{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T02:19:21Z","timestamp":1772504361654,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB2700200"],"award-info":[{"award-number":["2021YFB2700200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076187"],"award-info":[{"award-number":["62076187"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Hubei Province","award":["2021BAA190"],"award-info":[{"award-number":["2021BAA190"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2022BAA039"],"award-info":[{"award-number":["2022BAA039"]}]},{"name":"Key Research and Development Program of Shandong Province","award":["2022CXPT055"],"award-info":[{"award-number":["2022CXPT055"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695055","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"582-593","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0930-0283","authenticated-orcid":false,"given":"Cong","family":"Wu","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3824-1954","authenticated-orcid":false,"given":"Ziwei","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0709-6420","authenticated-orcid":false,"given":"Ruichao","family":"Liang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3634-3385","authenticated-orcid":false,"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/etherscan.io\/address\/0x2a53f42ad8bba138c21b50a4e5711f18381a61e9","author":"Contract","year":"2024","unstructured":"Contract 0x2a53f42ad8bba138c21b50a4e5711f18381a61e9. https:\/\/etherscan.io\/address\/0x2a53f42ad8bba138c21b50a4e5711f18381a61e9, 2024."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/etherscan.io\/address\/0x96Da8b9cfEC99A1CcFF16AB16F3948dA82396f27#code","author":"Contract","year":"2024","unstructured":"Contract 0x96da8b9cfec99a1ccff16ab16f3948da82396f27. https:\/\/etherscan.io\/address\/0x96Da8b9cfEC99A1CcFF16AB16F3948dA82396f27#code, 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/etherscan.io\/address\/0xa8b9e7718c73329AFd7B99F089C853a80B8127Be#code","author":"Contract","year":"2024","unstructured":"Contract 0xa8b9e7718c73329afd7b99f089c853a80b8127be. https:\/\/etherscan.io\/address\/0xa8b9e7718c73329AFd7B99F089C853a80B8127Be#code, 2024."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/etherscan.io\/address\/0xe713cCf85c89dDc4205747Ed20af7c916094b4Fb#code","author":"Contract","year":"2024","unstructured":"Contract 0xe713ccf85c89ddc4205747ed20af7c916094b4fb. https:\/\/etherscan.io\/address\/0xe713cCf85c89dDc4205747Ed20af7c916094b4Fb#code, 2024."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/platform.openai.com\/docs\/models\/gpt-3-5-turbo","year":"2024","unstructured":"https:\/\/platform.openai.com\/docs\/models\/gpt-3-5-turbo. https:\/\/platform.openai.com\/docs\/models\/gpt-3-5-turbo, 2024."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/github.com\/meta-llama\/llama","author":"Llama","year":"2024","unstructured":"Llama 2. https:\/\/github.com\/meta-llama\/llama, 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/meta-llama\/llama3","author":"Llama","year":"2024","unstructured":"Llama 3. https:\/\/github.com\/meta-llama\/llama3, 2024."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/github.com\/mistralai\/mistral-inference","author":"Mistral","year":"2024","unstructured":"Mistral 7b. https:\/\/github.com\/mistralai\/mistral-inference, 2024."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/xblock.pro\/#\/dataset\/25","author":"Ponzi","year":"2024","unstructured":"Ponzi contract dataset. https:\/\/xblock.pro\/#\/dataset\/25, 2024."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/github.com\/smartcontract-detect-yzu\/PonziDataset","year":"2024","unstructured":"Ponzidataset. https:\/\/github.com\/smartcontract-detect-yzu\/PonziDataset, 2024."},{"key":"e_1_3_2_1_11_1","volume-title":"the smart contract static analyzer. https:\/\/github.com\/crytic\/slither","author":"Slither","year":"2024","unstructured":"Slither, the smart contract static analyzer. https:\/\/github.com\/crytic\/slither, 2024."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/ethereum\/solc-bin","year":"2024","unstructured":"solc-bin. https:\/\/github.com\/ethereum\/solc-bin, 2024."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"e_1_3_2_1_14_1","volume-title":"Sparks of artificial general intelligence: Early experiments with gpt-4. arXiv:2303.12712","author":"Bubeck S.","year":"2023","unstructured":"S. Bubeck, V. Chandrasekaran, R. Eldan, J. Gehrke, E. Horvitz, E. Kamar, P. Lee, Y. T. Lee, Y. Li, S. Lundberg, et al. Sparks of artificial general intelligence: Early experiments with gpt-4. arXiv:2303.12712, 2023."