# RESEARCH

Deep Smart Contract Intent Detection

{% file src="/files/txZ9Dc8EPra8jtkIE91o" %}

AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective

{% file src="/files/EiGEomCxssOdYjAIjLmf" %}

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

{% file src="/files/q1iG2Mt30NKPSRpD6naI" %}

Tackling Long-Range Malware Detection Tasks Using Holographic Global Convolutional Networks

{% file src="/files/wF2Z4EFGWVuxwVhauqzG" %}

Veritas: Layer-2 Scaling Solution for Decentralized Oracles on Ethereum Blockchain with Reputation and Real-Time Considerations

{% file src="/files/v1qZoUddxQhFKQxMPlyj" %}

Artificial Intelligence (AI) Cybersecurity Dimensions: A Comprehensive Framework for Understanding Adversarial and Offensive AI

{% file src="/files/y4fEBfqbd133TD6W6uLj" %}

THREATKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management

{% file src="/files/Rhk9p86vcIblTkGKHWT4" %}

The Intersection of Artificial Intelligence and Cybersecurity: Challenges and Opportunities

{% file src="/files/zedGuPDBQ9ek5D8HBdoG" %}

Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study

{% file src="/files/pwDjlNsOmF5X0H7ZXH98" %}

Towards Secure and Trusted-by-Design Smart Contracts

{% file src="/files/kMeiqca5HSQ5JS2AdsML" %}

DISL: Fueling Research with A Large Dataset of Solidity Smart Contracts

{% file src="/files/eW5KilTUmsK32Niy8ag6" %}

Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications

{% file src="/files/sFPEV4emOPrSNGNaGL5W" %}

Large Language Models for Blockchain Security: A Systematic Literature Review

{% file src="/files/u3doQ4GSiAJYlfVAkzWp" %}

AuditGPT: Auditing Smart Contracts with ChatGPT

{% file src="/files/gpk6NZafU5eJOsCCbX4Q" %}

Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts

{% file src="/files/r5Z0VQ5MDBySnpX9i8gY" %}

Teaching Machines to Code: Smart Contract Translation With LLMs

{% file src="/files/FszNGwSWDHNNVsFNU2le" %}

Fixing Smart Contract Vulnerabilities: A Comparative Analysis of Literature and Developer’s Practices

{% file src="/files/AH9cGVDDLbJvTbmLbVTb" %}

SmartML: Towards a Modeling Language for Smart Contracts

{% file src="/files/Sq6YNkUqAu52z19qcuoy" %}

Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair

{% file src="/files/qJ3jPKKiB75jw1TkP4t8" %}

Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study

{% file src="/files/3tTtXTpqESsSoGeJD6N4" %}

TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts

{% file src="/files/PNCUS2FKVYHOekO35z70" %}

Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?

{% file src="/files/qCOf7ycO2dnstOudcXpd" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.veritasprotocol.com/research.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
