Cited By
View all- Zhang XSun WXu ZCheng HCai CCui HLi Q(2024)EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and PreventionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.334985219(2517-2532)Online publication date: 2024
- Callanan GGruian FZhu Qvon Hanxleden RStephen EBrandt J(2023)Scalable Actor Networks with CALProceedings of the 21st ACM-IEEE International Conference on Formal Methods and Models for System Design10.1145/3610579.3611074(169-179)Online publication date: 21-Sep-2023
- Campos Ferreira Guimarães BQuintão Pereira FVerbrugge CLhoták OShen X(2023)Lazy Evaluation for the Lazy: Automatically Transforming Call-by-Value into Call-by-NeedProceedings of the 32nd ACM SIGPLAN International Conference on Compiler Construction10.1145/3578360.3580270(239-249)Online publication date: 17-Feb-2023
- Show More Cited By