Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing

R Liang, J Chen, C Wu, K He, Y Wu… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
Smart contracts, the cornerstone of decentralized applications, have become increasingly
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …

Secure Resource Allocation via Constrained Deep Reinforcement Learning

J Sun, Q Gao, C Wu, Y Li, J Wang, D Niyato - arxiv preprint arxiv …, 2025 - arxiv.org
The proliferation of Internet of Things (IoT) devices and the advent of 6G technologies have
introduced computationally intensive tasks that often surpass the processing capabilities of …

Optimized design refactoring (ODR): a generic framework for automated search-based refactoring to optimize object-oriented software architectures

T Houichime, Y El Amrani - Automated Software Engineering, 2024 - Springer
Software design optimization (SDO) demands advanced abstract reasoning to define
optimal design components' structure and interactions. Modeling tools such as UML and …

Analysis of Code Similarity with Triplet Loss-Based Deep Learning System

E Islamoğlu, A Nizam - Recent Trends and Advances in Artificial …, 2024 - books.google.com
Nowadays, several plagiarism detection tools based on static code features are available for
code similarity detection. The application of deep learning in this domain represents an …

Applying Graph Learning For Technical Debt Detection

AS Istudor - 2024 - fse.studenttheses.ub.rug.nl
In the domain of software engineering, the increasing presence of Technical Debt (TD)
poses a significant challenge for the quality and long-term maintenance of modern software …

Dmvaf: A Privacy-Preserving Multimodal Framework for Decentralized Vulnerability Assessment

Q Liu, X JU, X Chen, L Gong - Available at SSRN 5074672 - papers.ssrn.com
Abstract Software Vulnerability Assessment (SVA) plays a crucial role in identifying and
evaluating security vulnerabilities in software systems and prioritizing their resolution …

Analysis of Code Similarity with Triplet Loss-Based Deep Learning System

ATA Abdellatif, E İslamoğlu, A Nizam - International Conference on …, 2024 - Springer
Nowadays, several plagiarism detection tools based on static code features are available for
code similarity detection. The application of deep learning in this domain represents an …

Updates to the Provet Compiler

A Jones - 2024 - diva-portal.org
This thesis addresses the enhancement of the compiler for the Provet soft-SIMD architecture,
necessitated by significant updates to architecture design since the conception of the …

Utility Libraries for Traversing and Manipulating Tree-like Data Structures with Varying Schemas

A Janicki - 2024 - dspace.mit.edu
Tree-like data structures are very commonly used data types found in the wild in a wide
array of projects JavaScript projects. A specific example of one of these structures is an …

[HTML][HTML] РАЗРАБОТКА ПРОГРАММНОГО КОМПЛЕКСА ПРОВЕРКИ ПРАВИЛЬНОСТИ СОСТАВЛЕНИЯ БЛОК-СХЕМ НА ОСНОВЕ ПРОГРАММНОГО КОДА

АР Манджиева - Вестник науки, 2024 - cyberleninka.ru
Исследование фокусируется на рассмотрении методов, которые будут использованы
при разработке программного комплекса. Этот комплекс позволит визуализировать …