Indonesian Journal of Electrical Engineering and Computer Science
Vol 38, No 3: June 2025

Vulnerability detection in smart contact using chaos optimization-based DL model

Vaddadi, Srinivas A (Unknown)
Somanathan Pillai, Sanjaikanth E Vadakkethil (Unknown)
Vallabhaneni, Rohith (Unknown)
Addula, Santosh Reddy (Unknown)
Ananthan, Bhuvanesh (Unknown)



Article Info

Publish Date
01 Jun 2025

Abstract

This research article introduces a deep learning (DL) for identifying vulnerabilities in the smart contracts, leveraging an optimized DL method. The proposed method, termed LogT BiLSTM, combines bidirectional long short-term memory (BiLSTM) with logistic chaos Tasmanian devil optimization (LogT) for enhancing detection of vulnerability. The evaluation of the suggested approach is conducted using publicly available datasets. Initially, preprocessing steps involve removing duplicate data and imputing missing data. Subsequently, the vulnerability detection process utilizes BiLSTM, with the optimization of the loss function achieved through LogT. Results indicate promising performance in identifying vulnerabilities in SC, highlighting the efficacy of the LogT-BiLSTM approach.

Copyrights © 2025