{"id":"https://openalex.org/W4402978829","doi":"https://doi.org/10.1109/tnse.2024.3470788","title":"ContractGNN: Ethereum Smart Contract Vulnerability Detection Based on Vulnerability Sub-Graphs and Graph Neural Networks","display_name":"ContractGNN: Ethereum Smart Contract Vulnerability Detection Based on Vulnerability Sub-Graphs and Graph Neural Networks","publication_year":2024,"publication_date":"2024-09-30","ids":{"openalex":"https://openalex.org/W4402978829","doi":"https://doi.org/10.1109/tnse.2024.3470788"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3470788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3470788","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100373193","display_name":"Yichen Wang","orcid":"https://orcid.org/0000-0002-7189-3163"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yichen Wang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087919123","display_name":"Xiangfu Zhao","orcid":"https://orcid.org/0000-0001-5870-5730"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangfu Zhao","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086820434","display_name":"Long He","orcid":"https://orcid.org/0000-0002-9539-6209"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long He","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111145080","display_name":"Zixian Zhen","orcid":null},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixian Zhen","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037886162","display_name":"Haiyue Chen","orcid":"https://orcid.org/0009-0003-6872-0493"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyue Chen","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, China","institution_ids":["https://openalex.org/I18452120"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100373193"],"corresponding_institution_ids":["https://openalex.org/I18452120"],"apc_list":null,"apc_paid":null,"fwci":11.4815,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.98397317,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"6","first_page":"6382","last_page":"6395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8399999737739563,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8399999737739563,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11762","display_name":"Law, Economics, and Judicial Systems","score":0.8137000203132629,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7272999882698059,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6208492517471313},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5456597805023193},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48885291814804077},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4838646650314331},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46079665422439575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35994529724121094},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2438066005706787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2355506420135498},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.061093300580978394}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6208492517471313},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5456597805023193},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48885291814804077},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4838646650314331},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46079665422439575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35994529724121094},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2438066005706787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2355506420135498},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.061093300580978394},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3470788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3470788","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3638049514","display_name":null,"funder_award_id":"62072392","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5579569897","display_name":null,"funder_award_id":"ZR2024MF111","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G7880935157","display_name":null,"funder_award_id":"61972360","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1969344535","https://openalex.org/W2127637733","https://openalex.org/W2167685423","https://openalex.org/W2538848838","https://openalex.org/W2539190473","https://openalex.org/W2558748708","https://openalex.org/W2784110831","https://openalex.org/W2790202156","https://openalex.org/W2846896781","https://openalex.org/W2908007588","https://openalex.org/W2970809537","https://openalex.org/W3003036212","https://openalex.org/W3035733952","https://openalex.org/W3091620507","https://openalex.org/W3106747422","https://openalex.org/W3119253238","https://openalex.org/W3182763642","https://openalex.org/W3199463718","https://openalex.org/W4205689130","https://openalex.org/W4211068006","https://openalex.org/W4285586691","https://openalex.org/W4306931660","https://openalex.org/W4316661173","https://openalex.org/W4319337832","https://openalex.org/W4324007147","https://openalex.org/W4366124391","https://openalex.org/W4384155618","https://openalex.org/W4387185496","https://openalex.org/W4398239401","https://openalex.org/W4400909786","https://openalex.org/W6690815549","https://openalex.org/W6726873649","https://openalex.org/W6738964360","https://openalex.org/W6754374649","https://openalex.org/W6757822707"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"Smart":[0],"contracts":[1,38],"have":[2,23],"been":[3,44],"widely":[4],"used":[5,45],"for":[6],"their":[7],"capability":[8],"of":[9,57,80,127,150,155,164,204],"giving":[10],"blockchain":[11],"a":[12,70,77,81,99,116,131,139,161],"user-defined":[13],"logic.":[14],"In":[15],"recent":[16],"years,":[17],"several":[18],"smart":[19,37,48,156,183,194],"contract":[20,49,195],"security":[21],"incidents":[22],"resulted":[24],"in":[25,36,47,110,130],"enormous":[26],"financial":[27],"losses.":[28],"Therefore,":[29],"it":[30],"is":[31,101],"important":[32],"to":[33,54,173],"detect":[34],"vulnerabilities":[35],"before":[39],"deployment.":[40],"Machine":[41],"learning":[42],"has":[43],"recently":[46],"vulnerability":[50,196],"detection.":[51],"Unfortunately,":[52],"due":[53],"the":[55,62,105,111,125,148,170,186],"loss":[56],"information":[58],"during":[59],"feature":[60,141],"extraction,":[61],"detection":[63,197],"results":[64,188],"are":[65],"unsatisfactory.":[66],"Hence,":[67],"we":[68,137,159],"propose":[69],"novel":[71],"approach":[72],"called":[73],"ContractGNN,":[74],"which":[75],"combines":[76],"new":[78,140],"concept":[79],"<italic":[82,88],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[83,89],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">vulnerability":[84],"sub-graph</i>":[85],"(VSG)":[86],"with":[87,95,199],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">graph":[90],"neural":[91],"networks</i>":[92],"(GNNs).":[93],"Compared":[94],"traditional":[96],"methods,":[97],"checking":[98],"VSG":[100,106,117],"more":[102],"accurate":[103],"because":[104],"removes":[107],"irrelevant":[108],"vertexes":[109],"control":[112,153],"flow":[113],"graph.":[114],"Furthermore,":[115],"can":[118],"be":[119],"aggregated":[120,135],"and":[121,152,168,185],"simplified,":[122],"thus":[123],"improving":[124],"efficiency":[126],"message":[128],"passing":[129],"GNN.":[132],"Based":[133],"on":[134,180],"VSGs,":[136],"design":[138],"extraction":[142],"method":[143],"that":[144,190],"preserves":[145],"semantic":[146],"information,":[147],"order":[149],"opcode,":[151],"flows":[154],"contracts.":[157],"Moreover,":[158],"compare":[160],"large":[162],"number":[163],"GNN":[165],"classification":[166],"models":[167],"select":[169],"best":[171],"one":[172],"implement":[174],"ContractGNN.":[175],"We":[176],"then":[177],"test":[178],"ContractGNN":[179,191],"48,493":[181],"real-world":[182],"contracts,":[184],"experimental":[187],"show":[189],"outperforms":[192],"other":[193],"tools,":[198],"an":[200],"average":[201],"F1":[202],"score":[203],"89.70%.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":11}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
