Follow
Yebo Feng
Title
Cited by
Cited by
Year
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols
J Xu, K Paruch, S Cousaert, Y Feng
ACM Computing Surveys, 2022
1812022
Application-layer DDoS defense with reinforcement learning
Y Feng, J Li, T Nguyen
2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020
252020
Reap the harvest on blockchain: A survey of yield farming protocols
J Xu, Y Feng
IEEE Transactions on Network and Service Management 20 (1), 858-869, 2022
222022
Towards learning-based, content-agnostic detection of social bot traffic
Y Feng, J Li, L Jiao, X Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2149-2163, 2020
172020
BotFlowMon: Learning-based, content-agnostic identification of social bot traffic flows
Y Feng, J Li, L Jiao, X Wu
2019 IEEE Conference on Communications and Network Security (CNS), 169-177, 2019
172019
Poster: Content-agnostic identification of cryptojacking in network traffic
Y Feng, D Sisodia, J Li
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
102020
Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic
Y Feng, J Li, D Sisodia
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
92022
Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)
J Xu, D Perez, Y Feng, B Livshits
arXiv preprint arXiv:2302.09551, 2023
62023
SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets
Y Erinle, Y Kethepalli, Y Feng, J Xu
arXiv preprint arXiv:2307.12874, 2023
52023
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures
J Mirkovic, Y Feng, J Li
arXiv preprint arXiv:2203.00742, 2022
52022
University blockchain research initiative (UBRI): Boosting blockchain education and research
Y Feng, J Xu, L Weymouth
IEEE Potentials 41 (6), 19-25, 2022
42022
Toward explainable and adaptable detection and classification of distributed denial-of-service attacks
Y Feng, J Li
Deployable Machine Learning for Security Defense: First International …, 2020
42020
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation
C Wang, J Zhang, Y Feng, T Li, W Sun, Y Liu, X Peng
arXiv preprint arXiv:2401.06391, 2024
22024
I can still observe you: Flow-level behavior fingerprinting for online social network
Y Feng, J Luo, C Ma, T Li, L Hui
GLOBECOM 2022-2022 IEEE Global Communications Conference, 6427-6432, 2022
22022
Toward Finer Granularity Analysis of Network Traffic
Y Feng
Area Exam Report, Computer and Information Sciences Department, University …, 2022
22022
Towards Explicable and Adaptive DDoS Traffic Classification
Y Feng, J Li
The 21st Passive and Active Measurement Conference (PAM 2020), 2020
22020
Botflowmon: Identify social bot traffic with netflow and machine learning
Y Feng
University of Oregon, 2018
22018
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks
S Arora, Y Li, Y Feng, J Xu
arXiv preprint arXiv:2401.08520, 2024
12024
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems
C Ma, N Xi, D Lu, Y Feng, J Ma
arXiv preprint arXiv:2309.05978, 2023
12023
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
T Li, S Yin, R Yu, Y Feng, L Jiao, Y Shen, J Ma
IEEE Journal on Selected Areas in Communications 40 (11), 3191-3206, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20