Abstract: Smart contract vulnerabilities have led to massive losses in digital assets. While researchers have proposed numerous detection methods utilizing static analysis, fuzzing, and deep learning, ...
Abstract: With the development of Integrated Sensing and Communication (ISAC) for Sixth-Generation (6G) wireless systems, contactless human recognition has emerged as one of the key application ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results