{"id":"https://openalex.org/W4414165891","doi":"https://doi.org/10.1109/tdsc.2025.3607471","title":"Pruning Attention Heads Based on Semantic and Code Structure for Smart Contract Vulnerability Detection","display_name":"Pruning Attention Heads Based on Semantic and Code Structure for Smart Contract Vulnerability Detection","publication_year":2025,"publication_date":"2025-09-09","ids":{"openalex":"https://openalex.org/W4414165891","doi":"https://doi.org/10.1109/tdsc.2025.3607471"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3607471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3607471","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102816667","display_name":"Siyu Jiang","orcid":"https://orcid.org/0000-0002-1969-807X"},"institutions":[{"id":"https://openalex.org/I186272606","display_name":"Guangdong University of Foreign Studies","ror":"https://ror.org/00fhc9y79","country_code":"CN","type":"education","lineage":["https://openalex.org/I186272606"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyu Jiang","raw_affiliation_strings":["Guangdong University of Foreign Studies, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Foreign Studies, Guangzhou, China","institution_ids":["https://openalex.org/I186272606"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102898766","display_name":"Yuwen Chen","orcid":"https://orcid.org/0009-0003-7437-2886"},"institutions":[{"id":"https://openalex.org/I186272606","display_name":"Guangdong University of Foreign Studies","ror":"https://ror.org/00fhc9y79","country_code":"CN","type":"education","lineage":["https://openalex.org/I186272606"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwen Chen","raw_affiliation_strings":["Guangdong University of Foreign Studies, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Foreign Studies, Guangzhou, China","institution_ids":["https://openalex.org/I186272606"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027623309","display_name":"Teng Ouyang","orcid":"https://orcid.org/0009-0000-3306-5618"},"institutions":[{"id":"https://openalex.org/I186272606","display_name":"Guangdong University of Foreign Studies","ror":"https://ror.org/00fhc9y79","country_code":"CN","type":"education","lineage":["https://openalex.org/I186272606"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Teng Ouyang","raw_affiliation_strings":["Guangdong University of Foreign Studies, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Foreign Studies, Guangzhou, China","institution_ids":["https://openalex.org/I186272606"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107936913","display_name":"Xue Zhang","orcid":"https://orcid.org/0009-0001-9537-6363"},"institutions":[{"id":"https://openalex.org/I186272606","display_name":"Guangdong University of Foreign Studies","ror":"https://ror.org/00fhc9y79","country_code":"CN","type":"education","lineage":["https://openalex.org/I186272606"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Zhang","raw_affiliation_strings":["Guangdong University of Foreign Studies, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Foreign Studies, Guangzhou, China","institution_ids":["https://openalex.org/I186272606"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037817436","display_name":"Shen Su","orcid":"https://orcid.org/0000-0003-2744-3584"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Su","raw_affiliation_strings":["Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102816667"],"corresponding_institution_ids":["https://openalex.org/I186272606"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37184249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"462","last_page":"476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.934499979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.934499979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9032999873161316,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7279999852180481},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.6765999794006348},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5733000040054321},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4952000081539154},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4787999987602234},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4223000109195709},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.3864000141620636},{"id":"https://openalex.org/keywords/codebase","display_name":"Codebase","score":0.3472000062465668},{"id":"https://openalex.org/keywords/semantic-data-model","display_name":"Semantic data model","score":0.3456000089645386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8752999901771545},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7279999852180481},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.6765999794006348},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5733000040054321},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5293999910354614},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5266000032424927},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4952000081539154},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4787999987602234},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4223000109195709},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.3864000141620636},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.3472000062465668},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3456999957561493},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.3456000089645386},{"id":"https://openalex.org/C2775955345","wikidata":"https://www.wikidata.org/wiki/Q7449071","display_name":"Semantic