{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:15:26Z","timestamp":1777130126893,"version":"3.51.4"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T00:00:00Z","timestamp":1740268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2701102"],"award-info":[{"award-number":["2021YFB2701102"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["62372398, 62202341, 72342025, and U20A20173"],"award-info":[{"award-number":["62372398, 62202341, 72342025, and U20A20173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["226-2022-00064"],"award-info":[{"award-number":["226-2022-00064"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai Sailing Program","award":["23YF1446900"],"award-info":[{"award-number":["23YF1446900"]}]},{"name":"Starry Night Science Fund of Zhejiang University Shanghai Institute for Advanced Study","award":["SN-ZJU-SIAS-001"],"award-info":[{"award-number":["SN-ZJU-SIAS-001"]}]},{"DOI":"10.13039\/100007834","name":"Ningbo Natural Science Foundation","doi-asserted-by":"crossref","award":["2023J292"],"award-info":[{"award-number":["2023J292"]}],"id":[{"id":"10.13039\/100007834","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>\n            Recently, smart contracts have played a vital role in automatic financial and business transactions. To help end users without programming background to better understand the logic of smart contracts, previous studies have proposed models for automatically translating smart contract source code into their corresponding code summaries. However, in practice, only 13% of smart contracts deployed on the Ethereum blockchain are associated with source code. The practical usage of these existing tools is significantly restricted. Considering that bytecode is always necessary when deploying smart contracts, in this article, we first introduce the task of automatically generating smart contract code summaries from bytecode. We propose a novel approach, named\n            <jats:bold>\n              Smart Contract Bytecode Translator (\n              <jats:sc>SmartBT<\/jats:sc>\n              )\n            <\/jats:bold>\n            for automatically translating smart contract bytecode into fine-grained natural language description directly. Two key challenges are posed for this task: structural code logic hidden in bytecode and the huge semantic gap between bytecode and natural language descriptions. To address the first challenge, we transform bytecode into\n            <jats:bold>Control-Flow Graph (CFG)<\/jats:bold>\n            to learn code structural and logic details. Regarding the second challenge, we introduce an information retrieval component to fetch similar comments for filling the semantic gap. Then, the structural input and semantic input are used to build an attentional sequence-to-sequence neural network model. The copy mechanism is employed to copy rare words directly from similar comments, and the coverage mechanism is employed to eliminate repetitive outputs. The automatic evaluation results show that\n            <jats:sc>SmartBT<\/jats:sc>\n            outperforms a set of baselines by a large margin, and the human evaluation results show the effectiveness and potential of\n            <jats:sc>SmartBT<\/jats:sc>\n            in producing meaningful and accurate comments for smart contract code from bytecode directly.\n          <\/jats:p>","DOI":"10.1145\/3699597","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T15:25:43Z","timestamp":1728314743000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Automating Comment Generation for Smart Contract from Bytecode"],"prefix":"10.1145","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5104-9085","authenticated-orcid":false,"given":"Jianhang","family":"Xiang","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3030-9917","authenticated-orcid":false,"given":"Zhipeng","family":"Gao","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1846-0921","authenticated-orcid":false,"given":"Lingfeng","family":"Bao","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China and Hangzhou High-Tech Zone (Binjiang) Blockchain and Data Security Research Institute, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0093-3292","authenticated-orcid":false,"given":"Xing","family":"Hu","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7093-7761","authenticated-orcid":false,"given":"Jiayuan","family":"Chen","sequence":"additional","affiliation":[{"name":"The Ohio State Univeristy, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,23]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Bitcoin Africa Ltd. 2018. The Biggest ICO Scams of 2018. Retrieved July 10 2023 from https:\/\/bitcoinafrica.io\/2018\/09\/27\/biggest-ico-scams"},{"key":"e_1_3_1_3_2","unstructured":"GitHub. 