Ting Chen
Ting Chen
Professor, UESTC
Correu electrònic verificat a uestc.edu.cn - Pàgina d'inici
Títol
Citada per
Citada per
Any
A Survey on the security of blockchain systems
X Li, P Jiang, T Chen, X Luo, Q Wen
Future Generation Computer Systems, 2017
6382017
Under-Optimized Smart Contracts Devour Your Money
T Chen, X Li, X Luo, X Zhang
SANER, 2017
1762017
Understanding Ethereum via Graph Analysis
T Chen, Z Li, Y Zhu, J Chen, X Luo, JC Lui, X Lin, X Zhang
ACM Transactions on Internet Technology, 2020
992020
Understanding Ethereum via Graph Analysis
T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhang
INFOCOM, 2018
952018
State of the art: Dynamic symbolic execution for automated test generation
T Chen, X Zhang, S Guo, H Li, Y Wu
Future Generation Computer Systems 29 (7), 1758-1773, 2013
802013
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks
T Chen, X Li, Y Wang, J Chen, X Luo, MH Au, X Zhang
ISPEC, 2017
552017
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
L Xue, Y Zhou, T Chen, X Luo, G Gu
UESNIX SECURITY, 2017
462017
Towards Saving Money in Using Smart Contracts
T Chen, Z Li, H Zhou, J Chen, X Li, X Luo, X Zhang
ICSE, 2018
382018
Research and application of the transparent data encpryption in intranet data leakage prevention
X Zhang, F Liu, T Chen, H Li
2009 International Conference on Computational Intelligence and Security 2 …, 2009
272009
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
X Zhang, T Chen, J Zheng, H Li
Journal of Zhejiang University SCIENCE C 11 (2), 119-129, 2010
262010
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang
CCS, 2019
252019
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code
F Wei, X Lin, X Ou, T Chen, X Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
232018
Automated Forensic Analysis of Mobile Applications on Android Devices
X Lin, T Chen, T Zhu, K Yang, F Wei
DFRWS USA, 2018
212018
Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost
B Cheng, J Ming, J Fu, G Peng, T Chen, X Zhang, JY Marion
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
212018
FPM: Four-factors Propagation Model for passive P2P worms
T Chen, X Zhang, Y Wu
Future Generation Computer Systems 36, 133-141, 2014
152014
Characterizing the Impacts of Application Layer DDoS Attacks
M Jiang, C Wang, X Luo, T Miu, T Chen
ICWS, 2017
122017
A hybrid detection approach for zero-day polymorphic shellcodes
T Chen, X Zhang, Z Liu
2009 International Conference on E-Business and Information System Security, 1-5, 2009
122009
Design and implementation of a dynamic symbolic execution tool for windows executables
T Chen, X Zhang, C Zhu, X Ji, S Guo, Y Wu
Journal of Software: Evolution and Process 25 (12), 1249-1272, 2013
112013
DataEther: Data Exploration Framework For Ethereum
T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ...
ICDCS, 2019
102019
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
D Wang, J Ming, T Chen, X Zhang, C Wang
RESEC, 2018
102018
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20