Author of the publication

SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network.

, , , , , , , and . ICSE, page 170:1-170:13. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Rogue ONU Identification with 1D-CNN-Based Optical Spectrum Analysis for Secure PON., , , , , and . OFC, page 1-3. IEEE, (2019)In-service Crosstalk Monitoring and Tracing for Short-Reach Space-Division Multiplexing (SDM) Optical Networks., , , , , , , and . OFC, page 1-3. IEEE, (2018)SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network., , , , , , , and . ICSE, page 170:1-170:13. ACM, (2024)Towards a Traffic-Optimal Large-Scale Optical Network Topology Design., , , and . ONDM, page 1-3. IEEE, (2022)Traceability of Product Supply Chain Based on Hyperledger Fabric., , , , , and . AISS, page 62:1-62:6. ACM, (2022)Fast Parallel Lightpath Re-Optimization for Space-Division Multiplexing Optical Networks Based on Time Synchronization., , , and . JOCN, 10 (1): A8-A19 (2018)Fast parallel lightpath re-optimization for crosstalk reduction in multi-core fiber networks., , , , and . OFC, page 1-3. IEEE, (2017)Ultra-fast Optical Network Throughput Prediction using Graph Neural Networks., , , and . ONDM, page 1-3. IEEE, (2022)Situational Awareness of E-learning System Based on Cyber-Attack and Vulnerability., , , , , and . ICWL, volume 13103 of Lecture Notes in Computer Science, page 154-159. Springer, (2021)Smart contract vulnerability detection based on variant LSTM., , , and . ICBICC, page 11:1-11:4. ACM, (2022)