2019. EVM CFG Builder GitHub Repository. Retrieved July 10 2023 from https:\/\/github.com\/crytic\/evm_cfg_builder"},{"key":"e_1_3_1_4_2","unstructured":"Etherscan. 2023. Etherscan Ethereum Blockchain Explorer. Retrieved July 10 2023 from https:\/\/etherscan.io"},{"key":"e_1_3_1_5_2","unstructured":"Zellic. 2023. Zellic. Retrieved July 10 2023 from https:\/\/www.zellic.io"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Wasi Uddin Ahmad Saikat Chakraborty Baishakhi Ray and Kai-Wei Chang. 2021. Unified pre-training for program understanding and generation. Retrieved from https:\/\/aclanthology.org\/2021.naacl-main.211\/","DOI":"10.18653\/v1\/2021.naacl-main.211"},{"key":"e_1_3_1_7_2","volume-title":"Proceedings of the 40th International Conference on Software Engineering (ICSE)","author":"Allamanis Miltiadis","year":"2016","unstructured":"Miltiadis Allamanis, Hao Peng, and Charles Sutton. 2016. CodeNN: Neural code representation learning for code summarization. In Proceedings of the 40th International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_1_8_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Alon Uri","year":"2018","unstructured":"Uri Alon, Shaked Brody, Omer Levy, and Eran Yahav. 2018. code2seq: Generating sequences from structured representations of code. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_1_9_2","unstructured":"Anonymous. 2023. SmartBT Dataset. Retrieved July 28 2023 from https:\/\/figshare.com\/s\/e5f3f9371ca67a63c122"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3457337.3457841"},{"key":"e_1_3_1_11_2","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv:1409.0473. Retrieved from https:\/\/arxiv.org\/abs\/1409.0473"},{"issue":"2","key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10515-024-00459-4","article-title":"Angels or demons: Investigating and detecting decentralized financial traps on ethereum smart contracts","volume":"31","author":"Chen Jiachi","year":"2024","unstructured":"Jiachi Chen, Jiang Hu, Xin Xia, David Lo, John Grundy, Zhipeng Gao, and Ting Chen. 2024. Angels or demons: Investigating and detecting decentralized financial traps on ethereum smart contracts. Automated Software Engineering 31, 2 (2024), 63.","journal-title":"Automated Software Engineering"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488245"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3054928"},{"key":"e_1_3_1_15_2","first-page":"3765","volume-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","author":"Dai Zhenlong","year":"2024","unstructured":"Zhenlong Dai, Chang Yao, WenKang Han, Yuanying Yuanying, Zhipeng Gao, and Jingyuan Chen. 2024. MPCoder: Multi-user personalized code generator with explicit and implicit style representation learning. In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 3765\u20133780."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418918"},{"key":"e_1_3_1_17_2","first-page":"394","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Gao Zhipeng","year":"2019","unstructured":"Zhipeng Gao, Vinoj Jayasundara, Lingxiao Jiang, Xin Xia, David Lo, and John Grundy. 2019. Smartembed: A tool for clone and bug detection in smart contracts through structural code embedding. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 394\u2013397."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2971482"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3401026"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3412845"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3550150"},{"key":"e_1_3_1_22_2","first-page":"1176","volume-title":"Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Grech Neville","year":"2019","unstructured":"Neville Grech, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. 2019. Gigahorse: Thorough, declarative decompilation of smart contracts. In Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 1176\u20131186."},{"key":"e_1_3_1_23_2","first-page":"1","volume-title":"Proceedings of the ACM on Programming Languages","volume":"6","author":"Grech Neville","year":"2022","unstructured":"Neville Grech, Sifis Lagouvardos, Ilias Tsatiris, and Yannis Smaragdakis. 2022. Elipmoc: Advanced decompilation of ethereum smart contracts. Proceedings of the ACM on Programming Languages 6, OOPSLA1 (2022), 1\u201327."},{"key":"e_1_3_1_24_2","unstructured":"Jiatao Gu Zhengdong Lu Hang Li and Victor OK Li. 2016. Incorporating copying mechanism in sequence-to-sequence learning. Retrieved from https:\/\/aclanthology.org\/P16-1154"},{"key":"e_1_3_1_25_2","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP)","author":"Gu Xiaodong","year":"2020","unstructured":"Xiaodong Gu, Kelvin Guu, and Geoffrey Hinton. 