},{"key":"e_1_3_2_1_15_1","article-title":"Ponzi scheme detection in smart contract via transaction semantic representation learning","author":"Cai J.","year":"2023","unstructured":"J. Cai, B. Li, J. Zhang, and X. Sun. Ponzi scheme detection in smart contract via transaction semantic representation learning. IEEE Transactions on Reliability, 2023.","journal-title":"IEEE Transactions on Reliability"},{"key":"e_1_3_2_1_16_1","volume-title":"J. Kaplan, H. Edwards, Y. Burda, N. Joseph, G. Brockman, et al. Evaluating large language models trained on code. arXiv:2107.03374","author":"Chen M.","year":"2021","unstructured":"M. Chen, J. Tworek, H. Jun, Q. Yuan, H. P. d. O. Pinto, J. Kaplan, H. Edwards, Y. Burda, N. Joseph, G. Brockman, et al. Evaluating large language models trained on code. arXiv:2107.03374, 2021."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410220.3460105"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_1_19_1","article-title":"Attention-based edge-enhanced ponzi contract detection","author":"Chen Y.","year":"2024","unstructured":"Y. Chen, B. Li, Y. Xiao, and X. Du. Ponzifinder: Attention-based edge-enhanced ponzi contract detection. IEEE Transactions on Reliability, 2024.","journal-title":"IEEE Transactions on Reliability"},{"key":"e_1_3_2_1_20_1","volume-title":"Can large language models be an alternative to human evaluations? arXiv:2305.01937","author":"Chiang C.-H.","year":"2023","unstructured":"C.-H. Chiang and H.-y. Lee. Can large language models be an alternative to human evaluations? arXiv:2305.01937, 2023."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_22_1","volume-title":"Information Processing and Management","author":"Fan S.","year":"2021","unstructured":"S. Fan, S. Fu, H. Xu, and X. Cheng. Al-spsd: Anti-leakage smart ponzi schemes detection in blockchain. Information Processing and Management, 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3636060"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623318"},{"key":"e_1_3_2_1_27_1","volume-title":"Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing. arXiv preprint arXiv:2408.10116","author":"Liang R.","year":"2024","unstructured":"R. Liang, J. Chen, C. Wu, K. He, Y. Wu, R. Cao, R. Du, Y. Liu, and Z. Zhao. Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing. arXiv preprint arXiv:2408.10116, 2024."},{"key":"e_1_3_2_1_28_1","volume-title":"Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph. arXiv preprint arXiv:2406.00921","author":"Liang R.","year":"2024","unstructured":"R. Liang, J. Chen, C. Wu, K. He, Y. Wu, W. Sun, R. Du, Q. Zhao, and Y. Liu. Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph. arXiv preprint arXiv:2406.00921, 2024."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC49832.2020.00053"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448439"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_34_1","first-page":"54","article-title":"Smashing ethereum smart contracts for fun and real profit","volume":"9","author":"Mueller B.","year":"2018","unstructured":"B. Mueller. Smashing ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam, 9:54, 2018.","journal-title":"HITB SECCONF Amsterdam"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921936"},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS","author":"Rodler M.","year":"2018","unstructured":"M. Rodler, W. Li, G. O. Karame, and L. Davi. Sereum: Protecting existing smart contracts against re-entrancy attacks. In NDSS, 2018."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS51102.2020.00047"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Security Symposium","author":"Sun Z.","year":"2023","unstructured":"Z. Sun, X. Luo, and Y. Zhang. Panda: Security analysis of algorand smart contracts. In USENIX Security Symposium, 2023."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_43_1","volume-title":"Lmpa: Improving decompilation by synergy of large language model and program analysis. arXiv:2306.02546","author":"Xu X.","year":"2023","unstructured":"X. Xu, Z. Zhang, S. Feng, Y. Ye, Z. Su, N. Jiang, S. Cheng, L. Tan, and X. Zhang. Lmpa: Improving decompilation by synergy of large language model and program analysis. arXiv:2306.02546, 2023."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7993-3_14"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571847"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:07Z","timestamp":1750291447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":46,"alternative-id":["10.1145\/3691620.3695055","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695055","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}