共 33 条
[1]
Abadi M., 2015, arXiv, DOI [10.48550/arXiv.1603.04467, DOI 10.48550/ARXIV.1603.04467]
[2]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[4]
Devlin J, 2019, Arxiv, DOI arXiv:1810.04805
[5]
Dhillon V., 2017, Blockchain Enabled Applications, P67
[6]
Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts
[J].
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020),
2020,
:530-541
[7]
Empirical Review of Java']Java Program Repair Tools: A Large-Scale Experiment on 2,141 Bugs and 23,551 Repair Attempts
[J].
ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2019,
:302-313
[8]
Fan Y., 2021, Collaborative Computing: Networking, Applications and Worksharing, P335
[9]
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[10]
Guo DY, 2021, Arxiv, DOI arXiv:2009.08366