Smart Contract Vulnerability Detection Model Based on Siamese Network.
Weijie ChenRan GuoGuopeng WangLejun ZhangJing QiuShen SuYuan LiuGuangxia XuHuiling ChenPublished in: SmartCom (2022)
Keyphrases
- detection algorithm
- false positives
- detection rate
- buffer overflow
- object detection
- peer to peer
- network management
- wireless sensor networks
- network design
- network model
- automatic detection
- computer networks
- network structure
- detection method
- network traffic
- false alarms
- anomaly detection
- supply chain
- network configuration
- real time