{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:34Z","timestamp":1775912794988,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272042"],"award-info":[{"award-number":["62272042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tse.2025.3570421","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T17:32:45Z","timestamp":1747330365000},"page":"1854-1865","source":"Crossref","is-referenced-by-count":6,"title":["Enhanced Smart Contract Vulnerability Detection via Graph Neural Networks: Achieving High Accuracy and Efficiency"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9726-7232","authenticated-orcid":false,"given":"Chang","family":"Xu","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3672-7871","authenticated-orcid":false,"given":"Huaiyu","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5880-336X","authenticated-orcid":false,"given":"Xiaodong","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7214-6568","authenticated-orcid":false,"given":"Kashif","family":"Sharif","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ethereum (Eth) price, charts, market cap, and other metrics","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3376-1_5"},{"key":"ref4","article-title":"Smart contract dispute resolution: The inescapable flaws of blockchain-based arbitration","volume":"168","author":"Buchwald","year":"2019","journal-title":"Univ. Pennsylvania Law Rev."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377650"},{"key":"ref6","first-page":"65","article-title":"Reguard: Finding reentrancy bugs in smart contracts","volume-title":"Proc. 40th Int. Conf. Softw. Eng., Companion (ICSE)","author":"Liu","year":"2018"},{"key":"ref7","first-page":"1317","article-title":"Teether: Gnawing at ethereum to automatically exploit smart contracts","volume-title":"Proc. 27th USENIX Secur. Symp., USENIX Secur.","author":"Krupp","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.2019010102"},{"key":"ref10","article-title":"The parity wallet hack explained","author":"Palladino","year":"2017"},{"key":"ref11","first-page":"1775","article-title":"Smart learning to find dumb contracts","volume-title":"Proc. 32nd USENIX Secur. Symp., USENIX Secur.","author":"Abdelaziz","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050051"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583367"},{"key":"ref17","volume-title":"A Framework for Bug Hunting on the Ethereum Blockchain.","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE51034.2020.9236931"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162065"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/379"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103423"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/3194113.3194115","article-title":"Smartcheck: Static analysis of ethereum smart contracts","volume-title":"Proc. 1st IEEE\/ACM Int. Workshop Emerg. Trends Softw. Eng. Blockchain (WETSEB@ICSE)","author":"Tikhomirov","year":"2018"},{"key":"ref31","article-title":"Smart contract vulnerability detection technique: A survey","author":"Qian","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24222"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/info12070257"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/800028.808479"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1986.1586135"},{"key":"ref44","article-title":"A tool for recovering a control flow graph (CFG) from EVM bytecode","author":"Josselin","year":"2018"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/fi14110326"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2024.104078"},{"key":"ref50","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Representations (ICLR) Conf. Track Proc.","author":"Kipf","year":"2017"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11048386\/11005726.pdf?arnumber=11005726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:34:17Z","timestamp":1750786457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11005726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":50,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3570421","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}