{"id":"https://openalex.org/W4398777040","doi":"https://doi.org/10.3390/info15060302","title":"The Impact of Input Types on Smart Contract Vulnerability Detection Performance Based on Deep Learning: A Preliminary Study","display_name":"The Impact of Input Types on Smart Contract Vulnerability Detection Performance Based on Deep Learning: A Preliminary Study","publication_year":2024,"publication_date":"2024-05-24","ids":{"openalex":"https://openalex.org/W4398777040","doi":"https://doi.org/10.3390/info15060302"},"language":"en","primary_location":{"id":"doi:10.3390/info15060302","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060302","pdf_url":"https://www.mdpi.com/2078-2489/15/6/302/pdf?version=1716549205","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/6/302/pdf?version=1716549205","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057553683","display_name":"Izdehar M. Aldyaflah","orcid":"https://orcid.org/0009-0007-6967-1485"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Izdehar M. Aldyaflah","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH 44115, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH 44115, USA","institution_ids":["https://openalex.org/I102607778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065763841","display_name":"Wenbing Zhao","orcid":"https://orcid.org/0000-0002-3202-1127"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wenbing Zhao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH 44115, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH 44115, USA","institution_ids":["https://openalex.org/I102607778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037089910","display_name":"Shunkun Yang","orcid":"https://orcid.org/0000-0002-8226-4477"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunkun Yang","raw_affiliation_strings":["School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070952629","display_name":"Xiong Luo","orcid":"https://orcid.org/0000-0002-1929-8447"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Luo","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China","institution_ids":["https://openalex.org/I92403157"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065763841"],"corresponding_institution_ids":["https://openalex.org/I102607778"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":4.871,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.95166585,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"15","issue":"6","first_page":"302","last_page":"302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7803125381469727},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.618051290512085},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.565213680267334},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5421127080917358},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4991631507873535},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4904167354106903},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.48043084144592285},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.43817752599716187},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.42441457509994507},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.41832882165908813},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3653072118759155},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.36397624015808105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27361857891082764},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09139770269393921}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7803125381469727},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.618051290512085},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.565213680267334},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5421127080917358},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4991631507873535},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4904167354106903},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.48043084144592285},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.43817752599716187},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.42441457509994507},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.41832882165908813},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3653072118759155},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.36397624015808105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27361857891082764},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09139770269393921},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15060302","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060302","pdf_url":"https://www.mdpi.com/2078-2489/15/6/302/pdf?version=1716549205","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:761d7c9426bf412d8c09ac4982b229f6","is_oa":true,"landing_page_url":"https://doaj.org/article/761d7c9426bf412d8c09ac4982b229f6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 6, p 302 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15060302","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060302","pdf_url":"https://www.mdpi.com/2078-2489/15/6/302/pdf?version=1716549205","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1940256228","display_name":null,"funder_award_id":"M21032","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G6523182227","display_name":null,"funder_award_id":"L211020","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4398777040.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W2097732278","https://openalex.org/W2131744502","https://openalex.org/W2148143831","https://openalex.org/W2604844934","https://openalex.org/W2762995172","https://openalex.org/W2769792160","https://openalex.org/W2948805388","https://openalex.org/W2967591898","https://openalex.org/W2982275082","https://openalex.org/W2998019984","https://openalex.org/W3005065812","https://openalex.org/W3035733952","https://openalex.org/W3121385022","https://openalex.org/W3174103852","https://openalex.org/W3187454871","https://openalex.org/W3199463718","https://openalex.org/W3217402958","https://openalex.org/W4205092120","https://openalex.org/W4206573979","https://openalex.org/W4207061384","https://openalex.org/W4211181447","https://openalex.org/W4220771946","https://openalex.org/W4229376650","https://openalex.org/W4283157082","https://openalex.org/W4313569595","https://openalex.org/W6804467738"],"related_works":["https://openalex.org/W2031284701","https://openalex.org/W3141203889","https://openalex.org/W1969486489","https://openalex.org/W2156039046","https://openalex.org/W2418771911","https://openalex.org/W2994187804","https://openalex.org/W2960441665","https://openalex.org/W2070558560","https://openalex.org/W2025937185","https://openalex.org/W2091948289"],"abstract_inverted_index":{"Stemming":[0],"vulnerabilities":[1,33],"out":[2],"of":[3,17,40,54,68,81,99,126],"a":[4,117,189,197],"smart":[5,35,43],"contract":[6],"prior":[7],"to":[8,13,30],"its":[9],"deployment":[10],"is":[11,64,147],"essential":[12],"ensure":[14],"the":[15,42,52,65,97,105,122,127,133,138,148,154,167,182,206],"security":[16],"decentralized":[18],"applications.":[19],"As":[20],"such,":[21],"numerous":[22],"tools":[23],"and":[24,88,137,171,192],"machine-learning-based":[25],"methods":[26,57],"have":[27,47],"been":[28,49,60],"proposed":[29],"help":[31],"detect":[32],"in":[34,113,132,161,173,188,196,205],"contracts.":[36],"Furthermore,":[37],"various":[38],"ways":[39],"encoding":[41],"contracts":[44],"for":[45,176,181],"analysis":[46],"also":[48],"proposed.":[50],"However,":[51],"impact":[53],"these":[55,100],"input":[56,101,129,151],"has":[58,157,166],"not":[59],"systematically":[61],"studied,":[62],"which":[63],"primary":[66],"goal":[67],"this":[69,72],"paper.":[70],"In":[71],"preliminary":[73],"study,":[74],"we":[75,103,120],"experimented":[76],"with":[77],"four":[78,128],"common":[79],"types":[80,130,179],"input,":[82],"including":[83],"Word2Vec,":[84],"FastText,":[85],"Bag-of-Words":[86],"(BoW),":[87],"Term":[89],"Frequency\u2013Inverse":[90],"Document":[91],"Frequency":[92],"(TF-IDF).":[93],"To":[94],"focus":[95],"on":[96],"comparison":[98],"types,":[102],"used":[104],"same":[106],"deep-learning":[107],"model,":[108],"i.e.,":[109],"convolutional":[110],"neural":[111],"networks,":[112],"all":[114,162,177],"experiments.":[115],"Using":[116],"public":[118],"dataset,":[119],"compared":[121],"vulnerability":[123,178,184],"detection":[124,159],"performance":[125,160],"both":[131],"binary":[134,174],"classification":[135,140],"scenarios":[136],"multiclass":[139,207],"scenario.":[141],"Our":[142],"findings":[143],"show":[144],"that":[145],"TF-IDF":[146,156,186],"best":[149,168],"overall":[150],"type":[152],"among":[153],"four.":[155],"excellent":[158],"scenarios:":[163],"(1)":[164],"it":[165,194],"F1":[169],"score":[170],"accuracy":[172],"classifications":[175],"except":[180],"delegate":[183],"where":[185],"comes":[187,195],"close":[190,199],"second,":[191],"(2)":[193],"very":[198],"second":[200],"behind":[201],"BoW":[202],"(within":[203],"0.8%)":[204],"classification.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
