{"id":"https://openalex.org/W4387885885","doi":"https://doi.org/10.1109/tnse.2023.3324942","title":"SCcheck: A Novel Graph-Driven and Attention- Enabled Smart Contract Vulnerability Detection Framework for Web 3.0 Ecosystem","display_name":"SCcheck: A Novel Graph-Driven and Attention- Enabled Smart Contract Vulnerability Detection Framework for Web 3.0 Ecosystem","publication_year":2023,"publication_date":"2023-10-23","ids":{"openalex":"https://openalex.org/W4387885885","doi":"https://doi.org/10.1109/tnse.2023.3324942"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2023.3324942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3324942","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084224429","display_name":"Yuanlong Cao","orcid":"https://orcid.org/0000-0002-6557-6559"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuanlong Cao","raw_affiliation_strings":["School of Software, Jiangxi Normal University, Nanchang, China","Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011708301","display_name":"Fan Jiang","orcid":"https://orcid.org/0000-0003-0803-7505"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Jiang","raw_affiliation_strings":["School of Software, Jiangxi Normal University, Nanchang, China","Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","institution_ids":[]},{"raw_affiliation_string":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020202009","display_name":"Jianmao Xiao","orcid":"https://orcid.org/0000-0003-3741-8104"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianmao Xiao","raw_affiliation_strings":["School of Software, Jiangxi Normal University, Nanchang, China","Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","institution_ids":[]},{"raw_affiliation_string":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016747300","display_name":"Shaolong Chen","orcid":"https://orcid.org/0000-0002-5479-0197"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaolong Chen","raw_affiliation_strings":["School of Software, Jiangxi Normal University, Nanchang, China","Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065441752","display_name":"Xun Shao","orcid":"https://orcid.org/0000-0003-2728-5619"},"institutions":[{"id":"https://openalex.org/I136259955","display_name":"Toyohashi University of Technology","ror":"https://ror.org/04ezg6d83","country_code":"JP","type":"education","lineage":["https://openalex.org/I136259955"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xun Shao","raw_affiliation_strings":["Toyohashi University of Technology, Toyohashi, Japan"],"affiliations":[{"raw_affiliation_string":"Toyohashi University of Technology, Toyohashi, Japan","institution_ids":["https://openalex.org/I136259955"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046333931","display_name":"Celimuge Wu","orcid":"https://orcid.org/0000-0001-6853-5878"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Celimuge Wu","raw_affiliation_strings":["University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084224429"],"corresponding_institution_ids":["https://openalex.org/I53592917"],"apc_list":null,"apc_paid":null,"fwci":3.199,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.93134569,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"4007","last_page":"4019"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.679943323135376},{"id":"https://openalex.org/keywords/dataflow","display_name":"Dataflow","score":0.6244214773178101},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4875873923301697},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4874918460845947},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48168477416038513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33140644431114197},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.26262032985687256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.679943323135376},{"id":"https://openalex.org/C96324660","wikidata":"https://www.wikidata.org/wiki/Q205446","display_name":"Dataflow","level":2,"score":0.6244214773178101},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4875873923301697},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4874918460845947},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48168477416038513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33140644431114197},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.26262032985687256}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2023.3324942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3324942","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G166464655","display_name":null,"funder_award_id":"20224ACB202007","