
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning
Lejun Zhang, Jinlong Wang, Weizheng Wang, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3581-3581
Open Access | Times Cited: 46
Lejun Zhang, Jinlong Wang, Weizheng Wang, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3581-3581
Open Access | Times Cited: 46
Showing 1-25 of 46 citing articles:
Machine learning methods for detecting smart contracts vulnerabilities within Ethereum blockchain − A review
João Crisóstomo, Fernando Bação, Victor Lobo
Expert Systems with Applications (2025) Vol. 268, pp. 126353-126353
Open Access | Times Cited: 2
João Crisóstomo, Fernando Bação, Victor Lobo
Expert Systems with Applications (2025) Vol. 268, pp. 126353-126353
Open Access | Times Cited: 2
A novel fraud detection and prevention method for healthcare claim processing using machine learning and blockchain technology
Anokye Acheampong Amponsah, Adebayo Felix Adekoya, Benjamin Asubam Weyori
Decision Analytics Journal (2022) Vol. 4, pp. 100122-100122
Open Access | Times Cited: 56
Anokye Acheampong Amponsah, Adebayo Felix Adekoya, Benjamin Asubam Weyori
Decision Analytics Journal (2022) Vol. 4, pp. 100122-100122
Open Access | Times Cited: 56
SPCBIG-EC: A Robust Serial Hybrid Model for Smart Contract Vulnerability Detection
Lejun Zhang, Yuan Li, Tianxing Jin, et al.
Sensors (2022) Vol. 22, Iss. 12, pp. 4621-4621
Open Access | Times Cited: 32
Lejun Zhang, Yuan Li, Tianxing Jin, et al.
Sensors (2022) Vol. 22, Iss. 12, pp. 4621-4621
Open Access | Times Cited: 32
Deep learning-based solution for smart contract vulnerabilities detection
Xueyan Tang, Yuying Du, Alan Lai, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 17
Xueyan Tang, Yuying Du, Alan Lai, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 17
A comprehensive survey of smart contract security: State of the art and research directions
Guangfu Wu, HaiPing Wang, Xin Lai, et al.
Journal of Network and Computer Applications (2024) Vol. 226, pp. 103882-103882
Closed Access | Times Cited: 8
Guangfu Wu, HaiPing Wang, Xin Lai, et al.
Journal of Network and Computer Applications (2024) Vol. 226, pp. 103882-103882
Closed Access | Times Cited: 8
Blockchain of Things: Benefits, Challenges and Future Directions
Kamanashis Biswas, Mohammad Jabed Morshed Chowdhury, Muhammad Usman
Sensors (2024) Vol. 24, Iss. 3, pp. 934-934
Open Access | Times Cited: 6
Kamanashis Biswas, Mohammad Jabed Morshed Chowdhury, Muhammad Usman
Sensors (2024) Vol. 24, Iss. 3, pp. 934-934
Open Access | Times Cited: 6
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model
Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 5
Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 5
Ethereum Smart Contract Vulnerability Detection Model Based on Triplet Loss and BiLSTM
Meiying Wang, Zheyu Xie, Xuefan Wen, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2327-2327
Open Access | Times Cited: 12
Meiying Wang, Zheyu Xie, Xuefan Wen, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2327-2327
Open Access | Times Cited: 12
Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion
Weichu Deng, Huanchun Wei, Teng Huang, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7246-7246
Open Access | Times Cited: 12
Weichu Deng, Huanchun Wei, Teng Huang, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7246-7246
Open Access | Times Cited: 12
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Multiclass vulnerability and clone detection in Ethereum smart contracts using Block-wise Abstract Syntax Tree based Federated Graph Neural Networks
Shruti Sharma, Ankur Ratmele, Abhay Deep Seth
Computers & Electrical Engineering (2025) Vol. 123, pp. 110220-110220
Closed Access
Shruti Sharma, Ankur Ratmele, Abhay Deep Seth
Computers & Electrical Engineering (2025) Vol. 123, pp. 110220-110220
Closed Access
VDMAF: Cross-language source code vulnerability detection using multi-head attention fusion
Yang Li, Qin Luo, Peng Wu, et al.
Information and Software Technology (2025), pp. 107739-107739
Closed Access
Yang Li, Qin Luo, Peng Wu, et al.
Information and Software Technology (2025), pp. 107739-107739
Closed Access
SNOW: An Effective Smart Contract Reentrancy Vulnerability Detection Method Based on Joint Feature Graph and Hybrid Graph Neural Network
Wenjuan Lian, Xinze Zhang, Zikang Bao, et al.
Software Practice and Experience (2025)
Closed Access
Wenjuan Lian, Xinze Zhang, Zikang Bao, et al.
