Research Article

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability

Figure 2

Exploitation of the re-entrancy.