Systematic review of security vulnerabilities in ethereum blockchain smart contract

SS Kushwaha, S Joshi, D Singh, M Kaur… - IEEE Access, 2022 - ieeexplore.ieee.org
Blockchain is a revolutionary technology that enables users to communicate in a trust-less
manner. It revolutionizes the modes of business between organizations without the need for …

Ethereum smart contract analysis tools: A systematic review

SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee - Ieee Access, 2022 - ieeexplore.ieee.org
Blockchain technology and its applications are gaining popularity day by day. It is a ground-
breaking technology that allows users to communicate without the need of a trusted …

Contrastive learning for cold-start recommendation

Y Wei, X Wang, Q Li, L Nie, Y Li, X Li… - Proceedings of the 29th …, 2021 - dl.acm.org
Recommending purely cold-start items is a long-standing and fundamental challenge in the
recommender systems. Without any historical interaction on cold-start items, the …

Smart contract vulnerability detection combined with multi-objective detection

L Zhang, J Wang, W Wang, Z Jin, Y Su, H Chen - Computer Networks, 2022 - Elsevier
Blockchains have been booming in recent years. As a decentralized system architecture,
smart contracts give blockchains a user-defined logic. A smart contract is an executable …

Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting

Z Liu, P Qian, J Yang, L Liu, X Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain smart contracts have given rise to a variety of interesting and compelling
applications and emerged as a revolutionary force for the Internet. Smart contracts from …

[HTML][HTML] Strengthening the security of smart contracts through the power of artificial intelligence

M Krichen - Computers, 2023 - mdpi.com
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a
blockchain. Despite the fact that they offer numerous advantages, such as automation and …

Towards an understanding of large language models in software engineering tasks

Z Zheng, K Ning, J Chen, Y Wang, W Chen… - arXiv preprint arXiv …, 2023 - arxiv.org
Large Language Models (LLMs) have drawn widespread attention and research due to their
astounding performance in tasks such as text generation and reasoning. Derivative …

Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion

Z Liu, P Qian, X Wang, L Zhu, Q He, S Ji - arXiv preprint arXiv:2106.09282, 2021 - arxiv.org
Smart contracts hold digital coins worth billions of dollars, their security issues have drawn
extensive attention in the past years. Towards smart contract vulnerability detection …

[PDF][PDF] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.

C Sendner, H Chen, H Fereidooni, L Petzi, J König… - NDSS, 2023 - ndss-symposium.org
Ethereum smart contracts are automated decentralized applications on the blockchain that
describe the terms of the agreement between buyers and sellers, reducing the need for …

2D Human pose estimation: A survey

H Chen, R Feng, S Wu, H Xu, F Zhou, Z Liu - Multimedia systems, 2023 - Springer
Human pose estimation aims at localizing human anatomical keypoints or body parts in the
input data (eg, images, videos, or signals). It forms a crucial component in enabling …