Big-data Analysis of Multi-source Logs for Anomaly Detection on Network-based System Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan The IEEE Conference on Automation Science and Engineering (CASE), 2017 | 35 | 2017 |
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts Y Fang, D Wu, X Yi, S Wang, Y Chen, M Chen, Y Liu, L Jiang The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023 | 7 | 2023 |
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects X Yi, Y Fang, D Wu, L Jiang The Network and Distributed System Security Symposium (NDSS), 2023 | 7 | 2023 |
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang The ACM Joint European Software Engineering Conference and Symposium on the …, 2022 | 7* | 2022 |
Motion-senor Behavior Analysis for Continuous Authentication on Smartphones C Shen, Y Li, T Yu, S Yuan, X Yi, X Guan The World Congress on Intelligent Control and Automation (WCICA), 2016 | 5 | 2016 |
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets M Chen, D Wu, X Yi, J Xu arXiv e-prints, arXiv: 2101.06454, 2021 | 3* | 2021 |
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition X Yang, D Wu, X Yi, JHM Lee, T Lee arXiv preprint arXiv:2206.13356, 2022 | 2 | 2022 |
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search Z Zhang, H Ma, D Wu, D Gao, X Yi, Y Chen, Y Wu, L Jiang The IEEE European Symposium on Security and Privacy (EuroS&P), 2024 | | 2024 |