{"id":"https://openalex.org/W4416251707","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228882","title":"Vulnerability Detection in EOSIO Smart Contracts Based on Teacher-Student Networks","display_name":"Vulnerability Detection in EOSIO Smart Contracts Based on Teacher-Student Networks","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251707","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228882"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shenao Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shenao Lin","raw_affiliation_strings":["Hebei University,School of Cyber Security and Computer,Baoding,China"],"affiliations":[{"raw_affiliation_string":"Hebei University,School of Cyber Security and Computer,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377206","display_name":"Meng Wang","orcid":"https://orcid.org/0000-0002-9404-5570"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Wang","raw_affiliation_strings":["Hebei University,School of Cyber Security and Computer,Baoding,China"],"affiliations":[{"raw_affiliation_string":"Hebei University,School of Cyber Security and Computer,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100607635","display_name":"Miao Wang","orcid":"https://orcid.org/0000-0001-9270-0407"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miao Wang","raw_affiliation_strings":["Hebei University,School of Cyber Security and Computer,Baoding,China"],"affiliations":[{"raw_affiliation_string":"Hebei University,School of Cyber Security and Computer,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4702342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.2793000042438507,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.2793000042438507,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.23569999635219574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.12710000574588776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8984000086784363},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.67330002784729},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5329999923706055},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5270000100135803},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4763999879360199},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.4514000117778778}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8984000086784363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8047999739646912},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.67330002784729},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5329999923706055},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5270000100135803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47749999165534973},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4763999879360199},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.4514000117778778},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37369999289512634},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3483999967575073},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.323199987411499},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.30320000648498535},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3021000027656555}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2907492528","https://openalex.org/W2955447707","https://openalex.org/W2974819274","https://openalex.org/W3035733952","https://openalex.org/W3156940584","https://openalex.org/W3175191348","https://openalex.org/W3175624454","https://openalex.org/W3182763642","https://openalex.org/W3183146186","https://openalex.org/W3190730109","https://openalex.org/W4285490420","https://openalex.org/W4285586691","https://openalex.org/W4292230978","https://openalex.org/W4306931660","https://openalex.org/W4311165836","https://openalex.org/W4316661173","https://openalex.org/W4366124391","https://openalex.org/W4376606648","https://openalex.org/W4388857879","https://openalex.org/W4390187519","https://openalex.org/W4391724771","https://openalex.org/W4399245890"],"related_works":[],"abstract_inverted_index":{"The":[0,96,118,129],"widespread":[1],"adoption":[2],"of":[3,12,33,93,105],"EOSIO":[4,14,42,71,189],"blockchain":[5],"technology":[6],"has":[7],"underscored":[8],"the":[9,70,87,101,111,139,144,151,171,188],"critical":[10],"importance":[11],"securing":[13],"smart":[15,43,185],"contracts.":[16],"Vulnerabilities":[17],"within":[18],"these":[19],"contracts":[20,44,186],"can":[21],"result":[22],"in":[23,41,156,200],"substantial":[24],"economic":[25],"losses,":[26],"making":[27],"their":[28],"detection":[29,67],"a":[30,65,75,161,182],"vital":[31],"area":[32],"research.":[34],"However,":[35],"existing":[36],"methods":[37],"for":[38,69],"detecting":[39,84],"vulnerabilities":[40,85],"predominantly":[45],"rely":[46],"on":[47,74,83],"expert-defined":[48],"rules,":[49],"which":[50],"are":[51],"often":[52],"susceptible":[53],"to":[54,166],"errors":[55],"and":[56,103,108,148,173],"lack":[57],"scalability.":[58],"To":[59],"address":[60],"this":[61],"issue,":[62],"we":[63],"propose":[64],"vulnerability":[66,157,201],"method":[68,152,196],"platform":[72],"based":[73],"teacher-student":[76,119],"network":[77,98,113,120,131],"architecture.":[78],"This":[79,90],"approach":[80,91,180],"specifically":[81],"focuses":[82],"at":[86],"function":[88],"level.":[89],"consists":[92],"two":[94],"networks.":[95,175],"teacher":[97,140,172],"learns":[99],"both":[100],"syntax":[102],"semantics":[104],"source":[106,146],"code":[107,147],"bytecode,":[109],"while":[110],"student":[112,130,174],"takes":[114],"bytecode":[115,134,149],"as":[116],"input.":[117],"extracts":[121],"function-level":[122],"features":[123],"by":[124,136],"incorporating":[125],"an":[126],"MCOAttention":[127],"mechanism.":[128],"infers":[132],"missing":[133],"embeddings":[135],"learning":[137,164],"from":[138,187],"network.":[141],"By":[142],"combining":[143],"inferred":[145],"representations,":[150],"achieves":[153],"improved":[154],"accuracy":[155,199],"detection.":[158,202],"We":[159,176],"introduce":[160],"cross-modal":[162],"mutual":[163],"strategy":[165],"facilitate":[167],"knowledge":[168],"transfer":[169],"between":[170],"evaluated":[177],"our":[178,195],"proposed":[179],"using":[181],"dataset":[183],"comprising":[184],"platform.":[190],"Experimental":[191],"results":[192],"demonstrate":[193],"that":[194],"significantly":[197],"improves":[198]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-14T00:00:00"}
