The following publications are possibly variants of this publication:
- SCGformer: Smart contract vulnerability detection based on control flow graph and transformerKexin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu. iet-blc, 3(4):213-221, December 2023. [doi]
- Smart contract vulnerability detection based on variant LSTMRuijie Luo, Feng Luo, Bingsen Wang, Ting Chen. icbicc 2022: [doi]
- A Semantic Analysis-Based Method for Smart Contract VulnerabilityXingrun Yan, Shuo Wang, Keke Gai. bigdatasec 2022: 23-28 [doi]
- Data Flow-driven and Attention Mechanism-enabled Smart Contract Vulnerability Detection for Secure and Green Blockchain-based Service NetworksYuanlong Cao, Fan Jiang, Jianmao Xiao, Shaolong Chen, Wei Yang 0015, Yugen Yi. icc 2023: 5135-5140 [doi]
- Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training TechniquesHongjun Wu, Zhuo Zhang 0007, Shangwen Wang, Yan Lei, Bo Lin, Yihao Qin, Haoyu Zhang, Xiaoguang Mao. issre 2021: 378-389 [doi]