default search action
Xiapu Luo
Daniel Xiapu Luo
Person information
- affiliation: Hong Kong Polytechnic University, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j128]Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. Comput. Secur. 136: 103577 (2024) - [j127]Alven C. Y. Leung, Dennis Y. W. Liu, Xiapu Luo, Man Ho Au:
A constructivist and pragmatic training framework for blockchain education for IT practitioners. Educ. Inf. Technol. 29(12): 15813-15854 (2024) - [j126]Yonghao Long, Xiapu Luo, Yujie Zhu, Kun-Pyo Lee, Stephen Jia Wang:
Data Transparency Design in Internet of Things: A Systematic Review. Int. J. Hum. Comput. Interact. 40(18): 5003-5025 (2024) - [j125]Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, Hongxin Hu:
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 89:1-89:28 (2024) - [j124]Ruiyao Huang, Qingni Shen, Yuchen Wang, Yiqi Wu, Zhonghai Wu, Xiapu Luo, Anbang Ruan:
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts. J. Syst. Softw. 216: 112107 (2024) - [j123]Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, Haipeng Cai:
Learning to Detect and Localize Multilingual Bugs. Proc. ACM Softw. Eng. 1(FSE): 2190-2213 (2024) - [j122]Ying Wang, Tao Zhang, Xiapu Luo, Peng Liang:
Special Issue on Selected Tools from the Tool Track of the 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023 Tool Track). Sci. Comput. Program. 238: 103167 (2024) - [j121]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j120]Yang Shi, Tianyuan Luo, Jingwen Liang, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2982-2996 (2024) - [j119]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j118]Yulin Zhu, Tomasz P. Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. IEEE Trans. Inf. Forensics Secur. 19: 3567-3580 (2024) - [j117]Xiangming Wang, Yang Liu, Kexin Jiao, Pengfei Liu, Xiapu Luo, Ting Liu:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. IEEE Trans. Inf. Forensics Secur. 19: 4012-4027 (2024) - [j116]Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou:
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-Based Node Classification. IEEE Trans. Knowl. Data Eng. 36(6): 2476-2489 (2024) - [j115]Zigui Jiang, Weilin Zheng, Bo Liu, Hong-Ning Dai, Haoran Xie, Xiapu Luo, Zibin Zheng, Qing Li:
Unravelling Token Ecosystem of EOSIO Blockchain. IEEE Trans. Knowl. Data Eng. 36(10): 5423-5439 (2024) - [j114]Henry Hong-Ning Dai, Daniel Xiapu Luo, Zibin Zheng, Yan Zhang, Qin Hu:
Guest Editorial Introduction to the Special Section on Advanced Networking Technologies for Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3915-3917 (2024) - [j113]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [j112]Xiaobo Ma, Jian Qu, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, Zhenhua Li, Xiaohong Guan:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - [j111]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. ACM Trans. Softw. Eng. Methodol. 33(2): 37:1-37:29 (2024) - [j110]Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Xiapu Luo, Jingzhu He, Yutian Tang:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. IEEE Trans. Software Eng. 50(4): 854-883 (2024) - [j109]Yutian Tang, Zhijie Liu, Zhichao Zhou, Xiapu Luo:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. IEEE Trans. Software Eng. 50(6): 1340-1359 (2024) - [j108]Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, Liang Feng Zhang:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. IEEE Trans. Software Eng. 50(6): 1548-1584 (2024) - [c232]Xingyu Zhu, Guanhui Ye, Xiapu Luo, Xuetao Wei:
Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking. AAAI 2024: 7784-7792 - [c231]Alven C. Y. Leung, Zoey Ziyi Li, Dennis Y. W. Liu, Richard W. C. Lui, Daniel Xiapu Luo, Siu Wo Tarloff Im:
Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation. ACE 2024: 154-163 - [c230]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models. ACISP (3) 2024: 424-443 - [c229]Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang:
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. AsiaCCS 2024 - [c228]Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou:
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach. ICDE 2024: 1213-1227 - [c227]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. ICME 2024: 1-6 - [c226]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - [c225]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. ICSE 2024: 127:1-127:13 - [c224]Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai:
