Login / Signup
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph.
Peng Su
Jingyuan Hu
Published in:
Multim. Syst. (2024)
Keyphrases
</>
flow graph
flow graphs
detection algorithm
random walk
automatic detection
object detection
detection method
machine learning
false positives
shortest path
information security
false alarms
bit rate
detection rate
information flow
active control