2020. CodeBERT: A pre-trained model for programming and natural languages. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP)."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_1_27_2","unstructured":"Daya Guo Shuo Ren Shuai Lu Zhangyin Feng Duyu Tang Shujie Liu Long Zhou Nan Duan Alexey Svyatkovskiy Shengyu Fu et al. 2020. Graphcodebert: Pre-training code representations with data flow. arXiv:2009.08366."},{"key":"e_1_3_1_28_2","unstructured":"Taicheng Guo Kehan Guo Bozhao Nan Zhenwen Liang Zhichun Guo Nitesh V. Chawla Olaf Wiest and Xiangliang Zhang. 2023. What can large language models do in chemistry? A comprehensive benchmark on eight tasks. Retrieved from https:\/\/dl.acm.org\/doi\/10.5555\/3666122.3668729"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.13"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678552"},{"key":"e_1_3_1_31_2","first-page":"200","volume-title":"Proceedings of the IEEE\/ACM 26th International Conference on Program Comprehension (ICPC)","author":"Hu Xing","year":"2018","unstructured":"Xing Hu, Ge Li, Xin Xia, David Lo, and Zhi Jin. 2018. Deep code comment generation. In Proceedings of the IEEE\/ACM 26th International Conference on Program Comprehension (ICPC). IEEE, 200\u201320010."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09730-9"},{"issue":"1","key":"e_1_3_1_33_2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10515-022-00374-6","article-title":"BCGen: A comment generation method for bytecode","volume":"30","author":"Huang Yuan","year":"2023","unstructured":"Yuan Huang, Jinbo Huang, Xiangping Chen, Kunning He, and Xiaocong Zhou. 2023. BCGen: A comment generation method for bytecode. Automated Software Engineering 30, 1 (2023), 5.","journal-title":"Automated Software Engineering"},{"key":"e_1_3_1_34_2","first-page":"2073","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics 2016","author":"Iyer Srinivasan","year":"2016","unstructured":"Srinivasan Iyer, Ioannis Konstas, Alvin Cheung, and Luke Zettlemoyer. 2016. Summarizing source code using a neural attention model. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics 2016. ACL, 2073\u20132083."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155583"},{"key":"e_1_3_1_36_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09852-5"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"e_1_3_1_39_2","first-page":"273","volume-title":"Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)","author":"Li Xiaoqi","year":"2020","unstructured":"Xiaoqi Li, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, and Zhou Xu. 2020. Stan: Towards describing bytecodes of smart contract. In Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 273\u2013284."},{"key":"e_1_3_1_40_2","first-page":"74","volume-title":"Proceedings of the International Conference on Text summarization Branches Out","author":"Lin Chin-Yew","year":"2004","unstructured":"Chin-Yew Lin. 2004. Rouge: A package for automatic evaluation of summaries. In Proceedings of the International Conference on Text summarization Branches Out. ACL, 74\u201381."},{"key":"e_1_3_1_41_2","first-page":"2355","volume-title":"Proceedings of the ACM on Software Engineering","volume":"1","author":"Mai Yubo","year":"2024","unstructured":"Yubo Mai, Zhipeng Gao, Xing Hu, Lingfeng Bao, Yu Liu, and JianLing Sun. 2024. Are human rules necessary? Generating reusable APIs with CoT reasoning and in-context learning. Proceedings of the ACM on Software Engineering 1, FSE (2024), 2355\u20132377."},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465386"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613830"},{"key":"e_1_3_1_44_2","first-page":"311","volume-title":"Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics","author":"Papineni Kishore","year":"2002","unstructured":"Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. 2002. Bleu: A method for automatic evaluation of machine translation. In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, 311\u2013318."},{"issue":"12","key":"e_1_3_1_45_2","first-page":"5068","article-title":"Deep just-in-time defect localization","volume":"48","author":"Qiu Fangcheng","year":"2021","unstructured":"Fangcheng Qiu, Zhipeng Gao, Xin Xia, David Lo, John Grundy, and Xinyu Wang. 2021. Deep just-in-time defect localization. IEEE Transactions on Software Engineering 48, 12 (2021), 5068\u20135086.