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. ICSE 2024: 149:1-149:13 - [c223]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c222]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. ICSE 2024: 159:1-159:13 - [c221]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. IMC 2024: 259-279 - [c220]Litao Qiao, Bang Wu, Heng Li, Cuiying Gao, Wei Yuan, Xiapu Luo:
Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense. INFOCOM 2024: 211-220 - [c219]Jianfeng Li, Zheng Lin, Xiaobo Ma, Jianhao Li, Jian Qu, Xiapu Luo, Xiaohong Guan:
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization. INFOCOM 2024: 1651-1660 - [c218]Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang:
ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum. INFOCOM 2024: 1691-1700 - [c217]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. Internetware 2024 - [c216]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c215]Peilin Zheng, Bowei Su, Xiapu Luo, Ting Chen, Neng Zhang, Zibin Zheng:
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts. ISSTA 2024: 566-577 - [c214]Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li, Haoyu Wang:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. ISSTA 2024: 1440-1452 - [c213]Shuwei Song, Jiachi Chen, Ting Chen, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. ISSTA 2024: 1682-1694 - [c212]Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu:
EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM. LCTES 2024: 131-142 - [c211]Liu Wang, Conghui Zheng, Haoyu Wang, Xiapu Luo, Gareth Tyson, Yi Wang, Shangguang Wang:
Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity. MSR 2024: 322-334 - [c210]Elliott Wen, Jiaxiang Zhou, Xiapu Luo, Giovanni Russello, Jens Dietrich:
Keep Me Updated: An Empirical Study on Embedded JavaScript Engines in Android Apps. MSR 2024: 361-372 - [c209]Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang:
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. NDSS 2024 - [c208]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. NDSS 2024 - [c207]Jincheng Wang, Le Yu, Xiapu Luo:
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. SP 2024: 881-896 - [c206]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. SP 2024: 2180-2197 - [c205]Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. SP 2024: 2255-2272 - [c204]Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. SP 2024: 2348-2365 - [c203]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. USENIX Security Symposium 2024 - [c202]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [c201]Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, Hongxin Hu:
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces. WWW 2024: 1081-1091 - [c200]Yi Xie, Jiahao Feng, Wenju Huang, Yixi Zhang, Xueliang Sun, Xiaochou Chen, Xiapu Luo:
Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces. WWW 2024: 1203-1214 - [i95]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i94]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i93]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i92]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. CoRR abs/2402.02973 (2024) - [i91]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. CoRR abs/2402.13815 (2024) - [i90]Zhijie Liu, Yutian Tang, Meiyun Li, Xin Jin, Yunfei Long, Liang Feng Zhang, Xiapu Luo:
LLM-CompDroid: Repairing Configuration Compatibility Bugs in Android Apps with Pre-trained Large Language Models. CoRR abs/2402.15078 (2024) - [i89]Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang:
Demystifying the DAO Governance Process. CoRR abs/2403.11758 (2024) - [i88]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. CoRR abs/2405.20561 (2024) - [i87]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. CoRR abs/2406.10687 (2024) - [i86]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts using Large Language Models. CoRR abs/2407.08969 (2024) - [i85]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i84]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - [i83]Youqian Zhang, MK Michael Cheung, Chunxi Yang, Xinwei Zhai, Zitong Shen, Xinyu Ji, Eugene Yujun Fu, Sze-Yiu Chau, Xiapu Luo:
Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation. CoRR abs/2408.05124 (2024) - 2023
- [j107]Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo:
