Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Negative Relevance Feedback for Information Filtering., , , and . Web Intelligence, page 606-613. IEEE Computer Society, (2009)Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?, , , , , , , , and . CoRR, (2024)Estimation of distribution evolution memetic algorithm for the unrelated parallel-machine green scheduling problem., , , , and . Memetic Computing, 11 (4): 423-437 (2019)GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis., , , , , , , and . ICSE, page 166:1-166:13. ACM, (2024)Detecting Smart Contract Project Anomalies in Metaverse., , , , , , , and . MetaCom, page 524-532. IEEE, (2023)Port Forwarding Services Are Forwarding Security Risks., , , , and . CoRR, (2024)The APC Algorithm of Solving Large-Scale Linear Systems: A Generalized Analysis., , , and . ChinaCom, volume 500 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2022)Study on the Evolution of Public Opinion on Public Health Events., , and . ChineseCSCW (2), volume 2013 of Communications in Computer and Information Science, page 235-251. Springer, (2023)LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning., , , , , , , and . CoRR, (2024)Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications., , , , , , , and . CoRR, (2024)