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.5555\/3455716.3455856"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1561\/1500000019"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_3_1_49_2","first-page":"11","volume-title":"Proceedings of the International Conference on PoEM Workshops","author":"Sezer Selin","year":"2020","unstructured":"Selin Sezer, Clemens Eyhoff, Wolfgang Prinz, and Thomas Rose. 2020. Exploiting smart contract bytecode for classification on ethereum. In Proceedings of the International Conference on PoEM Workshops, 11\u201322."},{"key":"e_1_3_1_50_2","unstructured":"Chaochen Shi Yong Xiang Jiangshan Yu and Longxiang Gao. 2021. Semantic code search for smart contracts. arXiv:2111.14139. Retrieved from https:\/\/arxiv.org\/abs\/2111.14139"},{"key":"e_1_3_1_51_2","first-page":"1046","volume-title":"Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"Shi Chaochen","year":"2022","unstructured":"Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, and Robin Ram Mohan Doss. 2022. A bytecode-based approach for smart contract classification. In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 1046\u20131054."},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107065"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859006"},{"issue":"11","key":"e_1_3_1_54_2","first-page":"1","article-title":"Porosity: A decompiler for blockchain-based smart contracts bytecode","volume":"25","author":"Suiche Matt","year":"2017","unstructured":"Matt Suiche. 2017. Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF CON 25, 11 (2017), 1\u201329.","journal-title":"DEF CON"},{"issue":"2","key":"e_1_3_1_55_2","first-page":"28","article-title":"Smart contracts: Building blocks for digital markets","volume":"18","author":"Szabo Nick","year":"1996","unstructured":"Nick Szabo. 1996. Smart contracts: Building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought 18, 2 (1996), 28.","journal-title":"EXTROPY: The Journal of Transhumanist Thought"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"e_1_3_1_57_2","unstructured":"Zhaopeng Tu Zhengdong Lu Yang Liu Xiaohua Liu and Hang Li. 2016. Modeling coverage for neural machine translation. Retrieved from https:\/\/aclanthology.org\/P16-1008"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238206"},{"issue":"6","key":"e_1_3_1_60_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3664811","article-title":"What makes a good TODO comment?","volume":"33","author":"Wang Haoye","year":"2024","unstructured":"Haoye Wang, Zhipeng Gao, Tingting Bi, John Grundy, Xinyu Wang, Minghui Wu, and Xiaohu Yang. 2024. What makes a good TODO comment? ACM Transactions on Software Engineering and Methodology 33, 6 (2024), 1\u201330.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Yilin Wang Xiangping Chen Yuan Huang Hao-Nan Zhu and Jing Bian. 2022. An empirical study on real bug fixes in smart contracts projects. Retrieved from https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0164121223001826","DOI":"10.2139\/ssrn.4250240"},{"key":"e_1_3_1_62_2","doi-asserted-by":"crossref","unstructured":"Yue Wang Weishi Wang Shafiq Joty and Steven C. H. Hoi. 2021. Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. Retrieved from https:\/\/aclanthology.org\/2021.emnlp-main.685","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"e_1_3_1_63_2","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Wei Bolin","year":"2020","unstructured":"Bolin Wei, Yongmin Li, Ge Li, Xin Xia, David Lo, and Zhi Jin. 2020. Retrieve and refine: Exemplar-based neural comment generation. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE."},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081848"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693113"},{"issue":"2014","key":"e_1_3_1_66_2","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 2014 (2014), 1\u201332.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680368"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00096"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107858"},{"key":"e_1_3_1_70_2","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (ACL)","author":"Yin Pengcheng","year":"2019","unstructured":"Pengcheng Yin, Graham Neubig, Satoshi Sekine, and Katsuhito Sudoh. 2019. Code summarization with a semantic role-based attention mechanism. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (ACL)."},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3402450"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040597"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3699597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:52Z","timestamp":1750295392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,23]]},"references-count":71,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3699597"],"URL":"https:\/\/doi.org\/10.1145\/3699597","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,23]]},"assertion":[{"value":"2023-11-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}