{"id":"https://openalex.org/W4389731158","doi":"https://doi.org/10.3233/faia231090","title":"Power of Fuzzing and Machine Learning in Smart Contract Security Validation","display_name":"Power of Fuzzing and Machine Learning in Smart Contract Security Validation","publication_year":2023,"publication_date":"2023-12-12","ids":{"openalex":"https://openalex.org/W4389731158","doi":"https://doi.org/10.3233/faia231090"},"language":"en","primary_location":{"id":"doi:10.3233/faia231090","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia231090","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231090","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231090","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113071310","display_name":"Ghazi Mergani Ahmead Ali","orcid":"https://orcid.org/0009-0001-3296-3923"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ghazi Mergani Ali","raw_affiliation_strings":["University of Science and Technology Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101584097","display_name":"Hongsong Chen","orcid":"https://orcid.org/0000-0002-8159-4984"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongsong Chen","raw_affiliation_strings":["University of Science and Technology Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101584097"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":0.7268,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77166243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.786369800567627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7273128032684326},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6995866298675537},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5608167052268982},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5345349311828613},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44392597675323486},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4237726032733917},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3470040559768677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34628868103027344},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.33474379777908325},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12335777282714844},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.12244313955307007}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.786369800567627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7273128032684326},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6995866298675537},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5608167052268982},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5345349311828613},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44392597675323486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4237726032733917},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3470040559768677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34628868103027344},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.33474379777908325},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12335777282714844},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.12244313955307007}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia231090","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia231090","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231090","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia231090","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia231090","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231090","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389731158.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1822607638","https://openalex.org/W2043100293","https://openalex.org/W2101380213","https://openalex.org/W2506890206","https://openalex.org/W2793157084","https://openalex.org/W2795144752","https://openalex.org/W2808815243","https://openalex.org/W2810375457","https://openalex.org/W2846896781","https://openalex.org/W2996273535","https://openalex.org/W3000032641","https://openalex.org/W3003036212","https://openalex.org/W3041830268","https://openalex.org/W3091620507","https://openalex.org/W3105187050","https://openalex.org/W3159818932","https://openalex.org/W3214421193","https://openalex.org/W4285060547","https://openalex.org/W4288257480","https://openalex.org/W4289717319","https://openalex.org/W4300795824","https://openalex.org/W4323712682"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W4385301282","https://openalex.org/W3023977444","https://openalex.org/W2766647240","https://openalex.org/W4210660460","https://openalex.org/W4365601033"],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"revolutionized":[2],"digital":[3],"payments":[4],"and":[5,38,46,93,163,203],"transactions":[6,20],"by":[7,160],"introducing":[8],"disruptive":[9],"capabilities.":[10],"It":[11],"operates":[12],"through":[13,85],"smart":[14,83,181,193],"contracts,":[15,24],"automated":[16,65],"software":[17],"code":[18],"facilitating":[19],"without":[21],"intermediaries.":[22],"Smart":[23],"written":[25],"in":[26,180,189],"various":[27],"languages,":[28],"have":[29],"gained":[30],"popularity":[31],"but":[32],"are":[33],"vulnerable":[34],"to":[35,43,100,117,122,173,199],"logic":[36],"flaws":[37],"security":[39,52],"threats,":[40],"potentially":[41],"leading":[42],"financial":[44],"losses":[45],"undermining":[47],"blockchain":[48],"integrity.":[49],"Validating":[50],"their":[51],"is":[53,134,153,172],"essential,":[54],"although":[55],"current":[56],"tools":[57],"only":[58],"detect":[59],"specific":[60],"attacks,":[61],"lacking":[62],"a":[63,70,142],"comprehensive":[64],"solution.":[66],"This":[67],"article":[68],"presents":[69],"two-stage":[71],"process":[72],"wherein":[73],"the":[74,78,86,102,110,114,119,126,130,156,175,190],"initial":[75],"phase":[76],"involves":[77],"extraction":[79],"of":[80,88,104,113,168,177,192],"characteristics":[81],"from":[82],"contracts":[84],"analysis":[87],"abstract":[89],"syntax":[90],"trees":[91],"(ASTs)":[92],"control":[94],"flow":[95],"graphs":[96],"(CFGs).":[97],"In":[98,129],"order":[99],"improve":[101],"precision":[103],"our":[105],"results,":[106],"we":[107],"can":[108],"leverage":[109],"distinctive":[111],"capabilities":[112],"fuzzing":[115],"technique":[116,171],"label":[118],"data":[120],"prior":[121],"its":[123],"integration":[124],"into":[125],"training":[127],"model.":[128],"subsequent":[131],"phase,":[132],"approach":[133,152],"utilized":[135],"neural":[136,147,161],"decision":[137,143,164],"tree":[138,144],"(NDT)":[139],"typically":[140],"combines":[141],"structure":[145],"with":[146],"network":[148],"components.":[149],"The":[150,166,183],"mixed-method":[151],"utilized,":[154],"leveraging":[155],"distinct":[157],"advantages":[158],"offered":[159],"networks":[162],"trees.":[165],"purpose":[167],"this":[169],"collaborative":[170],"enhance":[174],"probability":[176],"identifying":[178],"vulnerabilities":[179],"contracts.":[182],"experimental":[184],"assessment":[185],"yielded":[186],"favorable":[187],"outcomes":[188],"detection":[191],"contract":[194],"vulnerabilities,":[195],"namely":[196],"those":[197],"pertaining":[198],"Reentrancy,":[200],"integer":[201],"overflow,":[202],"Block":[204],"Number":[205],"Dependency.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
