Combining graph neural networks with expert knowledge for smart contract vulnerability detection

Z Liu, P Qian, X Wang, Y Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection

Z Liu, P Qian, X Wang, Y Zhuang, L Qiu… - arXiv preprint arXiv …, 2021 - arxiv.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection

Z Liu, P Qian, X Wang, Y Zhuang, L Qiu… - IEEE Transactions on …, 2023 - computer.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

[PDF][PDF] Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection

Z Liu, P Qian, X Wang, Y Zhuang, L Qiu, X Wang - messi-q.github.io
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection

Z Liu, P Qian, X Wang, Y Zhuang, L Qiu… - arXiv e …, 2021 - ui.adsabs.harvard.edu
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

[PDF][PDF] Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection

Z Liu, P Qian, X Wang, Y Zhuang, L Qiu, X Wang - arxiv.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …