Return to Article Details Detection of Re-Entrancy, Timestamp Dependence and Infinite Loop Attack in Smart Contracts Using Graph Convolution Network Download Download PDF