mapping","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.33880001306533813},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3206000030040741},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3158000111579895},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3005000054836273},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.28780001401901245},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2732999920845032},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.27160000801086426},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3607471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3607471","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1969344535","https://openalex.org/W2131774270","https://openalex.org/W2148143831","https://openalex.org/W2470673105","https://openalex.org/W2539190473","https://openalex.org/W2748264495","https://openalex.org/W2795144752","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2908007588","https://openalex.org/W2946794439","https://openalex.org/W2964150020","https://openalex.org/W2964199361","https://openalex.org/W2969818713","https://openalex.org/W2970809537","https://openalex.org/W3001458527","https://openalex.org/W3003036212","https://openalex.org/W3005065812","https://openalex.org/W3035281298","https://openalex.org/W3035733952","https://openalex.org/W3098605233","https://openalex.org/W3103754749","https://openalex.org/W3121385022","https://openalex.org/W3152918650","https://openalex.org/W3171155106","https://openalex.org/W3174173633","https://openalex.org/W3182763642","https://openalex.org/W3198685994","https://openalex.org/W4211181447","https://openalex.org/W4212974603","https://openalex.org/W4221061332","https://openalex.org/W4296442576","https://openalex.org/W4316661173","https://openalex.org/W4320235690","https://openalex.org/W4360603904","https://openalex.org/W4366124391","https://openalex.org/W4366809066","https://openalex.org/W4367047249","https://openalex.org/W4376278349","https://openalex.org/W4385245566","https://openalex.org/W4385986584","https://openalex.org/W4387412812","https://openalex.org/W4389438938","https://openalex.org/W4392357044","https://openalex.org/W4393307116","https://openalex.org/W4394769342","https://openalex.org/W4404060141"],"related_works":[],"abstract_inverted_index":{"Along":[0],"with":[1],"the":[2,10,61,70,119,143,160,182,193],"sustained":[3],"occurrence":[4],"of":[5,63,121,165],"black":[6],"swan":[7],"events":[8],"in":[9,69],"decentralized":[11],"application":[12],"ecosystem,":[13],"smart":[14],"contract":[15],"security":[16],"is":[17],"a":[18,85,107,152],"growing":[19],"concern.":[20],"Traditional":[21],"solutions":[22],"mainly":[23],"rely":[24],"on":[25,41,93,187],"predefined":[26],"rules,":[27],"while":[28,141],"highly":[29],"accurate,":[30],"require":[31],"intensive":[32],"manual":[33],"code":[34,51,139],"analysis.":[35],"Machine":[36],"learning":[37],"methods":[38],"(mainly":[39],"based":[40,92],"BERT)":[42],"leverage":[43],"semantic":[44,161],"and":[45,78,95,127,162,176],"contextual":[46],"information,":[47],"but":[48],"overlook":[49],"crucial":[50],"structure":[52,140],"features,":[53],"which":[54,117],"are":[55],"critical":[56],"for":[57,99,171],"identifying":[58],"vulnerability.":[59],"Furthermore,":[60],"presence":[62],"useless":[64],"or":[65],"harmful":[66],"attention":[67,90,173],"heads":[68],"BERT":[71,183],"model":[72],"leads":[73],"to":[74,136,145,155,159],"less":[75],"robust":[76],"predictions":[77],"slows":[79],"down":[80],"processing":[81],"speeds.":[82],"We":[83],"propose":[84],"novel":[86],"method":[87,195],"named":[88],"Pruning":[89],"Heads":[91],"Semantic":[94],"Code":[96],"Structure":[97],"(PHSCS)":[98],"Smart":[100],"Contract":[101],"Vulnerability":[102],"Detection.":[103],"Specifically,":[104],"we":[105,150],"introduce":[106],"new":[108],"structure-aware":[109],"pre-training":[110],"programming":[111],"language":[112],"task,":[113],"Variable":[114],"Edge":[115],"Prediction,":[116],"bypasses":[118],"use":[120],"data":[122,130],"flow":[123,131],"nodes":[124],"as":[125],"input":[126],"directly":[128],"predicts":[129],"edges":[132],"between":[133],"variables,":[134],"aiming":[135],"efficiently":[137],"learn":[138],"ensuring":[142],"ability":[144],"process":[146],"extensive":[147],"code.":[148,166],"Additionally,":[149],"present":[151],"pruning":[153],"strategy":[154],"optimize":[156],"BERT,":[157],"tailored":[158],"structural":[163],"peculiarities":[164],"By":[167],"employing":[168],"Taylor":[169],"Expansion":[170],"evaluating":[172],"heads'":[174],"significance":[175],"guiding":[177],"their":[178],"pruning,":[179],"iteratively":[180],"refined":[181],"model.":[184],"Experiment":[185],"results":[186],"8":[188],"vulnerability":[189],"types":[190],"illustrate":[191],"that":[192],"PHSCS":[194],"surpasses":[196],"state-of-the-art":[197],"methods.":[198]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
