{"id":"https://openalex.org/W4406255696","doi":"https://doi.org/10.18293/seke2024-062","title":"Intelligent Contract Timestamp Vulnerability Detection Based on Key Control FlowGraph","display_name":"Intelligent Contract Timestamp Vulnerability Detection Based on Key Control FlowGraph","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4406255696","doi":"https://doi.org/10.18293/seke2024-062"},"language":"en","primary_location":{"id":"doi:10.18293/seke2024-062","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-062","pdf_url":"https://doi.org/10.18293/seke2024-062","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2024-062","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110265814","display_name":"Q. Quan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qing Yu Quan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018922388","display_name":"Cheng Zeng","orcid":"https://orcid.org/0000-0002-6089-8372"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng Zeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091654591","display_name":"Yi Wang","orcid":"https://orcid.org/0000-0001-6068-5310"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi Feng Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5012790265","display_name":"Jiancheng Wang","orcid":"https://orcid.org/0009-0009-5278-6432"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiao Ran Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110265814"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41988294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2024","issue":null,"first_page":"267","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13643","display_name":"Artificial Intelligence in Law","score":0.8805999755859375,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13643","display_name":"Artificial Intelligence in Law","score":0.8805999755859375,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8639000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8554999828338623,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.8161464929580688},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.8082792162895203},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7868717908859253},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6123520135879517},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4459823966026306},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42068907618522644},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.108893483877182}],"concepts":[{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.8161464929580688},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.8082792162895203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7868717908859253},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6123520135879517},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4459823966026306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42068907618522644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.108893483877182}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2024-062","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-062","pdf_url":"https://doi.org/10.18293/seke2024-062","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2024-062","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-062","pdf_url":"https://doi.org/10.18293/seke2024-062","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G256562790","display_name":null,"funder_award_id":"2021BAA184","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3721195576","display_name":null,"funder_award_id":"2021BAA188","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8950497980","display_name":null,"funder_award_id":"62102136","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8955107213","display_name":null,"funder_award_id":"Major","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406255696.pdf","grobid_xml":"https://content.openalex.org/works/W4406255696.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2060561905","https://openalex.org/W1417711376","https://openalex.org/W2032260263","https://openalex.org/W1986883493","https://openalex.org/W2469862403","https://openalex.org/W2166378262","https://openalex.org/W2035891203","https://openalex.org/W4379524643","https://openalex.org/W2011027677","https://openalex.org/W4318719173"],"abstract_inverted_index":{"The":[0],"extensive":[1,58],"application":[2,24,190],"of":[3,18,26,70,73,85,133,195],"smart":[4,27,49,74,97,148,182,196],"contract":[5,50,75,98],"technology":[6],"in":[7,37,78,81,147,181],"the":[8,19,23,71,90,108,130,134,158,167,172,193],"blockchain":[9],"domain":[10],"has":[11,170],"positioned":[12],"it":[13],"as":[14,22],"a":[15,93,102],"key":[16,114],"component":[17],"digital":[20],"economy.However,":[21],"scope":[25],"contracts":[28,183],"expands,":[29],"security":[30,194],"issues":[31],"have":[32],"become":[33],"increasingly":[34],"evident,":[35],"resulting":[36],"substantial":[38],"economic":[39],"losses.Current":[40],"vulnerability":[41],"detection":[42,86,165],"methods":[43],"largely":[44],"depend":[45],"on":[46,113,124,153],"analyzing":[47],"complete":[48],"source":[51,99],"code,":[52,76],"which":[53,77],"struggles":[54],"to":[55,66,163],"filter":[56],"out":[57,107],"redundant":[59],"information":[60,115],"when":[61],"identifying":[62],"individual":[63,119],"vulnerabilities.This":[64],"leads":[65],"an":[67],"insufficient":[68],"exploration":[69],"characteristics":[72],"turn":[79],"results":[80,159],"lower":[82],"overall":[83],"accuracy":[84,173],"methods.In":[87],"this":[88],"context,":[89],"study":[91],"introduces":[92],"method":[94],"that":[95,161],"transforms":[96],"code":[100],"into":[101],"control":[103,135],"flow":[104,136],"graph,":[105,137],"filtering":[106],"main":[109],"basic":[110,126],"blocks":[111],"based":[112],"about":[116],"timestamp":[117,145,179],"vulnerabilities.Subsequently,":[118],"operation":[120],"audits":[121],"are":[122],"conducted":[123],"these":[125],"blocks,":[127],"combined":[128],"with":[129],"graphical":[131],"structure":[132],"utilizing":[138],"gated":[139],"graph":[140],"neural":[141],"networks":[142],"for":[143,177,192],"detecting":[144,178],"vulnerabilities":[146,180],"contracts.Comparative":[149],"experiments":[150],"were":[151],"performed":[152],"two":[154],"public":[155],"datasets,":[156],"and":[157,174,186],"indicate":[160],"compared":[162],"stateof-the-art":[164],"methods,":[166],"proposed":[168],"approach":[169],"improved":[171],"F1":[175],"score":[176],"by":[184],"1.65%":[185],"6.51%,":[187],"providing":[188],"valuable":[189],"prospects":[191],"contracts.":[197]},"counts_by_year":[],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
