共 43 条
[1]
Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
[2]
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[3]
[Anonymous], 2015, Lecture Notes in Business Information Processing, DOI DOI 10.1007/978-3-319-21915-8_1
[4]
[Anonymous], 2017, ARXIV170303779
[5]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[6]
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI [10.5663/aps.v1i1.10138, DOI 10.5663/APS.V1I1.10138]
[7]
XGBoost: A Scalable Tree Boosting System
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:785-794
[8]
Chen T, 2017, 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), P442, DOI 10.1109/SANER.2017.7884650
[10]
Christin N., 2013, Proceedings of the 22nd International Conference on World Wide Web, WWW'13, P213, DOI DOI 10.1145/2488388.2488408