{"id":"https://openalex.org/W7128827819","doi":"https://doi.org/10.1109/tnsm.2026.3664599","title":"SCFusionLocator: A Statement-Level Smart Contract Vulnerability Localization Framework Based on Code Slicing and Multi-Modal Feature Fusion","display_name":"SCFusionLocator: A Statement-Level Smart Contract Vulnerability Localization Framework Based on Code Slicing and Multi-Modal Feature Fusion","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128827819","doi":"https://doi.org/10.1109/tnsm.2026.3664599"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2026.3664599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3664599","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108367090","display_name":"Jinfeng Huang","orcid":"https://orcid.org/0000-0002-6806-3361"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Huang","raw_affiliation_strings":["School of Information Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125995566","display_name":"Yabo Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yabo Wang","raw_affiliation_strings":["School of Information Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125930331","display_name":"Honggui Han","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Honggui Han","raw_affiliation_strings":["School of Information Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108367090"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64591078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"2832","last_page":"2851"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.48890000581741333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.48890000581741333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.17710000276565552,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.07289999723434448,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.46950000524520874},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.41179999709129333},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4081000089645386},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.3880000114440918},{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.3871999979019165},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.38429999351501465},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.359499990940094},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.35899999737739563},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.34380000829696655}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8447999954223633},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.46950000524520874},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45170000195503235},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.41179999709129333},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4081000089645386},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.3880000114440918},{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.3871999979019165},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.38429999351501465},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.35899999737739563},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.34380000829696655},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C169087156","wikidata":"https://www.wikidata.org/wiki/Q2131593","display_name":"Framing (construction)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C96711827","wikidata":"https://www.wikidata.org/wiki/Q17012245","display_name":"Entity linking","level":3,"score":0.3028999865055084},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.2989000082015991},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.287200003862381},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.2865000069141388},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2809000015258789},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.2808000147342682},{"id":"https://openalex.org/C23725684","wikidata":"https://www.wikidata.org/wiki/Q616377","display_name":"Maintenance engineering","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.26010000705718994},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2572000026702881},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2026.3664599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3664599","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Smart":[0],"contract":[1],"vulnerabilities":[2],"have":[3],"led":[4],"to":[5,50,65,159],"over":[6,119,148],"$20":[7],"billion":[8],"in":[9,166],"losses,":[10],"but":[11],"existing":[12],"methods":[13],"suffer":[14],"from":[15],"coarse-grained":[16],"detection,":[17],"two-stage":[18],"\u201cdetection-then-localization\u201d":[19],"pipelines,":[20],"and":[21,47,56,96,133,142,163],"insufficient":[22],"feature":[23],"extraction.":[24],"This":[25],"paper":[26],"proposes":[27],"SCFusionLocator,":[28],"a":[29,39,93,115],"statement-level":[30,105],"vulnerability":[31,127],"localization":[32,106],"framework":[33],"for":[34,82,99,125],"smart":[35],"contracts.":[36],"It":[37],"adopts":[38],"novel":[40],"code-slicing":[41],"mechanism":[42],"(via":[43],"function":[44],"call":[45],"graphs":[46,91],"data-flow":[48],"graphs)":[49],"decompose":[51],"contracts":[52,121],"into":[53,92],"single-function":[54],"subcontracts":[55],"filter":[57],"low-saliency":[58],"statements,":[59],"paired":[60],"with":[61,122,156],"source":[62],"code":[63],"normalization":[64],"reduce":[66],"noise.":[67],"A":[68],"dual-branch":[69],"architecture":[70],"captures":[71],"complementary":[72],"features:":[73],"the":[74,86,153],"code-sequence":[75],"branch":[76,88],"uses":[77],"GraphCodeBERT":[78],"(with":[79],"data-flow-aware":[80],"masking)":[81],"semantic":[83],"extraction,":[84],"while":[85],"graph":[87,95],"fuses":[89],"call/control-flow/data-flow":[90],"heterogeneous":[94],"applies":[97],"HGAT":[98],"structural":[100],"modeling.":[101],"SCFusionLocator":[102,137],"enables":[103],"end-to-end":[104],"by":[107],"framing":[108],"tasks":[109],"as":[110],"statement":[111,154],"classification.We":[112],"release":[113],"BJUT_SC02,":[114,131],"large":[116],"dataset":[117],"of":[118],"240,000":[120],"line-level":[123],"labels":[124],"58":[126],"types.":[128],"Experiments":[129],"on":[130],"SCD,":[132],"MANDO":[134],"datasets":[135],"show":[136],"outperforms":[138],"8":[139],"conventional":[140],"tools":[141],"nearly":[143],"20":[144],"ML":[145],"baselines,":[146],"achieving":[147],"90%":[149],"average":[150],"F1":[151],"at":[152],"level,":[155],"better":[157],"generalization":[158],"similar":[160],"unknown":[161],"vulnerabilities,":[162],"remains":[164],"competitive":[165],"contract-level":[167],"detection.":[168]},"counts_by_year":[],"updated_date":"2026-03-06T06:45:51.903784","created_date":"2026-02-14T00:00:00"}
