Author of the publication

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.

, , , , , and . ICECCS, page 125-134. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts., , , , , and . ICECCS, page 125-134. IEEE, (2020)Single Nucleotide Polymorphism and its Application in Mapping Loci Involved in Developing Human Diseases and Traits.. IJCMAM, 3 (4): 61-75 (2012)Single Nucleotide Polymorphism and its Application in Mapping Loci Involved in Developing Human Diseases and Traits.. Handbook of Research on Computational and Systems Biology, IGI Global, (2011)Classification of half-arc-transitive graphs of order 4p4p., , , , and . Eur. J. Comb., 34 (7): 1158-1176 (2013)Transcriptional Profiling of the Dose Response: A More Powerful Approach for Characterizing Drug Activities., , , , , , , , , and 5 other author(s). PLoS Computational Biology, (2009)SDRS - an algorithm for analyzing large-scale dose-response data., , , , and . Bioinformatics, 27 (20): 2921-2923 (2011)A Classification of Symmetric Graphs of Order 3p., and . J. Comb. Theory, Ser. B, 58 (2): 197-216 (1993)Construction of a reference gene association network from multiple profiling data: application to data analysis., , , , , , and . Bioinformatics, 23 (20): 2716-2724 (2007)Symmetric Graphs of Order a Product of Two Distinct Primes., , and . J. Comb. Theory, Ser. B, 58 (2): 299-318 (1993)Automorphism Groups of 2-Valent Connected Cayley Digraphs on Regular p-Groups., , and . Graphs and Combinatorics, 18 (2): 253-257 (2002)