{"id":"https://openalex.org/W4383534794","doi":"https://doi.org/10.3390/cryptography7030034","title":"Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification","display_name":"Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification","publication_year":2023,"publication_date":"2023-07-07","ids":{"openalex":"https://openalex.org/W4383534794","doi":"https://doi.org/10.3390/cryptography7030034"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7030034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030034","pdf_url":"https://www.mdpi.com/2410-387X/7/3/34/pdf?version=1688708589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/3/34/pdf?version=1688708589","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006353589","display_name":"Anzhelika Mezina","orcid":"https://orcid.org/0000-0001-8965-6193"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Anzhelika Mezina","raw_affiliation_strings":["Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058504920","display_name":"Aleksandr Ometov","orcid":"https://orcid.org/0000-0003-3412-1639"},"institutions":[{"id":"https://openalex.org/I166825849","display_name":"Tampere University","ror":"https://ror.org/033003e23","country_code":"FI","type":"education","lineage":["https://openalex.org/I166825849"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Aleksandr Ometov","raw_affiliation_strings":["Electrical Engineering Unit, Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Unit, Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland","institution_ids":["https://openalex.org/I166825849"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058504920"],"corresponding_institution_ids":["https://openalex.org/I166825849"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":4.6171,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.95129635,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"7","issue":"3","first_page":"34","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.911899983882904,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9003000259399414,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7711046934127808},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6426118612289429},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5616828203201294},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5406996011734009},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4996974468231201},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.4834481179714203},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3571542501449585},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.324605792760849},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2947216033935547},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.16926848888397217}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7711046934127808},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6426118612289429},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5616828203201294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5406996011734009},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4996974468231201},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.4834481179714203},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3571542501449585},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.324605792760849},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2947216033935547},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.16926848888397217},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography7030034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030034","pdf_url":"https://www.mdpi.com/2410-387X/7/3/34/pdf?version=1688708589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:dspace.vut.cz:11012/213591","is_oa":true,"landing_page_url":"http://hdl.handle.net/11012/213591","pdf_url":"https://dspace.vut.cz/bitstreams/4d4da57d-10e5-459f-a1f0-c60b8881e82f/download","source":{"id":"https://openalex.org/S4306400317","display_name":"Brno University of Technology Digital Library (Brno University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60587646","host_organization_name":"Brno University of Technology","host_organization_lineage":["https://openalex.org/I60587646"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:doaj.org/article:dcc197a9d8a84503a3755c58b91f75db","is_oa":true,"landing_page_url":"https://doaj.org/article/dcc197a9d8a84503a3755c58b91f75db","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 3, p 34 (2023)","raw_type":"article"},{"id":"pmh:oai:trepo.tuni.fi:10024/208593","is_oa":true,"landing_page_url":"https://trepo.tuni.fi/handle/10024/208593","pdf_url":null,"source":{"id":"https://openalex.org/S7407055260","display_name":"Trepo - Institutional Repository of Tampere University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7030034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030034","pdf_url":"https://www.mdpi.com/2410-387X/7/3/34/pdf?version=1688708589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322282","display_name":"Jane ja Aatos Erkon S\u00e4\u00e4ti\u00f6","ror":"https://ror.org/03vxy9y38"},{"id":"https://openalex.org/F4320323337","display_name":"Tekniikan Edist\u00e4miss\u00e4\u00e4ti\u00f6","ror":"https://ror.org/03f420b93"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4383534794.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W2539190473","https://openalex.org/W2788841915","https://openalex.org/W2794965318","https://openalex.org/W2805052744","https://openalex.org/W2954151438","https://openalex.org/W2963610883","https://openalex.org/W2969315359","https://openalex.org/W2997640974","https://openalex.org/W3003036212","https://openalex.org/W3008357810","https://openalex.org/W3041830268","https://openalex.org/W3083367393","https://openalex.org/W3104720502","https://openalex.org/W3116484444","https://openalex.org/W3121385022","https://openalex.org/W3183985440","https://openalex.org/W3194103972","https://openalex.org/W3217810871","https://openalex.org/W4206573979","https://openalex.org/W4220771946","https://openalex.org/W4281681780","https://openalex.org/W4311925389","https://openalex.org/W6736162206","https://openalex.org/W6798526515"],"related_works":["https://openalex.org/W2329452785","https://openalex.org/W2356380379","https://openalex.org/W2364562957","https://openalex.org/W2364808845","https://openalex.org/W2363925233","https://openalex.org/W2773072120","https://openalex.org/W2366284060","https://openalex.org/W1794016765","https://openalex.org/W4206710999","https://openalex.org/W2391464953"],"abstract_inverted_index":{"The":[0],"development":[1],"of":[2,16,20,56,63,94,129,165,169,172,176],"Distributed":[3],"Ledger":[4],"Technology":[5],"(DLT)":[6],"is":[7,24,103,133,156],"pushing":[8],"toward":[9],"automating":[10],"decentralized":[11],"data":[12],"exchange":[13],"processes.":[14],"One":[15],"the":[17,37,90,100,108,148,153],"key":[18],"components":[19],"this":[21,127],"evolutionary":[22],"step":[23],"facilitating":[25],"smart":[26,42,97],"contracts":[27,64],"that,":[28],"in":[29,58,79,96,126,147],"turn,":[30],"come":[31],"with":[32,162],"several":[33],"additional":[34],"vulnerabilities.":[35],"Despite":[36],"existing":[38,124,188],"tools":[39],"for":[40,74,89,186],"analyzing":[41,75],"contracts,":[43,138],"keeping":[44],"these":[45],"systems":[46],"running":[47],"and":[48,76,92,144,174],"preserving":[49],"performance":[50],"while":[51],"maintaining":[52],"a":[53,59,84,116],"decent":[54],"level":[55],"security":[57],"constantly":[60],"increasing":[61],"number":[62],"becomes":[65],"challenging.":[66],"Machine":[67],"Learning":[68],"(ML)":[69],"methods":[70],"could":[71,183],"be":[72,184],"utilized":[73],"detecting":[77,115],"vulnerabilities":[78,95],"DLTs.":[80,189],"This":[81],"work":[82],"proposes":[83],"new":[85],"ML-based":[86],"two-phase":[87],"approach":[88],"detection":[91],"classification":[93],"contracts.":[98,110],"Firstly,":[99],"system\u2019s":[101],"operation":[102],"set":[104],"up":[105],"to":[106,123,141,152,158],"filter":[107],"valid":[109],"Secondly,":[111],"it":[112,155],"focuses":[113],"on":[114,136],"vulnerability":[117,160],"type,":[118],"if":[119],"any.":[120],"In":[121],"contrast":[122],"approaches":[125],"field":[128],"research,":[130],"our":[131],"algorithm":[132],"more":[134],"focused":[135],"vulnerable":[137],"which":[139,182],"allows":[140],"save":[142],"time":[143],"computing":[145],"resources":[146],"production":[149],"environment.":[150],"According":[151],"results,":[154],"possible":[157],"detect":[159],"types":[161],"an":[163],"accuracy":[164],"0.9921,":[166],"F1":[167],"score":[168],"0.9902,":[170],"precision":[171],"0.9883,":[173],"recall":[175],"0.9921":[177],"within":[178],"reasonable":[179],"execution":[180],"time,":[181],"suitable":[185],"integrating":[187]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
