A Survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future Generation Computer Systems, 2017 | 638 | 2017 |
Under-Optimized Smart Contracts Devour Your Money T Chen, X Li, X Luo, X Zhang SANER, 2017 | 176 | 2017 |
Understanding Ethereum via Graph Analysis T Chen, Z Li, Y Zhu, J Chen, X Luo, JC Lui, X Lin, X Zhang ACM Transactions on Internet Technology, 2020 | 99 | 2020 |
Understanding Ethereum via Graph Analysis T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhang INFOCOM, 2018 | 95 | 2018 |
State of the art: Dynamic symbolic execution for automated test generation T Chen, X Zhang, S Guo, H Li, Y Wu Future Generation Computer Systems 29 (7), 1758-1773, 2013 | 80 | 2013 |
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks T Chen, X Li, Y Wang, J Chen, X Luo, MH Au, X Zhang ISPEC, 2017 | 55 | 2017 |
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART L Xue, Y Zhou, T Chen, X Luo, G Gu UESNIX SECURITY, 2017 | 46 | 2017 |
Towards Saving Money in Using Smart Contracts T Chen, Z Li, H Zhou, J Chen, X Li, X Luo, X Zhang ICSE, 2018 | 38 | 2018 |
Research and application of the transparent data encpryption in intranet data leakage prevention X Zhang, F Liu, T Chen, H Li 2009 International Conference on Computational Intelligence and Security 2 …, 2009 | 27 | 2009 |
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks X Zhang, T Chen, J Zheng, H Li Journal of Zhejiang University SCIENCE C 11 (2), 119-129, 2010 | 26 | 2010 |
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang CCS, 2019 | 25 | 2019 |
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code F Wei, X Lin, X Ou, T Chen, X Zhang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 23 | 2018 |
Automated Forensic Analysis of Mobile Applications on Android Devices X Lin, T Chen, T Zhu, K Yang, F Wei DFRWS USA, 2018 | 21 | 2018 |
Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost B Cheng, J Ming, J Fu, G Peng, T Chen, X Zhang, JY Marion Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 21 | 2018 |
FPM: Four-factors Propagation Model for passive P2P worms T Chen, X Zhang, Y Wu Future Generation Computer Systems 36, 133-141, 2014 | 15 | 2014 |
Characterizing the Impacts of Application Layer DDoS Attacks M Jiang, C Wang, X Luo, T Miu, T Chen ICWS, 2017 | 12 | 2017 |
A hybrid detection approach for zero-day polymorphic shellcodes T Chen, X Zhang, Z Liu 2009 International Conference on E-Business and Information System Security, 1-5, 2009 | 12 | 2009 |
Design and implementation of a dynamic symbolic execution tool for windows executables T Chen, X Zhang, C Zhu, X Ji, S Guo, Y Wu Journal of Software: Evolution and Process 25 (12), 1249-1272, 2013 | 11 | 2013 |
DataEther: Data Exploration Framework For Ethereum T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ... ICDCS, 2019 | 10 | 2019 |
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code D Wang, J Ming, T Chen, X Zhang, C Wang RESEC, 2018 | 10 | 2018 |