Clone detection is widely exploited for software vulnerability search. T...
While huge efforts have been investigated in the adversarial testing of
...
The out-of-gas error occurs when smart contract programs are provided wi...
Ethereum Virtual Machine (EVM) is the run-time environment for smart
con...
Nowadays, quantum program is widely used and quickly developed. However,...
Deep learning (DL) systems are increasingly applied to safety-critical
d...