default search action
Xiapu Luo
Daniel Xiapu Luo
Person information
- affiliation: Hong Kong Polytechnic University, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j126]Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. Comput. Secur. 136: 103577 (2024) - [j125]Alven C. Y. Leung, Dennis Y. W. Liu, Xiapu Luo, Man Ho Au:
A constructivist and pragmatic training framework for blockchain education for IT practitioners. Educ. Inf. Technol. 29(12): 15813-15854 (2024) - [j124]Ruiyao Huang, Qingni Shen, Yuchen Wang, Yiqi Wu, Zhonghai Wu, Xiapu Luo, Anbang Ruan:
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts. J. Syst. Softw. 216: 112107 (2024) - [j123]Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, Haipeng Cai:
Learning to Detect and Localize Multilingual Bugs. Proc. ACM Softw. Eng. 1(FSE): 2190-2213 (2024) - [j122]Ying Wang, Tao Zhang, Xiapu Luo, Peng Liang:
Special Issue on Selected Tools from the Tool Track of the 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023 Tool Track). Sci. Comput. Program. 238: 103167 (2024) - [j121]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j120]Yang Shi, Tianyuan Luo, Jingwen Liang, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2982-2996 (2024) - [j119]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j118]Yulin Zhu, Tomasz P. Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. IEEE Trans. Inf. Forensics Secur. 19: 3567-3580 (2024) - [j117]Xiangming Wang, Yang Liu, Kexin Jiao, Pengfei Liu, Xiapu Luo, Ting Liu:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. IEEE Trans. Inf. Forensics Secur. 19: 4012-4027 (2024) - [j116]Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou:
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-Based Node Classification. IEEE Trans. Knowl. Data Eng. 36(6): 2476-2489 (2024) - [j115]Zigui Jiang, Weilin Zheng, Bo Liu, Hong-Ning Dai, Haoran Xie, Xiapu Luo, Zibin Zheng, Qing Li:
Unravelling Token Ecosystem of EOSIO Blockchain. IEEE Trans. Knowl. Data Eng. 36(10): 5423-5439 (2024) - [j114]Henry Hong-Ning Dai, Daniel Xiapu Luo, Zibin Zheng, Yan Zhang, Qin Hu:
Guest Editorial Introduction to the Special Section on Advanced Networking Technologies for Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3915-3917 (2024) - [j113]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [j112]Xiaobo Ma, Jian Qu, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, Zhenhua Li, Xiaohong Guan:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - [j111]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. ACM Trans. Softw. Eng. Methodol. 33(2): 37:1-37:29 (2024) - [j110]Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Xiapu Luo, Jingzhu He, Yutian Tang:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. IEEE Trans. Software Eng. 50(4): 854-883 (2024) - [j109]Yutian Tang, Zhijie Liu, Zhichao Zhou, Xiapu Luo:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. IEEE Trans. Software Eng. 50(6): 1340-1359 (2024) - [j108]Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, Liang Feng Zhang:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. IEEE Trans. Software Eng. 50(6): 1548-1584 (2024) - [c230]Xingyu Zhu, Guanhui Ye, Xiapu Luo, Xuetao Wei:
Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking. AAAI 2024: 7784-7792 - [c229]Alven C. Y. Leung, Zoey Ziyi Li, Dennis Y. W. Liu, Richard W. C. Lui, Daniel Xiapu Luo, Siu Wo Tarloff Im:
Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation. ACE 2024: 154-163 - [c228]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models. ACISP (3) 2024: 424-443 - [c227]Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang:
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. AsiaCCS 2024 - [c226]Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou:
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach. ICDE 2024: 1213-1227 - [c225]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - [c224]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. ICSE 2024: 127:1-127:13 - [c223]Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai:
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. ICSE 2024: 149:1-149:13 - [c222]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c221]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. ICSE 2024: 159:1-159:13 - [c220]Litao Qiao, Bang Wu, Heng Li, Cuiying Gao, Wei Yuan, Xiapu Luo:
Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense. INFOCOM 2024: 211-220 - [c219]Jianfeng Li, Zheng Lin, Xiaobo Ma, Jianhao Li, Jian Qu, Xiapu Luo, Xiaohong Guan:
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization. INFOCOM 2024: 1651-1660 - [c218]Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang:
ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum. INFOCOM 2024: 1691-1700 - [c217]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. Internetware 2024 - [c216]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c215]Peilin Zheng, Bowei Su, Xiapu Luo, Ting Chen, Neng Zhang, Zibin Zheng:
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts. ISSTA 2024: 566-577 - [c214]Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li, Haoyu Wang:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. ISSTA 2024: 1440-1452 - [c213]Shuwei Song, Jiachi Chen, Ting Chen, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. ISSTA 2024: 1682-1694 - [c212]Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu:
EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM. LCTES 2024: 131-142 - [c211]Liu Wang, Conghui Zheng, Haoyu Wang, Xiapu Luo, Gareth Tyson, Yi Wang, Shangguang Wang:
Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity. MSR 2024: 322-334 - [c210]Elliott Wen, Jiaxiang Zhou, Xiapu Luo, Giovanni Russello, Jens Dietrich:
Keep Me Updated: An Empirical Study on Embedded JavaScript Engines in Android Apps. MSR 2024: 361-372 - [c209]Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang:
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. NDSS 2024 - [c208]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. NDSS 2024 - [c207]Jincheng Wang, Le Yu, Xiapu Luo:
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. SP 2024: 881-896 - [c206]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. SP 2024: 2180-2197 - [c205]Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. SP 2024: 2255-2272 - [c204]Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. SP 2024: 2348-2365 - [c203]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. USENIX Security Symposium 2024 - [c202]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [c201]Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, Hongxin Hu:
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces. WWW 2024: 1081-1091 - [c200]Yi Xie, Jiahao Feng, Wenju Huang, Yixi Zhang, Xueliang Sun, Xiaochou Chen, Xiapu Luo:
Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces. WWW 2024: 1203-1214 - [i95]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i94]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i93]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i92]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. CoRR abs/2402.02973 (2024) - [i91]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. CoRR abs/2402.13815 (2024) - [i90]Zhijie Liu, Yutian Tang, Meiyun Li, Xin Jin, Yunfei Long, Liang Feng Zhang, Xiapu Luo:
LLM-CompDroid: Repairing Configuration Compatibility Bugs in Android Apps with Pre-trained Large Language Models. CoRR abs/2402.15078 (2024) - [i89]Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang:
Demystifying the DAO Governance Process. CoRR abs/2403.11758 (2024) - [i88]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. CoRR abs/2405.20561 (2024) - [i87]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. CoRR abs/2406.10687 (2024) - [i86]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts using Large Language Models. CoRR abs/2407.08969 (2024) - [i85]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i84]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - [i83]Youqian Zhang, MK Michael Cheung, Chunxi Yang, Xinwei Zhai, Zitong Shen, Xinyu Ji, Eugene Yujun Fu, Sze-Yiu Chau, Xiapu Luo:
Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation. CoRR abs/2408.05124 (2024) - 2023
- [j107]Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo:
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. Comput. Secur. 135: 103479 (2023) - [j106]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 55(14s): 326:1-326:37 (2023) - [j105]Zigui Jiang, Xiuwen Tang, Zibin Zheng, Jinyan Guo, Xiapu Luo, Yin Li:
Calling relationship investigation and application on Ethereum Blockchain System. Empir. Softw. Eng. 28(2): 31 (2023) - [j104]Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j103]Shipeng Li, Jingwei Li, Yuxing Tang, Xiapu Luo, Zheyuan He, Zihao Li, Xi Cheng, Yang Bai, Ting Chen, Yuzhe Tang, Zhe Liu, Xiaosong Zhang:
BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing. IEEE Trans. Computers 72(8): 2377-2389 (2023) - [j102]Jingjing Zhang, Yongjie Ye, Weigang Wu, Xiapu Luo:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. IEEE Trans. Dependable Secur. Comput. 20(1): 407-421 (2023) - [j101]Cuiying Gao, Minghui Cai, Shuijun Yin, Gaozhun Huang, Heng Li, Wei Yuan, Xiapu Luo:
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features. IEEE Trans. Inf. Forensics Secur. 18: 5056-5068 (2023) - [j100]Litao Qiao, Bang Wu, Shuijun Yin, Heng Li, Wei Yuan, Xiapu Luo:
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Trans. Inf. Forensics Secur. 18: 5375-5386 (2023) - [j99]Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Sherman Shen:
Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Trans. Mob. Comput. 22(6): 3303-3317 (2023) - [j98]Qing Li, Xiao Ma, Ao Zhou, Xiapu Luo, Fangchun Yang, Shangguang Wang:
User-Oriented Edge Node Grouping in Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(6): 3691-3705 (2023) - [j97]Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, Xiaosong Zhang:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. ACM Trans. Softw. Eng. Methodol. 32(1): 26:1-26:35 (2023) - [j96]Yuan Huang, Hanyang Guo, Xi Ding, Junhuai Shu, Xiangping Chen, Xiapu Luo, Zibin Zheng, Xiaocong Zhou:
A Comparative Study on Method Comment and Inline Comment. ACM Trans. Softw. Eng. Methodol. 32(5): 126:1-126:26 (2023) - [j95]Dawei Yuan, Sen Fang, Tao Zhang, Zhou Xu, Xiapu Luo:
Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph. IEEE Trans. Reliab. 72(2): 511-526 (2023) - [j94]Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. IEEE Trans. Serv. Comput. 16(3): 1822-1832 (2023) - [j93]Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. IEEE Trans. Software Eng. 49(2): 777-801 (2023) - [j92]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [j91]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [j90]Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Software Eng. 49(4): 1983-2005 (2023) - [j89]Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. IEEE Trans. Software Eng. 49(4): 2980-2995 (2023) - [j88]Youshuai Tan, Jinfu Chen, Weiyi Shang, Tao Zhang, Sen Fang, Xiapu Luo, Zijie Chen, Shuhao Qi:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. IEEE Trans. Software Eng. 49(8): 4135-4151 (2023) - [j87]Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. IEEE Trans. Software Eng. 49(9): 4456-4476 (2023) - [j86]Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? IEEE Trans. Software Eng. 49(10): 4639-4655 (2023) - [c199]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c198]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CCS 2023: 165-179 - [c197]Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. CCS 2023: 1645-1659 - [c196]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c195]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c194]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c193]Tianqi Li, Rujun Hu, Lei Xue, Xiapu Luo:
State-Aware Unsafe Driving Action Detection and Defense. ICDCS 2023: 1077-1078 - [c192]Peilin Zheng, Xiapu Luo, Zibin Zheng:
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. ICSE 2023: 307-318 - [c191]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c190]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c189]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c188]Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. ISSTA 2023: 867-879 - [c187]Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. ISSTA 2023: 917-928 - [c186]Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. ASE 2023: 939-950 - [c185]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c184]Tiru Wu, Xi Xiao, Qing Li, Qixu Liu, Guangwu Hu, Xiapu Luo, Yong Jiang:
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs. SECON 2023: 456-464 - [c183]