Search Results for author: Xueyan Tang

Found 3 papers, 1 papers with code

Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on Chain of Thought

no code implementations19 Feb 2024 Yuying Du, Xueyan Tang

These experimental results indicate that GPT-4 lacks the ability to detect smart contract vulnerabilities effectively, but its performance in contract code parsing and PoC writing demonstrates its significant potential as an auxiliary tool in enhancing the efficiency and effectiveness of smart contract security audits.

Vulnerability Detection

Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint

no code implementations12 Aug 2020 Jing Tang, Xueyan Tang, Andrew Lim, Kai Han, Chongshou Li, Junsong Yuan

Second, we enhance the modified greedy algorithm to derive a data-dependent upper bound on the optimum.

Efficient Approximation Algorithms for Adaptive Influence Maximization

2 code implementations14 Apr 2020 Keke Huang, Jing Tang, Kai Han, Xiaokui Xiao, Wei Chen, Aixin Sun, Xueyan Tang, Andrew Lim

In this paper, we propose the first practical algorithm for the adaptive IM problem that could provide the worst-case approximation guarantee of $1-\mathrm{e}^{\rho_b(\varepsilon-1)}$, where $\rho_b=1-(1-1/b)^b$ and $\varepsilon \in (0, 1)$ is a user-specified parameter.

Social and Information Networks

Cannot find the paper you are looking for? You can Submit a new open access paper.