Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques.
Hongjun WuZhuo ZhangShangwen WangYan LeiBo LinYihao QinHaoyu ZhangXiaoguang MaoPublished in: ISSRE (2021)
Keyphrases
- database
- data sets
- statistical analysis
- data collection
- data processing
- labelled data
- raw data
- input data
- small number
- high quality
- data sources
- prior knowledge
- training examples
- synthetic data
- databases
- knowledge discovery
- data points
- data mining techniques
- markov chain
- xml documents
- data analysis
- detection algorithm
- missing data
- spatial data