[1] |
HEWA T , YLIANTTILA M , LIYANAGE M . Survey on blockchain based smart contracts:applications,opportunities and challenges[J]. Journal of Network and Computer Applications, 2021,177:102857.
|
[2] |
WOOD G . Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014,151(2014): 1-32.
|
[3] |
WANG S , YUAN Y , WANG X ,et al. An overview of smart contract:architecture,applications,and future trends[C]// Proceedings of 2018 IEEE Intelligent Vehicles Symposium (IV). Piscataway:IEEE Press, 2018: 108-113.
|
[4] |
ZHENG Z B , XIE S A , DAI H N . An overview on smart contracts:challenges,advances and platforms[J]. Future Generation Computer Systems, 2020,105: 475-491.
|
[5] |
CHRISTIDIS K , DEVETSIKIOTIS M . Blockchains and smart contracts for the Internet of things[J]. IEEE Access, 2016,4: 2292-2303.
|
[6] |
TORRES C F , STEICHEN M . The art of the scam:demystifying honeypots in Ethereum smart contracts[C]// Proceedings of the 28th USENIX Security Symposium. Berkeley:USENIX Association, 2019: 1591-1607.
|
[7] |
CAMINO R , TORRES C F , BADEN M ,et al. A data science approach for detecting honeypots in Ethereum[C]// Proceedings of 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Piscataway:IEEE Press, 2020: 1-9.
|
[8] |
CHEN W L , GUO X F , CHEN Z G ,et al. Honeypot contract risk warning on Ethereum smart contracts[C]// Proceedings of 2020 IEEE International Conference on Joint Cloud Computing. Piscataway:IEEE Press, 2020: 1-8.
|
[9] |
张红霞, 王琪, 王登岳 ,等. 基于深度学习的区块链蜜罐陷阱合约检测[J]. 通信学报, 2022,43(1): 194-202.
|
|
ZHANG H X , WANG Q , WANG D Y ,et al. Honeypot contract detection of blockchain based on deep learning[J]. Journal on Communications, 2022,43(1): 194-202.
|
[10] |
冀甜甜, 方滨兴, 崔翔 ,等. CADetector:跨家族的各项异性合约蜜罐检测[J]. 计算机学报, 2022,45(4): 877-895.
|
|
JI T T , FANG B X , CUI X ,et al. CADetector:cross-family anisotropic contract honeypot detection method[J]. Chinese Journal of Computers, 2022,45(4): 877-895.
|
[11] |
韩松明, 梁彬, 黄建军 ,等. DC-Hunter:一种基于字节码匹配的危险智能合约检测方案[J]. 信息安全学报, 2020,5(3): 100-112.
|
|
HAN S M , LIANG B , HUANG J J ,et al. DC-hunter:detecting dangerous smart contracts via bytecode matching[J]. Journal of Cyber Security, 2020,5(3): 100-112.
|
[12] |
HUANG J J , HAN S M , YOU W ,et al. Hunting vulnerable smart contracts via graph embedding based bytecode matching[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 2144-2156.
|
[13] |
HU H W , BAI Q L , XU Y D . SCSGuard:deep scam detection for ethereum smart contracts[C]// Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Piscataway:IEEE Press, 2022: 1-6.
|
[14] |
TIKHOMIROV S , VOSKRESENSKAYA E , IVANITSKIY I ,et al. SmartCheck:static analysis of Ethereum smart contracts[C]// Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. New York:ACM Press, 2018: 9-16.
|
[15] |
WU Z H , PAN S R , CHEN F W ,et al. A comprehensive survey on graph neural networks[J]. IEEE Transactions on Neural Networks and Learning Systems, 2021,32(1): 4-24.
|
[16] |
VELI?KOVI? P , CUCURULL G , CASANOVA A ,et al. Graph attention networks[J]. arXiv Preprint,arXiv:1710.10903, 2017.
|
[17] |
CHAWLA N V , BOWYER K W , HALL L O ,et al. SMOTE:synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2002,16: 321-357.
|
[18] |
WEI J , ZOU K . EDA:easy data augmentation techniques for boosting performance on text classification tasks[C]// Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg:Association for Computational Linguistics, 2019: 6382-6388.
|