{"id":"https://openalex.org/W3199463718","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534324","title":"DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection","display_name":"DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection","publication_year":2021,"publication_date":"2021-07-18","ids":{"openalex":"https://openalex.org/W3199463718","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534324","mag":"3199463718"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn52387.2021.9534324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102981304","display_name":"Xingxin Yu","orcid":"https://orcid.org/0000-0001-8989-4407"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingxin Yu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036851295","display_name":"Haoyue Zhao","orcid":"https://orcid.org/0009-0001-5265-5872"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyue Zhao","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029334833","display_name":"Botao Hou","orcid":"https://orcid.org/0000-0001-8676-9889"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Botao Hou","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020945039","display_name":"Zonghao Ying","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zonghao Ying","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022894420","display_name":"Bin Wu","orcid":"https://orcid.org/0000-0002-8103-0468"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102981304"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":15.6473,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.99058389,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8040206432342529},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7820062637329102},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7140695452690125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6479061245918274},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6044853329658508},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5337655544281006},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5253738164901733},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49114248156547546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45371708273887634},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.412527859210968},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.41178175806999207},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39542871713638306},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1970755159854889}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8040206432342529},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7820062637329102},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7140695452690125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6479061245918274},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6044853329658508},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5337655544281006},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5253738164901733},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49114248156547546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45371708273887634},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.412527859210968},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.41178175806999207},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39542871713638306},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1970755159854889},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn52387.2021.9534324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1614298861","https://openalex.org/W1832693441","https://openalex.org/W1895577753","https://openalex.org/W1986347924","https://openalex.org/W2028806953","https://openalex.org/W2064675550","https://openalex.org/W2092483417","https://openalex.org/W2133564696","https://openalex.org/W2250539671","https://openalex.org/W2493916176","https://openalex.org/W2516120833","https://openalex.org/W2517194566","https://openalex.org/W2539190473","https://openalex.org/W2748264495","https://openalex.org/W2787648539","https://openalex.org/W2805052744","https://openalex.org/W2805827286","https://openalex.org/W2808815243","https://openalex.org/W2810375457","https://openalex.org/W2846896781","https://openalex.org/W2908007588","https://openalex.org/W2911557038","https://openalex.org/W2914811077","https://openalex.org/W2949557841","https://openalex.org/W2950577311","https://openalex.org/W2953384591","https://openalex.org/W2963610883","https://openalex.org/W2964308564","https://openalex.org/W2970809537","https://openalex.org/W3013972692","https://openalex.org/W3035733952","https://openalex.org/W3105187050","https://openalex.org/W3160877767","https://openalex.org/W4295327857","https://openalex.org/W6713134421","https://openalex.org/W6753224006","https://openalex.org/W6757822707"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2789975780"],"abstract_inverted_index":{"Security":[0],"attacks":[1],"in":[2,34,48,160],"smart":[3,23,49,59,102,114],"contracts":[4,103],"have":[5,54,72],"drawn":[6],"extensive":[7,165],"attention":[8],"due":[9],"to":[10,44,99,132,157],"the":[11,65,136,148,151],"financial":[12],"loss":[13],"and":[14,31,92,118,147],"erosion":[15],"of":[16,70,78,113,127,139,153],"trust":[17],"caused":[18],"by":[19],"vulnerabilities.":[20],"Even":[21],"worse,":[22],"contract":[24,50,60,115],"is":[25,36,40,85,97],"a":[26,90,124],"tamper":[27],"proof":[28],"digital":[29],"agreement":[30],"fixing":[32],"bugs":[33],"it":[35,39],"difficult,":[37],"so":[38],"necessary":[41],"for":[42],"developers":[43],"detect":[45,101],"security":[46],"vulnerabilities":[47],"before":[51],"deployment.":[52],"Researchers":[53],"proposed":[55,98,171],"several":[56],"methods":[57],"on":[58,81,110,144],"vulnerability":[61],"detection.":[62],"However,":[63],"despite":[64],"numerous":[66],"vulnerability-finding":[67],"tools,":[68],"few":[69],"them":[71,79],"ideal":[73],"detection":[74],"performance":[75],"because":[76],"most":[77],"rely":[80],"fixed":[82],"rules,":[83],"which":[84,155],"inefficient.":[86],"In":[87],"this":[88],"paper,":[89],"modularized":[91],"systematic":[93],"Deep":[94],"Learning-based":[95],"framework":[96,172],"automatically":[100],"vulnerability,":[104],"called":[105],"DeeSCVHunter.":[106],"Particularly,":[107],"we":[108,122],"focus":[109],"two":[111],"types":[112],"vulnerabilities:":[116],"reentrancy":[117],"time":[119],"dependence.":[120],"And":[121,164],"propose":[123],"novel":[125],"notion":[126],"Vulnerability":[128],"Candidate":[129],"Slice":[130],"(VCS)":[131],"help":[133],"models":[134],"capture":[135],"key":[137],"point":[138],"vulnerability.":[140],"We":[141],"conduct":[142],"experiments":[143,166],"real-world":[145],"dataset":[146],"results":[149],"prove":[150],"effectiveness":[152],"VCS,":[154],"leads":[156],"25.76%":[158],"improvement":[159],"F1-score":[161],"at":[162],"most.":[163],"also":[167],"show":[168],"that":[169],"our":[170],"significantly":[173],"outperforms":[174],"state-of-the-art":[175],"methods.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
