ref58","article-title":"The history of Ethereum","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.346"},{"key":"ref60","article-title":"Vyper","year":"2024"},{"key":"ref61","article-title":"EIP-7609: Decrease base cost of tload\/tstore","year":"2024"},{"key":"ref62","article-title":"Eip-1153: Transient storage opcodes","year":"2024"},{"key":"ref63","article-title":"Anthropic","year":"2024"},{"key":"ref64","article-title":"Introducing the next generation of claude","year":"2024"},{"key":"ref65","article-title":"Unix_timestamp","year":"2023"},{"key":"ref66","article-title":"Bson types","year":"2023"},{"key":"ref67","article-title":"Appendix - dynamic gas costs","year":"2023"},{"key":"ref68","article-title":"Opcodes for the EVM","year":"2023"},{"key":"ref69","article-title":"Evaluating large language models trained on code","author":"Chen","year":"2021"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3702973"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3289808"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9477-x"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597140"},{"key":"ref74","article-title":"A systematic survey of prompt engineering in large language models: Techniques and applications","author":"Sahoo","year":"2024"},{"key":"ref75","article-title":"Thread of thought unraveling chaotic contexts","author":"Zhou","year":"2023"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.183"},{"key":"ref77","first-page":"14","article-title":"Tree of thoughts: Deliberate problem solving with large language models","volume-title":"Proc. 37th Int. Conf. Neural Inform. Process. Syst.","author":"Yao","year":"2024"},{"key":"ref78","article-title":"Large language model guided tree-of-thought","author":"Long","year":"2023"},{"key":"ref79","article-title":"Chain-of-note: Enhancing robustness in retrieval-augmented language models","author":"Yu","year":"2023"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00129"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00128"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00125"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00181"},{"key":"ref84","first-page":"522","article-title":"Revisiting the plastic surgery hypothesis via large language models","volume-title":"Proc. 38th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Xia","year":"2023"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616271"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00194"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00085"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00193"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00180"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00089"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00075"},{"key":"ref93","first-page":"1483","article-title":"Grace: Generation using associated code edits","volume-title":"Proc. ACM Joint Eur. Softw. Eng. Conf. Symp. Found. Softw. Eng. (ESEC\/FSE)","author":"Gupta","year":"2023"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616350"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616243"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598067"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00109"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00076"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00157"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616244"},{"key":"ref101","first-page":"3369","article-title":"RLPrompt: Optimizing discrete text prompts with reinforcement learning","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Deng","year":"2022"},{"key":"ref102","article-title":"Black-box prompt learning for pre-trained language models","author":"Diao","year":"2023","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref103","first-page":"18","article-title":"Hard prompts made easy: Gradient-based discrete optimization for prompt tuning and discovery","volume-title":"Proc. 37th Int. Conf. Neural Inform. Process. Syst.","author":"Wen","year":"2024"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acllong.353"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.174"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58580-8_41"},{"key":"ref107","article-title":"Parameter-efficient transfer learning for NLP","author":"Houlsby","year":"2019"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10969500\/10757316.pdf?arnumber=10757316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:39Z","timestamp":1773347799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10757316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":107,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3491578","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}