{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:26:51Z","timestamp":1769725611342,"version":"3.49.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372485"],"award-info":[{"award-number":["62372485"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["623B2102"],"award-info":[{"award-number":["623B2102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332004"],"award-info":[{"award-number":["62332004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011314"],"award-info":[{"award-number":["2023A1515011314"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010226","name":"Department of Education of Guangdong Province","doi-asserted-by":"publisher","award":["2024ZDZX1001"],"award-info":[{"award-number":["2024ZDZX1001"]}],"id":[{"id":"10.13039\/501100010226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Key Project of PCL","award":["PCL2023A05"],"award-info":[{"award-number":["PCL2023A05"]}]},{"name":"Fundamental Research Funds for the Central Universities, Sun Yat-sen University","award":["24lgqb018"],"award-info":[{"award-number":["24lgqb018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tse.2025.3578816","type":"journal-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T13:51:02Z","timestamp":1749822662000},"page":"2197-2210","source":"Crossref","is-referenced-by-count":1,"title":["Malo in the Code Jungle: Explainable Fault Localization for Decentralized Applications"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8717-9184","authenticated-orcid":false,"given":"Hui","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4633-0008","authenticated-orcid":false,"given":"Zhiying","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3491-1941","authenticated-orcid":false,"given":"Zhe","family":"Chen","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7067-2396","authenticated-orcid":false,"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0192-9992","authenticated-orcid":false,"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0497-0835","authenticated-orcid":false,"given":"Yuren","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3346276"},{"key":"ref2","article-title":"Security incidents \u2014 Phalcon explorer"},{"key":"ref3","first-page":"1829","article-title":"Proxy hunting: Understanding and characterizing proxy-based upgradeable smart contracts in blockchains","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Bodell Iii","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652116"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468580"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623342"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3660771"},{"key":"ref11","article-title":"Large language models in fault localisation","author":"Wu","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3346888"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3228122"},{"key":"ref15","article-title":"Blockchain large language models","author":"Gai","year":"2023"},{"key":"ref16","article-title":"Safemoon - REKT","volume-title":"REKT","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"ref18","article-title":"Ethereum: A secure decentralised generalised transaction ledger.","author":"Wood"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103139"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3359000"},{"key":"ref21","article-title":"Ethereum development standards"},{"key":"ref22","article-title":"Opensea, the largest NFT marketplace."},{"key":"ref23","article-title":"Gpt-4 technical report","year":"2024"},{"key":"ref24","article-title":"Meta llama3."},{"key":"ref25","article-title":"Large language models for blockchain security: A systematic literature review","author":"He","year":"2024"},{"key":"ref26","article-title":"AuditGPT: Auditing smart contracts with ChatGPT","author":"Xia","year":"2024"},{"key":"ref27","article-title":"Do you still need a manual smart contract audit?","author":"David","year":"2023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"ref29","article-title":"Introducing indexed finance (NDX)."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00110"},{"key":"ref31","article-title":"The analysis of indexed finance security incident."},{"key":"ref32","article-title":"Index controller docs."},{"key":"ref33","first-page":"11960","article-title":"Graph transformer networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yun","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00638"},{"key":"ref36","article-title":"Bing web search API"},{"key":"ref37","article-title":"Retrieval-augmented generation for AI-generated content: A survey","author":"Zhao","year":"2024"},{"key":"ref38","article-title":"File search of openai platform."},{"key":"ref39","article-title":"DeFi hacks reproduce - Foundry."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"ref42","article-title":"Opencompass: A universal evaluation platform for foundation models"},{"key":"ref43","article-title":"Qwen2 technical report","year":"2024"},{"key":"ref44","article-title":"Doubao."},{"key":"ref45","article-title":"Deepseek-v3 technical report","year":"2024"},{"key":"ref46","article-title":"DeepSeek-R1: Incentivizing reasoning capability in LLMs via reinforcement learning","year":"2025"},{"key":"ref47","first-page":"46595","article-title":"Judging LLM-as-a-judge with MT-bench and chatbot arena","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Zheng","year":"2024"},{"key":"ref48","article-title":"A comparative study of quality evaluation methods for text summarization","author":"Nguyen","year":"2024"},{"key":"ref49","article-title":"Towards effectively detecting and explaining vulnerabilities using large language models","author":"Mao","year":"2024"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3133916"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00136"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_19"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/icse43902.2021.00067"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11082747\/11034691.pdf?arnumber=11034691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T18:08:25Z","timestamp":1753121305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11034691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":55,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3578816","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}