
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing
Yinxing Xue, Jiaming Ye, Wei Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 21, Iss. 2, pp. 515-529
Open Access | Times Cited: 36
Yinxing Xue, Jiaming Ye, Wei Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 21, Iss. 2, pp. 515-529
Open Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Demystifying Exploitable Bugs in Smart Contracts
Zhuo Zhang, Brian Zhang, Wen Xu, et al.
(2023), pp. 615-627
Closed Access | Times Cited: 30
Zhuo Zhang, Brian Zhang, Wen Xu, et al.
(2023), pp. 615-627
Closed Access | Times Cited: 30
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, et al.
(2024), pp. 1-13
Open Access | Times Cited: 14
Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, et al.
(2024), pp. 1-13
Open Access | Times Cited: 14
Machine learning methods for detecting smart contracts vulnerabilities within Ethereum blockchain − A review
João Crisóstomo, Fernando Bação, Victor Lobo
Expert Systems with Applications (2025) Vol. 268, pp. 126353-126353
Open Access | Times Cited: 1
João Crisóstomo, Fernando Bação, Victor Lobo
Expert Systems with Applications (2025) Vol. 268, pp. 126353-126353
Open Access | Times Cited: 1
CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection
Huiwen Yang, Xiguo Gu, Xiang Chen, et al.
Science of Computer Programming (2024) Vol. 234, pp. 103076-103076
Open Access | Times Cited: 7
Huiwen Yang, Xiguo Gu, Xiang Chen, et al.
Science of Computer Programming (2024) Vol. 234, pp. 103076-103076
Open Access | Times Cited: 7
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph
Ruichao Liang, Jing Chen, Cong Wu, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Closed Access | Times Cited: 7
Ruichao Liang, Jing Chen, Cong Wu, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Closed Access | Times Cited: 7
sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts
Cuifeng Gao, Wenzhang Yang, Jiaming Ye, et al.
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-55
Open Access | Times Cited: 6
Cuifeng Gao, Wenzhang Yang, Jiaming Ye, et al.
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-55
Open Access | Times Cited: 6
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
Peng Qian, Jianting He, Lingling Lu, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 7, pp. 3793-3810
Open Access | Times Cited: 12
Peng Qian, Jianting He, Lingling Lu, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 7, pp. 3793-3810
Open Access | Times Cited: 12
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives
Sihao Hu, Tiansheng Huang, Fatih İlhan, et al.
(2023), pp. 297-306
Open Access | Times Cited: 12
Sihao Hu, Tiansheng Huang, Fatih İlhan, et al.
(2023), pp. 297-306
Open Access | Times Cited: 12
OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Empirical Software Engineering (2024) Vol. 29, Iss. 4
Open Access | Times Cited: 4
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Empirical Software Engineering (2024) Vol. 29, Iss. 4
Open Access | Times Cited: 4
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model
Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 4
Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 4
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Peiqiang Li, Guojun Wang, Xiaofei Xing, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 3
Peiqiang Li, Guojun Wang, Xiaofei Xing, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 3
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers
Shuohan Wu, Zihao Li, Luyi Yan, et al.
(2024), pp. 1-13
Open Access | Times Cited: 3
Shuohan Wu, Zihao Li, Luyi Yan, et al.
(2024), pp. 1-13
Open Access | Times Cited: 3
Vulnerability detection techniques for smart contracts: A systematic literature review
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Journal of Systems and Software (2024) Vol. 217, pp. 112160-112160
Open Access | Times Cited: 3
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Journal of Systems and Software (2024) Vol. 217, pp. 112160-112160
Open Access | Times Cited: 3
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing
Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1149-1161
Closed Access | Times Cited: 8
Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1149-1161
Closed Access | Times Cited: 8
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning
Xiangbin Li, Xiaofei Xing, Guojun Wang, et al.
Communications in computer and information science (2023), pp. 179-192
Closed Access | Times Cited: 7
Xiangbin Li, Xiaofei Xing, Guojun Wang, et al.
Communications in computer and information science (2023), pp. 179-192
Closed Access | Times Cited: 7
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing
Peng Qian, Hanjie Wu, Zeren Du, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2024), pp. 1972-1985
Open Access | Times Cited: 2
Peng Qian, Hanjie Wu, Zeren Du, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2024), pp. 1972-1985
Open Access | Times Cited: 2
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing
Mingxi Ye, Yuhong Nan, Zibin Zheng, et al.
(2023), pp. 298-309
Closed Access | Times Cited: 6
Mingxi Ye, Yuhong Nan, Zibin Zheng, et al.
(2023), pp. 298-309
Closed Access | Times Cited: 6
Towards Finding Accounting Errors in Smart Contracts
Brian Zhang
(2024), pp. 1-13
Closed Access | Times Cited: 1
Brian Zhang
(2024), pp. 1-13
Closed Access | Times Cited: 1
Seq2Seq-AFL: Fuzzing via sequence-to-sequence model
Liqun Yang, Chaoren Wei, Jian Yang, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4403-4421
Closed Access | Times Cited: 1
Liqun Yang, Chaoren Wei, Jian Yang, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 10, pp. 4403-4421
Closed Access | Times Cited: 1
Characterizing Ethereum Upgradable Smart Contracts and Their Security Implications
Xiaofan Li, Jin Yang, Jiaqi Chen, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1847-1858
Open Access | Times Cited: 1
Xiaofan Li, Jin Yang, Jiaqi Chen, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1847-1858
Open Access | Times Cited: 1
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model
Wanyi Gu, Guojun Wang, Peiqiang Li, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 1
Wanyi Gu, Guojun Wang, Peiqiang Li, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 1
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts
Nicola Ruaro, Fabio Gritti, Rob McLaughlin, et al.
(2024)
Open Access
Nicola Ruaro, Fabio Gritti, Rob McLaughlin, et al.
(2024)
Open Access
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing
Huipeng Liu, Baojiang Cui, Jie Xu, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 297-306
Closed Access
Huipeng Liu, Baojiang Cui, Jie Xu, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 297-306
Closed Access
Research on Dynamic Detection of Vulnerabilities in Smart Contracts Based on Machine Learning
Yang Boxin
(2024), pp. 219-223
Closed Access
Yang Boxin
(2024), pp. 219-223
Closed Access
The Security Paradox of Smart Contracts: Blind Spots and Prospects of Current Detection Strategies
Wenxuan Zhao, Wei Mi, Xiaodan Zhang
(2024), pp. 1546-1551
Closed Access
Wenxuan Zhao, Wei Mi, Xiaodan Zhang
(2024), pp. 1546-1551
Closed Access