Subject
Applied Mathematics,Control and Systems Engineering,Electrical and Electronic Engineering,Computer Science Applications,Instrumentation
Reference49 articles.
1. Su L, Shen X, Du X, Liao X, Wang X, Xing L, et al. Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications. In: 30th USENIX security symposium. 2021, p. 1307–24.
2. Improving ranking-oriented defect prediction using a cost-sensitive ranking svm;Yu;IEEE Trans Reliab,2019
3. Predicting the precise number of software defects: Are we there yet?;Yu;Inf Softw Technol,2022
4. Software vulnerability detection using deep neural networks: a survey;Lin;Proc IEEE,2020
5. A multimodal transformer-based code summarization approach for smart contracts;Yang,2021