{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:03:22Z","timestamp":1775545402455,"version":"3.50.1"},"reference-count":44,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061185","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T03:56:26Z","timestamp":1741578986000},"page":"785-801","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis"],"prefix":"10.32604","volume":"83","author":[{"given":"Ra-Yeon","family":"Choi","sequence":"first","affiliation":[]},{"given":"Yeji","family":"Song","sequence":"additional","affiliation":[]},{"given":"Minsoo","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Taekyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jinhyun","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Dong-Hyuk","family":"Im","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Network and Distributed Systems Security (NDSS) Symposium","first-page":"1","article-title":"ZEUS: analyzing safety of smart contracts","author":"Kalra","year":"2018 Feb 18\u201321"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"Yaga D, Mell P, Roby N, Scarfone K. Blockchain technology overview. arXiv:1906.11078. 2019.","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","article-title":"Untangling blockchain: a data processing view of blockchain systems","volume":"30","author":"Dinh","year":"2018","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref4","first-page":"41","article-title":"Patient-aware information-hiding mechanism for a blockchain-based electronic health record system","volume":"14","author":"Wang","year":"2024","journal-title":"Humcentric Comput Inf Sci"},{"key":"ref5","first-page":"37","article-title":"Blockchain-driven privacy preserving electronic health records analysis using sine cosine algorithm with deep learning model","volume":"14","author":"Ragab","year":"2024","journal-title":"Humcentric Comput Inf Sci"},{"key":"ref6","unstructured":"Paganini P. Uniswap and Lendf.me hacked, attacker stole $25 million worth of cryptocurrency. [cited 2020 Apr 20]. Available from: https:\/\/securityaffairs.com\/101895\/cyber-crime\/uniswap-lendf-me-hacked.html."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1007\/s12083-021-01088-4","article-title":"A secure peer to peer multiparty transaction scheme based on blockchain","volume":"14","author":"Hong","year":"2021","journal-title":"Peer Peer Netw Appl"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"155014771984272","DOI":"10.1177\/1550147719842725","article-title":"Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain","volume":"15","author":"Hong","year":"2019","journal-title":"Int J Distrib Sens Netw"},{"key":"ref9","series-title":"2018 Network and Distributed System Security Symposium (NDSS\u201918)","first-page":"1","article-title":"VulDeePecker: a deep learning-based system for vulnerability detection","author":"Li","year":"2018 Feb 18\u201321"},{"key":"ref10","series-title":"2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)","first-page":"757","article-title":"Automated vulnerability detection in source code using deep representation learning","author":"Russell","year":"2018 Dec 17\u201320"},{"key":"ref11","series-title":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"69","article-title":"VulDeBERT: a vulnerability detection system using BERT","author":"Kim","year":"2022 Oct 31\u2013Nov 3"},{"key":"ref12","series-title":"2021 IEEE\/ACM 29th International Conference on Program Comprehension (ICPC)","first-page":"127","article-title":"EtherSolve: computing an accurate control-flow graph from ethereum bytecode","author":"Contro","year":"2021 May 20\u201321"},{"key":"ref13","series-title":"International Symposium on Automated Technology for Verification and Analysis","first-page":"513","article-title":"EthIR: A framework for high-level analysis of ethereum bytecode","author":"Albert","year":"2018 Oct 7\u201312"},{"key":"ref14","first-page":"1296","article-title":"Combining graph neural networks with expert knowledge for smart contract vulnerability detection","volume":"35","author":"Liu","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref15","series-title":"Advances in Neural Information Processing Systems (NIPS)","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","author":"Zhou","year":"2019 Dec 8\u201314"},{"key":"ref16","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Learning to represent programs with graphs","author":"Allamanis","year":"2018 Apr 30\u2013May 3"},{"key":"ref17","series-title":"2019 Network and Distributed System Security Symposium (NDSS\u201919)","first-page":"1","article-title":"Neuro-symbolic execution: augmenting symbolic execution with neural constraints","author":"Shen","year":"2019 Feb 24\u201327"},{"key":"ref18","series-title":"IEEE International Conference on Information Networking (ICOIN)","first-page":"57","article-title":"GNN-based ethereum smart contract multi-label vulnerability detection","author":"Cheong","year":"2024 Jan 17\u201319"},{"key":"ref19","first-page":"15","article-title":"A privacy-preserving local differential privacy-based federated learning model to secure LLM from adversarial attacks","volume":"14","author":"Salim","year":"2024","journal-title":"Humcentric Comput Inf Sci"},{"key":"ref20","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref21","series-title":"5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","first-page":"297","article-title":"Large language model-powered smart contract vulnerability detection: new perspectives","author":"Hu","year":"2023 Nov 1\u20134"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"Yu L, Chen S, Yuan H, Wang P, Huang Z, Zhang J, et al. Smart-LLaMA: two-stage post-training of large language models for smart contract vulnerability detection and explanation. arXiv:2411.06221. 