{"id":"https://openalex.org/W4387360040","doi":"https://doi.org/10.1145/3609437.3609455","title":"Can Neural Networks Help Smart Contract Testing? An Empirical Study","display_name":"Can Neural Networks Help Smart Contract Testing? An Empirical Study","publication_year":2023,"publication_date":"2023-08-04","ids":{"openalex":"https://openalex.org/W4387360040","doi":"https://doi.org/10.1145/3609437.3609455"},"language":"en","primary_location":{"id":"doi:10.1145/3609437.3609455","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3609437.3609455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025404920","display_name":"Jiadong Wu","orcid":"https://orcid.org/0000-0002-0300-7537"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiadong Wu","raw_affiliation_strings":["School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350708","display_name":"Yanlin Wang","orcid":"https://orcid.org/0000-0001-7761-7269"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanlin Wang","raw_affiliation_strings":["School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041196669","display_name":"Ruixin Wang","orcid":"https://orcid.org/0009-0002-9298-0925"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruixin Wang","raw_affiliation_strings":["Purdue University, United States of America"],"affiliations":[{"raw_affiliation_string":"Purdue University, United States of America","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086118824","display_name":"Jiachi Chen","orcid":"https://orcid.org/0000-0002-0192-9992"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiachi Chen","raw_affiliation_strings":["School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000582109","display_name":"Zibin Zheng","orcid":"https://orcid.org/0000-0002-7878-4330"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zibin Zheng","raw_affiliation_strings":["School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Sun Yat-Sen University, Zhuhai, China, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025404920"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.9189,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8043348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8158155679702759},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.6931564211845398},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6912250518798828},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6100022792816162},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5954923033714294},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5628547668457031},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5320777893066406},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5036320090293884},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.49507036805152893},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4337608218193054},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.4313516616821289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35064607858657837},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3437940776348114},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.328707218170166},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1022610068321228}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8158155679702759},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.6931564211845398},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6912250518798828},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6100022792816162},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5954923033714294},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5628547668457031},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5320777893066406},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5036320090293884},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.49507036805152893},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4337608218193054},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.4313516616821289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35064607858657837},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3437940776348114},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.328707218170166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1022610068321228},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3609437.3609455","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3609437.3609455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2157331557","https://openalex.org/W2805052744","https://openalex.org/W3003036212","https://openalex.org/W3005065812","https://openalex.org/W3007045600","https://openalex.org/W3083471387","https://openalex.org/W3159494182","https://openalex.org/W3181957689"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"Smart":[0],"contracts":[1],"are":[2],"one":[3],"of":[4,9,18,44,68,95,101,160,191,209,220],"the":[5,16,61,66,99,151,158,164,169,193,206,212,223,227,241],"most":[6],"successful":[7],"applications":[8],"blockchain":[10],"technology.":[11],"In":[12,109,189],"order":[13,110],"to":[14,37,82,105,111,135,217],"guarantee":[15],"security":[17],"smart":[19,45,69,85,106,123,186,246],"contracts,":[20,124],"researchers":[21],"have":[22,51],"successively":[23],"introduced":[24],"various":[25,142],"testing":[26,120,248],"methodologies,":[27],"including":[28,145],"static":[29],"analysis,":[30,238],"symbolic":[31,152],"execution,":[32],"and":[33,41,149,236,249],"fuzzing,":[34],"which":[35,196],"contribute":[36],"a":[38,93,127,198],"more":[39],"rigorous":[40],"precise":[42],"evaluation":[43],"contract":[46,70,86,107,187,247],"vulnerabilities.":[47,210],"Deep":[48],"learning":[49,77,103,138],"techniques":[50],"been":[52],"widely":[53],"applied":[54,81,104],"in":[55,65,184,204,222,244],"traditional":[56,84,181],"software":[57],"vulnerability":[58,87],"detection,":[59],"while":[60],"opposite":[62],"is":[63,92],"true":[64],"field":[67],"testing.":[71,108,188],"Consequently,":[72],"we":[73,125,172,239],"anticipate":[74],"that":[75,174],"deep":[76,102,114,137,175],"can":[78,117],"be":[79],"similarly":[80],"enhance":[83],"detection":[88],"tools.":[89],"However,":[90],"there":[91],"lack":[94],"empirical":[96],"study":[97],"on":[98,122,131,163,232],"performance":[100],"explore":[112],"how":[113],"neural":[115,143,176],"networks":[116,144,177],"help":[118],"with":[119,157],"tools":[121],"construct":[126],"test":[128,150],"framework":[129,156],"based":[130],"SMARTEST.":[132],"We":[133],"manage":[134],"train":[136],"language":[139,182,201],"models":[140,162,183],"using":[141],"Transformer,":[146],"GRU,":[147],"RNN":[148],"execution":[153],"tool":[154],"SMARTEST":[155,194],"application":[159],"these":[161],"CVE":[165],"dataset.":[166],"Upon":[167],"analyzing":[168],"experimental":[170,234],"results,":[171],"find":[173],"did":[178],"not":[179],"surpass":[180],"enhancing":[185],"terms":[190],"accuracy,":[192],"tool,":[195],"utilizes":[197],"statistical":[199],"3-gram":[200,213],"model,":[202],"succeeded":[203],"detecting":[205],"greatest":[207],"number":[208],"Specifically,":[211],"model":[214],"was":[215],"able":[216],"identify":[218],"69.8%":[219],"vulnerabilities":[221],"benchmark":[224],"set":[225],"within":[226],"first":[228],"5":[229],"seconds.":[230],"Based":[231],"our":[233],"findings":[235],"thorough":[237],"outline":[240],"challenges":[242],"faced":[243],"DNN-assisted":[245],"suggest":[250],"potential":[251],"directions":[252],"for":[253],"improvement.":[254]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