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. Comput. Secur. 135: 103479 (2023) - [j106]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 55(14s): 326:1-326:37 (2023) - [j105]Zigui Jiang, Xiuwen Tang, Zibin Zheng, Jinyan Guo, Xiapu Luo, Yin Li:
Calling relationship investigation and application on Ethereum Blockchain System. Empir. Softw. Eng. 28(2): 31 (2023) - [j104]Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j103]Shipeng Li, Jingwei Li, Yuxing Tang, Xiapu Luo, Zheyuan He, Zihao Li, Xi Cheng, Yang Bai, Ting Chen, Yuzhe Tang, Zhe Liu, Xiaosong Zhang:
BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing. IEEE Trans. Computers 72(8): 2377-2389 (2023) - [j102]Jingjing Zhang, Yongjie Ye, Weigang Wu, Xiapu Luo:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. IEEE Trans. Dependable Secur. Comput. 20(1): 407-421 (2023) - [j101]Cuiying Gao, Minghui Cai, Shuijun Yin, Gaozhun Huang, Heng Li, Wei Yuan, Xiapu Luo:
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features. IEEE Trans. Inf. Forensics Secur. 18: 5056-5068 (2023) - [j100]Litao Qiao, Bang Wu, Shuijun Yin, Heng Li, Wei Yuan, Xiapu Luo:
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Trans. Inf. Forensics Secur. 18: 5375-5386 (2023) - [j99]Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Sherman Shen:
Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Trans. Mob. Comput. 22(6): 3303-3317 (2023) - [j98]Qing Li, Xiao Ma, Ao Zhou, Xiapu Luo, Fangchun Yang, Shangguang Wang:
User-Oriented Edge Node Grouping in Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(6): 3691-3705 (2023) - [j97]Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, Xiaosong Zhang:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. ACM Trans. Softw. Eng. Methodol. 32(1): 26:1-26:35 (2023) - [j96]Yuan Huang, Hanyang Guo, Xi Ding, Junhuai Shu, Xiangping Chen, Xiapu Luo, Zibin Zheng, Xiaocong Zhou:
A Comparative Study on Method Comment and Inline Comment. ACM Trans. Softw. Eng. Methodol. 32(5): 126:1-126:26 (2023) - [j95]Dawei Yuan, Sen Fang, Tao Zhang, Zhou Xu, Xiapu Luo:
Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph. IEEE Trans. Reliab. 72(2): 511-526 (2023) - [j94]Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. IEEE Trans. Serv. Comput. 16(3): 1822-1832 (2023) - [j93]Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. IEEE Trans. Software Eng. 49(2): 777-801 (2023) - [j92]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [j91]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [j90]Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Software Eng. 49(4): 1983-2005 (2023) - [j89]Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. IEEE Trans. Software Eng. 49(4): 2980-2995 (2023) - [j88]Youshuai Tan, Jinfu Chen, Weiyi Shang, Tao Zhang, Sen Fang, Xiapu Luo, Zijie Chen, Shuhao Qi:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. IEEE Trans. Software Eng. 49(8): 4135-4151 (2023) - [j87]Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. IEEE Trans. Software Eng. 49(9): 4456-4476 (2023) - [j86]Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? IEEE Trans. Software Eng. 49(10): 4639-4655 (2023) - [c199]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c198]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CCS 2023: 165-179 - [c197]Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. CCS 2023: 1645-1659 - [c196]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c195]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c194]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c193]Tianqi Li, Rujun Hu, Lei Xue, Xiapu Luo:
State-Aware Unsafe Driving Action Detection and Defense. ICDCS 2023: 1077-1078 - [c192]Peilin Zheng, Xiapu Luo, Zibin Zheng:
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. ICSE 2023: 307-318 - [c191]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c190]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c189]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c188]Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. ISSTA 2023: 867-879 - [c187]Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. ISSTA 2023: 917-928 - [c186]Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. ASE 2023: 939-950 - [c185]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c184]Tiru Wu, Xi Xiao, Qing Li, Qixu Liu, Guangwu Hu, Xiapu Luo, Yong Jiang:
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs. SECON 2023: 456-464 - [c183]