{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:24Z","timestamp":1750309524182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3702359.3702361","type":"proceedings-article","created":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T07:43:51Z","timestamp":1737186231000},"page":"10-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Smart Contract Security on VNT Blockchain with an Advanced Graph Neural Network Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2428-7977","authenticated-orcid":false,"given":"Bang","family":"Pan","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Information Engineering University, Zhengzhou, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6464-025X","authenticated-orcid":false,"given":"Chenyu","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Information Engineering University, Zhengzhou, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6227-3702","authenticated-orcid":false,"given":"Yunchao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Information Engineering University, Zhengzhou, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1975-9107","authenticated-orcid":false,"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Information Engineering University, Zhengzhou, China,"}]}],"member":"320","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"A peer-to-peer electronic cash system,\" Decentralized business review","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto, \"Bitcoin: A peer-to-peer electronic cash system,\" Decentralized business review, 2008."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13020770"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00459-x"},{"key":"e_1_3_3_1_4_2","volume-title":"ESCORT: ethereum smart contracts vulnerability detection using deep neural network and transfer learning,\" arXiv preprint arXiv:2103.12607","author":"Lutz O.","year":"2021","unstructured":"O. Lutz et al., \"ESCORT: ethereum smart contracts vulnerability detection using deep neural network and transfer learning,\" arXiv preprint arXiv:2103.12607, 2021."},{"key":"e_1_3_3_1_5_2","volume-title":"A smart contract vulnerability detection mechanism based on deep learning and expert rules,\" IEEE Access","author":"Liu Z.","year":"2023","unstructured":"Z. Liu, M. Jiang, S. Zhang, J. Zhang, and Y. Liu, \"A smart contract vulnerability detection mechanism based on deep learning and expert rules,\" IEEE Access, 2023."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22051829"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22093577"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12102327"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/math11234823"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111705"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108766"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685883"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000810"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102740"},{"key":"e_1_3_3_1_15_2","first-page":"2901","article-title":"Jira: Joint incentive design and resource allocation for edge based real-time video streaming systems","volume":"2022","author":"Yuan S.","year":"2022","unstructured":"S. Yuan, J. Li, H. Chen, Z. Han, C. Wu, and Y. Zhang, \u201cJira: Joint incentive design and resource allocation for edge based real-time video streaming systems,\u201d IEEE Transactions on Wireless Communications, 2022, 2022, 22(5): 2901-2916.","journal-title":"IEEE Transactions on Wireless Communications"},{"volume-title":"Tradefl: A trading mechanism for cross-silo federated learning[C]\u3000\/\/2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS)","year":"2023","key":"e_1_3_3_1_16_2","unstructured":"Yuan S, Lv H, Liu H, et al. Tradefl: A trading mechanism for cross-silo federated learning[C]\u3000\/\/2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS). IEEE, 2023: 920-930."},{"volume-title":"Dcvp: Distributed collaborative video stream processing in edge computing[C]\/\/2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)","year":"2020","key":"e_1_3_3_1_17_2","unstructured":"Yuan S, Li J, Wu C, et al. Dcvp: Distributed collaborative video stream processing in edge computing[C]\/\/2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2020: 625-632."},{"key":"e_1_3_3_1_18_2","first-page":"1","volume-title":"IEEE International Conference on Communications (ICC)","author":"Wang Y.","year":"2024","unstructured":"Y. Wang, J. Lou, et al., \u201cOnline Data Trading for Cloud-Edge Collaboration Architecture\u201d, IEEE International Conference on Communications (ICC), 9-13 June, 2024, pp. 1-6."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Lu X et al. Toward real-time pricing and allocation for surplus resources in electric bus charging stations[J]. IEEE Transactions on Intelligent Transportation Systems 2023.","DOI":"10.1109\/TITS.2023.3314648"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Zeng H Li J Lou J et al. BSR-FL: An Efficient Byzantine-Robust Privacy-Preserving Federated Learning Framework[J]. IEEE Transactions on Computers 2024.","DOI":"10.1109\/TC.2024.3404102"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622991"},{"volume-title":"Zero-shot scene graph generation with knowledge graph completion[C]\/\/2022 IEEE International Conference on Multimedia and Expo (ICME)","year":"2022","key":"e_1_3_3_1_22_2","unstructured":"Yu X, Chen R, et al. Zero-shot scene graph generation with knowledge graph completion[C]\/\/2022 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2022: 1-6."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956712"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3437745"},{"volume-title":"Adaptive Processing for Video Streaming with Energy Constraint: A Multi-Agent Reinforcement Learning Method[C]\/\/2023 IEEE Global Communications Conference (GLOBECOM)","year":"2023","key":"e_1_3_3_1_25_2","unstructured":"Liu H, Fu H, et al. Adaptive Processing for Video Streaming with Energy Constraint: A Multi-Agent Reinforcement Learning Method[C]\/\/2023 IEEE Global Communications Conference (GLOBECOM). IEEE, 2023: 122-127."},{"issue":"2","key":"e_1_3_3_1_26_2","first-page":"173","article-title":"Data in the Legal System Background","volume":"26","year":"2024","unstructured":"Dongdong Li, Research on Blockchain Technology for Security Protection of Network Information Data in the Legal System Background, International Journal of Network Security, Vol. 26, No. 2, 2024, pp. 173-179.","journal-title":"International Journal of Network Security"}],"event":{"name":"AIBC '24: 2024 5th International Artificial Intelligence and Blockchain Conference","acronym":"AIBC '24","location":"Tokyo Japan"},"container-title":["Proceedings of the 2024 5th International Artificial Intelligence and Blockchain Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702361","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702359.3702361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:09Z","timestamp":1750295889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":26,"alternative-id":["10.1145\/3702359.3702361","10.1145\/3702359"],"URL":"https:\/\/doi.org\/10.1145\/3702359.3702361","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2025-01-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}