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"},{"id":"https://openalex.org/G2754135072","display_name":null,"funder_award_id":"20212BAB212007","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"},{"id":"https://openalex.org/G7246819499","display_name":null,"funder_award_id":"61962026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2539190473","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2805827286","https://openalex.org/W2846896781","https://openalex.org/W2908007588","https://openalex.org/W2947690458","https://openalex.org/W2970809537","https://openalex.org/W2982383932","https://openalex.org/W2995871203","https://openalex.org/W2997254578","https://openalex.org/W3001458527","https://openalex.org/W3011995057","https://openalex.org/W3101098008","https://openalex.org/W3105187050","https://openalex.org/W3175262761","https://openalex.org/W3182763642","https://openalex.org/W4211068006","https://openalex.org/W4220771946","https://openalex.org/W4225662012","https://openalex.org/W4226203901","https://openalex.org/W4229365081","https://openalex.org/W4248175462","https://openalex.org/W4289548059","https://openalex.org/W4294607906","https://openalex.org/W4302362827","https://openalex.org/W4309857254","https://openalex.org/W4385245566","https://openalex.org/W4387883695","https://openalex.org/W6754374649"],"related_works":["https://openalex.org/W2293118914","https://openalex.org/W2998381397","https://openalex.org/W4236419692","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W4240241597","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W2019514379"],"abstract_inverted_index":{"With":[0],"the":[1,15,27,58,69,88,144,161,184,187,228],"rapid":[2],"progress":[3],"of":[4,29,38,62,71,90,147,164,194],"technology,":[5],"Web":[6,39],"3.0":[7],"has":[8,96,227],"emerged":[9],"as":[10,34],"a":[11,35,42,154,171],"transformative":[12],"force":[13],"in":[14,45,93,223],"digital":[16],"realm.":[17],"It":[18],"is":[19,176],"characterized":[20],"by":[21,49],"decentralization,":[22],"user-centric":[23],"data":[24],"ownership,":[25],"and":[26,53,65,84,126,132,152,178,205,226],"implementation":[28],"cryptographic":[30],"techniques.":[31],"Smart":[32],"contracts,":[33,149],"core":[36],"component":[37],"3.0,":[40],"play":[41],"pivotal":[43],"role":[44],"driving":[46],"its":[47],"evolution":[48],"enabling":[50],"novel":[51],"functionalities":[52],"various":[54],"application.":[55],"However,":[56],"given":[57],"substantial":[59],"financial":[60],"significance":[61],"smart":[63,94,101,136,148,224],"contracts":[64,95,225],"their":[66,72,232],"inherent":[67],"transparency,":[68],"accessibility":[70],"source":[73],"code":[74,145],"to":[75,82,112,159,230],"all":[76],"opens":[77],"potential":[78,229],"avenues":[79],"for":[80,134],"attackers":[81],"identify":[83],"exploit":[85],"vulnerabilities.":[86,138],"Therefore,":[87],"detection":[89,104],"security":[91,221],"vulnerabilities":[92,222],"become":[97],"significantly":[98],"important.":[99],"Existing":[100],"contract":[102,137,155],"vulnerability":[103],"tools":[105],"mostly":[106],"rely":[107],"on":[108],"expert-defined":[109],"rules,":[110],"leading":[111],"high":[113],"false":[114],"positive":[115],"rates.":[116],"To":[117],"address":[118],"this":[119,121],"problem,":[120],"paper":[122],"proposes":[123],"an":[124],"efficient":[125],"automated":[127],"framework":[128,140,175,190,217],"that":[129,215],"combines":[130],"Graph":[131],"Attention":[133],"detecting":[135],"This":[139],"takes":[141],"into":[142],"account":[143],"structure":[146],"extracts":[150],"nodes,":[151],"constructs":[153],"graph,":[156],"utilizing":[157,183],"dataflow":[158],"represent":[160],"different":[162,168],"semantics":[163],"variable":[165],"nodes":[166],"at":[167],"locations.":[169],"Additionally,":[170],"bidirectional":[172],"multilayer":[173],"Transformer":[174],"constructed":[177],"trained":[179],"with":[180],"our":[181,216],"dataset,":[182],"information":[185],"from":[186],"nodes.":[188],"The":[189],"achieves":[191],"state-of-the-art":[192],"levels":[193],"<inline-formula":[195,200,206],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[196,201,207],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[197,202,208],"notation=\"LaTeX\">$Accuracy$</tex-math></inline-formula>":[198],"92.72%,":[199],"notation=\"LaTeX\">$Recall$</tex-math></inline-formula>":[203],"82.81%,":[204],"notation=\"LaTeX\">$F1_{score}$</tex-math></inline-formula>":[209],"87.54%,":[210],"respectively.":[211],"These":[212],"results":[213],"show":[214],"can":[218],"effectively":[219],"detect":[220],"improve":[231],"security.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
