Login / Signup
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding.
André Storhaug
Jingyue Li
Tianyuan Hu
Published in:
CoRR (2023)
Keyphrases
</>
genetic algorithm
computationally expensive
case study
wireless sensor networks
computationally efficient
information security
error correcting