Software Practice and Experience (2025)
Closed Access
Analyzing the Impact of Elusive Faults on Blockchain Reliability
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Blockchain Research and Applications (2025), pp. 100295-100295
Open Access
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Blockchain Research and Applications (2025), pp. 100295-100295
Open Access
Blockchain Smart Contract to Prevent Forgery of Degree Certificates: Artificial Intelligence Consensus Algorithm
Seong-Kyu Kim
Electronics (2022) Vol. 11, Iss. 14, pp. 2112-2112
Open Access | Times Cited: 16
Seong-Kyu Kim
Electronics (2022) Vol. 11, Iss. 14, pp. 2112-2112
Open Access | Times Cited: 16
The k + 1 Symmetric Test Pattern for Smart Contracts
Tomasz Górski
Symmetry (2022) Vol. 14, Iss. 8, pp. 1686-1686
Open Access | Times Cited: 16
Tomasz Górski
Symmetry (2022) Vol. 14, Iss. 8, pp. 1686-1686
Open Access | Times Cited: 16
Improvement and Optimization of Vulnerability Detection Methods for Ethernet Smart Contracts
Zhongju Yang, Weixing Zhu, Minggang Yu
IEEE Access (2023) Vol. 11, pp. 78207-78223
Open Access | Times Cited: 8
Zhongju Yang, Weixing Zhu, Minggang Yu
IEEE Access (2023) Vol. 11, pp. 78207-78223
Open Access | Times Cited: 8
The Application and Ethics of Artificial Intelligence in Blockchain
Jing Chen, Feng Bao, Chenxi Li, et al.
Journal of Global Information Management (2023) Vol. 31, Iss. 7, pp. 1-32
Open Access | Times Cited: 6
Jing Chen, Feng Bao, Chenxi Li, et al.
Journal of Global Information Management (2023) Vol. 31, Iss. 7, pp. 1-32
Open Access | Times Cited: 6
Smart contract life-cycle management: an engineering framework for the generation of robust and verifiable smart contracts
İqra Mustafa, Alan McGibney, Susan Rea
Frontiers in Blockchain (2024) Vol. 6
Open Access | Times Cited: 2
İqra Mustafa, Alan McGibney, Susan Rea
Frontiers in Blockchain (2024) Vol. 6
Open Access | Times Cited: 2
Research on Detection Method of Chaotian Pepper in Complex Field Environments Based on YOLOv8
Yichu Duan, Jianing Li, Chi Zou
Sensors (2024) Vol. 24, Iss. 17, pp. 5632-5632
Open Access | Times Cited: 2
Yichu Duan, Jianing Li, Chi Zou
Sensors (2024) Vol. 24, Iss. 17, pp. 5632-5632
Open Access | Times Cited: 2
An Effective 3D Text Recurrent Voting Generator for Metaverse
Woo Hyun Park, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin
IEEE Transactions on Affective Computing (2022) Vol. 14, Iss. 3, pp. 1766-1778
Closed Access | Times Cited: 9
Woo Hyun Park, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin
IEEE Transactions on Affective Computing (2022) Vol. 14, Iss. 3, pp. 1766-1778
Closed Access | Times Cited: 9
A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms
Chunlai Du, Guizhi Xu, Yanhui Guo, et al.
Mathematics (2024) Vol. 12, Iss. 5, pp. 745-745
Open Access | Times Cited: 1
Chunlai Du, Guizhi Xu, Yanhui Guo, et al.
Mathematics (2024) Vol. 12, Iss. 5, pp. 745-745
Open Access | Times Cited: 1
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
Huaiguang Wu, Yibo Peng, Yaqiong He, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 1, pp. 77-108
Open Access | Times Cited: 1
Huaiguang Wu, Yibo Peng, Yaqiong He, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 1, pp. 77-108
Open Access | Times Cited: 1
Detection of vulnerabilities in blockchain smart contracts using deep learning
Namya Aankur Gupta, Mansi Bansal, Seema Sharma, et al.
Wireless Networks (2024)
Closed Access | Times Cited: 1
Namya Aankur Gupta, Mansi Bansal, Seema Sharma, et al.
Wireless Networks (2024)
Closed Access | Times Cited: 1
A deep learning paradigm for medical imaging data
Jinyang Chen, Cheolwoo Park
Expert Systems with Applications (2024) Vol. 255, pp. 124480-124480
Closed Access | Times Cited: 1
Jinyang Chen, Cheolwoo Park
Expert Systems with Applications (2024) Vol. 255, pp. 124480-124480
Closed Access | Times Cited: 1