Author of the publication

ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively.

, , , and . QRS, page 915-925. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incremental Server Deployment for Scalable NFV-enabled Networks., , , , , and . INFOCOM, page 2361-2370. IEEE, (2020)Weakly-Supervised Discovery of Geometry-Aware Representation for 3D Human Pose Estimation., , , , , and . CoRR, (2019)DiFS: Distributed Flow Scheduling for adaptive switching in FatTree data center networks., , and . Comput. Networks, (2016)A novel data structure to support ultra-fast taxonomic classification of metagenomic sequences with k-mer signatures., , , , , and . Bioinform., 34 (1): 171-178 (2018)Investigation of Multichannel Sliding Spotlight SAR for Ultrahigh-Resolution and Wide-Swath Imaging., , , and . IEEE Geosci. Remote. Sens. Lett., 10 (6): 1339-1343 (2013)Selecting Discriminative Features for Fine-Grained Visual Classification., , , and . ACPR (1), volume 12046 of Lecture Notes in Computer Science, page 913-926. Springer, (2019)TagAttention: Mobile Object Tracing without Object Appearance Information by Vision-RFID Fusion., , , , , , and . ICNP, page 1-11. IEEE, (2019)Lossy trapdoor primitives, zero-knowledge proofs and applications. (Les primitives lossy trapdoor, preuve à divulgation nulle de connaissance et applications).. University of Rennes 1, France, (2019)Local Correlation Consistency for Knowledge Distillation., , , , , and . ECCV (12), volume 12357 of Lecture Notes in Computer Science, page 18-33. Springer, (2020)Establishing Ties with Bounded Capacity and Limited Network Access., , , , and . ICIAI, page 188-192. ACM, (2019)