{"id":"https://openalex.org/W4381684496","doi":"https://doi.org/10.1186/s13677-023-00459-x","title":"HGAT: smart contract vulnerability detection method based on hierarchical graph attention network","display_name":"HGAT: smart contract vulnerability detection method based on hierarchical graph attention network","publication_year":2023,"publication_date":"2023-06-22","ids":{"openalex":"https://openalex.org/W4381684496","doi":"https://doi.org/10.1186/s13677-023-00459-x"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00459-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00459-x","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00459-x","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00459-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059921876","display_name":"Chuang Ma","orcid":"https://orcid.org/0000-0001-6242-697X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuang Ma","raw_affiliation_strings":["School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028187853","display_name":"Shuaiwu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuaiwu Liu","raw_affiliation_strings":["School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022355568","display_name":"Guangxia Xu","orcid":"https://orcid.org/0000-0002-9010-2443"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangxia Xu","raw_affiliation_strings":["Advanced Institute of Cyberspace Technology, Guangzhou University, Guangzhou, 510006, China"],"affiliations":[{"raw_affiliation_string":"Advanced Institute of Cyberspace Technology, Guangzhou University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022355568"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":11.756,"has_fulltext":true,"cited_by_count":26,"citation_normalized_percentile":{"value":0.98498044,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9660999774932861,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9472000002861023,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8408536911010742},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5040794610977173},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.4997365474700928},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.495674729347229},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.45980942249298096},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.45025742053985596},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44234830141067505},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4183666706085205},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4001751244068146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3199400305747986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28128087520599365},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2572622001171112}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8408536911010742},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5040794610977173},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.4997365474700928},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.495674729347229},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.45980942249298096},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.45025742053985596},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44234830141067505},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4183666706085205},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4001751244068146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3199400305747986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28128087520599365},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2572622001171112},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00459-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00459-x","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00459-x","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8d0de5bbfe0640e6b2b896cb364dca35","is_oa":true,"landing_page_url":"https://doaj.org/article/8d0de5bbfe0640e6b2b896cb364dca35","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-13 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00459-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00459-x","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00459-x","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1157558076","display_name":null,"funder_award_id":"62106030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4444765892","display_name":null,"funder_award_id":"62272120","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4762631860","display_name":null,"funder_award_id":"No. 62272120, 62106030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5760752404","display_name":null,"funder_award_id":"Projects","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7588648753","display_name":null,"funder_award_id":"cstc2021jcyj-msxmX0530","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321135","display_name":"Chongqing University","ror":"https://ror.org/023rhb549"},{"id":"https://openalex.org/F4320322687","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4381684496.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1501856433","https://openalex.org/W2031525781","https://openalex.org/W2538848838","https://openalex.org/W2539190473","https://openalex.org/W2749008552","https://openalex.org/W2778144710","https://openalex.org/W2805052744","https://openalex.org/W2805827286","https://openalex.org/W2884898944","https://openalex.org/W2901775586","https://openalex.org/W2949029756","https://openalex.org/W2963594166","https://openalex.org/W2972135640","https://openalex.org/W2981038883","https://openalex.org/W2985495886","https://openalex.org/W2989657022","https://openalex.org/W2989774069","https://openalex.org/W3003036212","https://openalex.org/W3008969726","https://openalex.org/W3035733952","https://openalex.org/W3041830268","https://openalex.org/W3042599897","https://openalex.org/W3103843811","https://openalex.org/W3105926539","https://openalex.org/W3119253238","https://openalex.org/W3125989628","https://openalex.org/W3137846090","https://openalex.org/W3182763642","https://openalex.org/W3197234204","https://openalex.org/W4212974603","https://openalex.org/W4220908458","https://openalex.org/W4226263557"],"related_works":["https://openalex.org/W2080046362","https://openalex.org/W3002464080","https://openalex.org/W2380745217","https://openalex.org/W2162436812","https://openalex.org/W70770657","https://openalex.org/W2376535346","https://openalex.org/W2138385884","https://openalex.org/W2085562432","https://openalex.org/W1972318755","https://openalex.org/W2166895275"],"abstract_inverted_index":{"Abstract":[0,97],"With":[1],"the":[2,27,80,86,105,108,122,126,130,136,141,165,175],"widespread":[3],"use":[4,149],"of":[5,36,88,143,146,174],"blockchain,":[6],"more":[7,9,21,23,186],"and":[8,15,22,32,101,148,160,188],"smart":[10,50,90,109,154,167,183],"contracts":[11,51],"are":[12,111],"being":[13],"deployed,":[14],"their":[16],"internal":[17],"logic":[18],"is":[19],"getting":[20],"sophisticated.":[24],"Due":[25],"to":[26,78,139,152],"large":[28],"false":[29],"positive":[30],"rate":[31],"low":[33,60],"detection":[34,39,47,61,74,93,192],"accuracy":[35],"most":[37],"current":[38,89],"methods,":[40],"which":[41],"heavily":[42],"rely":[43],"on":[44],"already":[45],"established":[46],"criteria,":[48],"certain":[49],"additionally":[52],"call":[53],"for":[54],"human":[55],"secondary":[56],"detection,":[57],"resulting":[58],"in":[59,76,107,121],"efficiency.":[62],"In":[63],"this":[64,179],"study,":[65],"we":[66,163],"propose":[67],"HGAT,":[68,162],"a":[69],"hierarchical":[70],"graph":[71,131],"attention":[72,132],"network-based":[73],"model,":[75],"order":[77],"address":[79],"aforementioned":[81],"issues":[82],"as":[83,85],"well":[84],"shortcomings":[87],"contract":[91,110,168,184],"vulnerability":[92,169],"approaches.":[94],"First,":[95],"using":[96],"Syntax":[98],"Tree":[99],"(AST)":[100],"Control":[102],"Flow":[103],"Graph,":[104],"functions":[106],"abstracted":[112],"into":[113],"code":[114,123],"graphs":[115],"(CFG).":[116],"Then":[117],"abstract":[118],"each":[119,144],"node":[120,127],"subgraph,":[124],"extract":[125],"features,":[128],"utilize":[129],"mechanism":[133],"GAT,":[134],"splice":[135],"obtained":[137],"vectors":[138],"form":[140],"features":[142,151],"line":[145],"statements":[147],"these":[150],"detect":[153],"contracts.":[155],"To":[156],"create":[157],"test":[158],"data":[159],"assess":[161],"leverage":[164],"open-source":[166],"sample":[170],"dataset.":[171],"The":[172],"findings":[173],"experiment":[176],"indicate":[177],"that":[178],"method":[180],"can":[181],"identify":[182],"vulnerabilities":[185],"quickly":[187],"precisely":[189],"than":[190],"other":[191],"techniques.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
