2020
DOI: 10.1007/s11276-020-02379-z
|View full text |Cite
|
Sign up to set email alerts
|

A new scheme of vulnerability analysis in smart contract with machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 18 publications
0
20
0
2
Order By: Relevance
“…, 3} for any vertex in R) by inserting a new vertex of degree 2 into each edge of R, and by adding a new pendant edge to each leaf of R. The collection of such {1, 2, 3}-trees T R deduced from all {1, 3}-tree R is denoted by (3)  .…”
Section: More Results On ℋ-Factorsmentioning
confidence: 99%
See 2 more Smart Citations
“…, 3} for any vertex in R) by inserting a new vertex of degree 2 into each edge of R, and by adding a new pendant edge to each leaf of R. The collection of such {1, 2, 3}-trees T R deduced from all {1, 3}-tree R is denoted by (3)  .…”
Section: More Results On ℋ-Factorsmentioning
confidence: 99%
“…graph modelling, isolated toughness, (P ≥3 , m)-factor deleted graph, isolated toughness (P ≥3 , m) factor deleted surface during the stage of network designing. It always requires the network structure to satisfy certain parameter bounds to ensure the networks with higher stand-up and less vulnerability (for more recent results on cyber security and related analysis, see Xu et al, 2 Xing et al, 3 Li et al, 4 Samira et al, 5 and Jaco et al 6 ).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An increasing number of practitioners indicate that smart contract vulnerability is hidden when blockchain and smart contracts are implemented in the manufacturing supply chain operational environment. Therefore, more researchers, such as He et al (2020) and Xing et al (2020), provide practical approaches to detecting and protecting smart contract vulnerability. However, according to our test results, if the vulnerability of smart contracts persists, its negative influence will expand gradually and further weaken the relationship between partners' trust and increasing visibility.…”
Section: High Smart Contractmentioning
confidence: 99%
“…• The two methods introduced earlier failed to consider the impact of local code vulnerabilities, resulting in poor interpretability of these methods. The slice matrix proposed by Xing et al 121 is helpful to solve this problem. Slice matrix is a new method of extracting vulnerability features.…”
Section: Deep Learningmentioning
confidence: 99%