{"id":"https://openalex.org/W4416249808","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227855","title":"A Heterogeneous Graph and Multi-Feature Fusion Based Framework for Smart Contract Vulnerability Detection","display_name":"A Heterogeneous Graph and Multi-Feature Fusion Based Framework for Smart Contract Vulnerability Detection","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416249808","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227855"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080779869","display_name":"Bing Xue","orcid":"https://orcid.org/0000-0002-7790-1216"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Xue","raw_affiliation_strings":["Inner Mongolia University,College of Computer Science,Hohhot,China"],"affiliations":[{"raw_affiliation_string":"Inner Mongolia University,College of Computer Science,Hohhot,China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433258","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0003-1965-7224"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Inner Mongolia University,College of Computer Science,Hohhot,China"],"affiliations":[{"raw_affiliation_string":"Inner Mongolia University,College of Computer Science,Hohhot,China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051299829","display_name":"Zhongwei An","orcid":"https://orcid.org/0000-0003-0164-3836"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongwei An","raw_affiliation_strings":["Inner Mongolia University,College of Computer Science,Hohhot,China"],"affiliations":[{"raw_affiliation_string":"Inner Mongolia University,College of Computer Science,Hohhot,China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114245326","display_name":"Zhaoxiong Song","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoxiong Song","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023468553","display_name":"Linpeng Jia","orcid":"https://orcid.org/0000-0003-1916-6193"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linpeng Jia","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117233230","display_name":"Zhi Yu","orcid":"https://orcid.org/0009-0001-8608-5628"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Yu","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security,Hangzhou,China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080779869"],"corresponding_institution_ids":["https://openalex.org/I2722730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47391518,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.1526000052690506,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.1526000052690506,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.13189999759197235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.10740000009536743,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7846999764442444},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4948999881744385},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.460999995470047},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4397999942302704},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4350999891757965},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.37790000438690186},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3659999966621399},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.3156000077724457}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7846999764442444},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7807000279426575},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4948999881744385},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.460999995470047},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4397999942302704},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4350999891757965},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.37790000438690186},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3741999864578247},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3659999966621399},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35850000381469727},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3172000050544739},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.304500013589859},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.3043000102043152},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.2676999866962433},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26409998536109924},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322927","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W103340358","https://openalex.org/W1888005072","https://openalex.org/W2539190473","https://openalex.org/W2743104969","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2885034081","https://openalex.org/W2911286998","https://openalex.org/W2962756421","https://openalex.org/W2970809537","https://openalex.org/W2999378142","https://openalex.org/W3026203297","https://openalex.org/W3035733952","https://openalex.org/W3135300972","https://openalex.org/W3168547639","https://openalex.org/W3182763642","https://openalex.org/W4211181447","https://openalex.org/W4214700769","https://openalex.org/W4319587111","https://openalex.org/W4392714975"],"related_works":[],"abstract_inverted_index":{"In":[0,91],"recent":[1],"years,":[2],"graph":[3],"neural":[4],"networks":[5],"have":[6,15],"demonstrated":[7],"strong":[8],"capabilities":[9],"in":[10,19,177],"processing":[11],"graph-structured":[12],"data":[13],"and":[14,60,99,107,127],"made":[16],"significant":[17],"progress":[18],"the":[20,48,57,65,74,109,112,141,152,171,181],"field":[21],"of":[22,51,64,111,143,165,173],"smart":[23,35,53,144],"contract":[24,36,45,145],"vulnerability":[25,37,146],"detection.":[26,38],"This":[27],"paper":[28],"introduces":[29],"HF-Sec,":[30],"a":[31,70,119,163],"novel":[32],"framework":[33,40,75],"for":[34],"The":[39,132],"first":[41],"automatically":[42,103],"generates":[43],"heterogeneous":[44],"graphs":[46],"from":[47,81,88],"source":[49],"code":[50],"Ethereum":[52],"contracts":[54,124,129],"to":[55,78,84,102,179],"represent":[56],"control":[58],"flow":[59],"function":[61],"call":[62],"relationships":[63],"code.":[66],"Then,":[67],"by":[68],"using":[69],"multi-source":[71],"attention":[72],"mechanism,":[73],"is":[76,149],"able":[77],"synthesize":[79],"features":[80],"different":[82],"sources":[83],"capture":[85],"key":[86,175],"information":[87],"multiple":[89],"perspectives.":[90],"addition,":[92],"HF-Sec":[93,137,178],"utilizes":[94],"Fast":[95],"Graph":[96],"Transformer":[97],"Networks":[98,101],"Kolmogorov-Arnold":[100],"extract":[104],"mission-critical":[105],"meta-paths":[106],"enhance":[108],"interpretability":[110],"model.":[113],"We":[114],"performed":[115],"experimental":[116,133],"validation":[117],"on":[118,155],"mixed":[120],"dataset":[121],"containing":[122],"423":[123],"with":[125],"vulnerabilities":[126],"2742":[128],"without":[130],"vulnerabilities.":[131],"results":[134],"show":[135],"that":[136],"can":[138],"significantly":[139],"improve":[140,180],"accuracy":[142],"detection,":[147],"which":[148],"better":[150],"than":[151],"methods":[153],"based":[154],"machine":[156],"learning":[157],"or":[158],"traditional":[159],"analysis":[160],"techniques.":[161],"Through":[162],"series":[164],"ablation":[166],"experiments,":[167],"we":[168],"further":[169],"verified":[170],"importance":[172],"various":[174],"components":[176],"detection":[182],"accuracy.":[183]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
