Funder
Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada
Japan Society for the Promotion of Science
Microsoft Azure for Research
Publisher
Springer Science and Business Media LLC
Reference50 articles.
1. Baker BS (1992) A program for identifying duplicated code Computer Science and Statistics: Proceedings of the 24th Symposium on the Interface, vol 24, pp 49–57
2. Bartoletti M, Carta S, Cimoli T, Saia R (2017) Dissecting ponzi schemes on Ethereum: identification, analysis, and impact, vol abs/1703.03779. arXiv:1703.03779
3. Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33(9):577–591. https://doi.org/10.1109/TSE.2007.70725
4. Bettenburg N, Shang W, Ibrahim WM, Adams B, Zou Y, Hassan AE (2012) An empirical study on inconsistent changes to code clones at the release level. Sci. Comput. Program. 77(6):760–776. https://doi.org/10.1016/j.scico.2010.11.010
5. Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics 5:135–146
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Token Composition: A Graph Based on EVM Logs;2024 IEEE International Conference on Omni-layer Intelligent Systems (COINS);2024-07-29
2. A large-scale exploratory study on the proxy pattern in Ethereum;Empirical Software Engineering;2024-06-04
3. sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts;ACM Transactions on Software Engineering and Methodology;2024-06-04
4. Fake Credit Transaction Detection Using Machine Learning;International Journal of Research In Science & Engineering;2024-04-01
5. Towards Assessing the Real-World Impact of Defects in Blockchain-Based Smart Contracts;Proceedings of the 1st International Workshop on Software Defect Datasets;2023-12-08