2024.","DOI":"10.1145\/3728878"},{"key":"ref23","unstructured":"He Z, Li Z, Yang S, Qiao A, Zhang X, Luo X, et al. Large language models for blockchain security: a systematic literature review. arXiv:2403.14280. 2024."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1051\/wujns\/2023283237","article-title":"Fine-tuning pre-trained CodeBERT for code search in smart contract","volume":"28","author":"Jin","year":"2023","journal-title":"Wuhan Univ J Nat Sci"},{"key":"ref25","series-title":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","first-page":"1","article-title":"The advantages and disadvantages of the blockchain technology","author":"Golosova","year":"2018 Nov 8\u201310"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: a survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int J Web Grid Serv"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","article-title":"An overview on smart contracts: challenges, advances and platforms","volume":"105","author":"Zheng","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5210\/fm.v2i9.548","article-title":"Formalizing and securing relationships on public networks","volume":"2","author":"Szabo","year":"1997","journal-title":"First Monday"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"24416","DOI":"10.1109\/ACCESS.2020.2970495","article-title":"Smart contract: attacks and protections","volume":"8","author":"Sayeed","year":"2020","journal-title":"IEEE Access"},{"key":"ref30","unstructured":"Ethereum. Solidity documentation. [cited 2020 Jul 2]. Available from: https:\/\/solidity.readthedocs.io\/."},{"key":"ref31","unstructured":"Wood G. A secure decentralised generalised transaction ledger. Ethereum project yellow paper. [cited 2025 Jan 1]. Available from: https:\/\/cryptodeep.ru\/doc\/paper.pdf."},{"key":"ref32","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS)","first-page":"254","article-title":"Making smart contracts smarter","author":"Luu","year":"2016 Oct 24\u201328"},{"key":"ref33","unstructured":"Pro S. Smart contract security issues: What are smart contract vulnerabilities how to protect. [cited 2019 Apr 21]. Available from: https:\/\/smartym.pro\/blog\/smart-contract-security-issues-smart-contract-vulnerabilities-and-how-to-protect\/."},{"key":"ref34","series-title":"2006 13th Working Conference on Reverse Engineering (WCRE)","first-page":"253","article-title":"Clone detection using abstract syntax suffix trees","author":"Koschke","year":"2006 Oct 23\u201327"},{"key":"ref35","series-title":"IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)","first-page":"45","article-title":"Convolutional neural networks over control flow graphs for software defect prediction","author":"Phan","year":"2017 Nov 6\u20138"},{"key":"ref36","unstructured":"Brent L, Jurisevic A, Kong M, Liu E, Gauthier F, Gramoli V, et al. Vandal: a scalable security analysis framework for smart contracts. arXiv:1809.03981. 2018."},{"key":"ref37","first-page":"012120","article-title":"The implementation of cosine similarity to calculate text relevance between two documents","volume":"978","author":"Gunawan","year":"2018","journal-title":"J Phys: Conf Ser"},{"key":"ref38","series-title":"2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)","first-page":"378","article-title":"Peculiar: smart contract vulnerability detection based on crucial data flow graph and pre-training techniques","author":"Wu","year":"2021 Oct 25\u201328"},{"key":"ref39","series-title":"Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","first-page":"528","article-title":"Unsupervised learning of sentence embeddings using compositionaln-gram features","author":"Pagliardini","year":"2018 Jun 1\u20136"},{"key":"ref40","series-title":"2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","first-page":"2365","article-title":"VulCNN: an image-inspired scalable vulnerability detection system","author":"Wu","year":"2022 May 25\u201327"},{"key":"ref41","first-page":"852","author":"Choi","year":"2024","journal-title":"Image based smart contract flow graphs for vulnerability detection"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"Newman","year":"2003","journal-title":"SIAM Rev"},{"key":"ref43","unstructured":"Etherscan. [cited 2025 Jan 1]. Available from: https:\/\/etherscan.io."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TR.2023.3233999","article-title":"Detect defects of solidity smart contract based on the knowledge graph","volume":"73","author":"Hu","year":"2024","journal-title":"IEEE Trans Reliab"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_61185\/TSP_CMC_61185.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:35Z","timestamp":1763102375000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061185","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}