From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SoliTester: Detecting exploitable external-risky vulnerability in smart contracts using contract account triggering method., , , и . J. Softw. Evol. Process., (июля 2024)Towards Task-Harmonious Vulnerability Assessment Based on LLM., , , , и . ICPC, стр. 49-59. IEEE, (2025)A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately., , и . QRS, стр. 53-62. IEEE, (2022)Users' Comment Mining for App Software's Quality-in-Use., , и . ChineseCSCW, том 1042 из Communications in Computer and Information Science, стр. 510-525. Springer, (2019)CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph., , , и . COMPSAC, стр. 699-704. IEEE, (2023)Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding., , и . ISSRE, стр. 683-693. IEEE, (2023)Why Smart Contracts Reported as Vulnerable Were Not Exploited?, , , и . IEEE Trans. Dependable Secur. Comput., 22 (3): 2579-2596 (мая 2025)PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively., , , и . QRS Companion, стр. 70-78. IEEE, (2022)ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively., , , и . QRS, стр. 915-925. IEEE, (2021)Model Checking the Safety of Raft Leader Election Algorithm., , , и . QRS, стр. 400-409. IEEE, (2022)