Sign in

Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding.

André StorhaugJingyue LiTianyuan Hu
Published in: CoRR (2023)
Keyphrases
  • genetic algorithm
  • computationally expensive
  • case study
  • wireless sensor networks
  • computationally efficient
  • information security
  • error correcting