Big-data analysis of multi-source logs for anomaly detection on network-based system Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan 2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017 | 35 | 2017 |
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 7* | 2022 |
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects X Yi, Y Fang, D Wu, L Jiang The Network and Distributed System Security Symposium (NDSS), 2023 | 6 | 2023 |
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts Y Fang, D Wu, X Yi, S Wang, Y Chen, M Chen, Y Liu, L Jiang The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023 | 5 | 2023 |
Motion-senor behavior analysis for continuous authentication on smartphones C Shen, Y Li, T Yu, S Yuan, X Yi, X Guan 2016 12th World Congress on Intelligent Control and Automation (WCICA), 2023 …, 2016 | 5 | 2016 |
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition X Yang, D Wu, X Yi, JHM Lee, T Lee arXiv preprint arXiv:2206.13356, 2022 | 2 | 2022 |
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets M Chen, D Wu, X Yi, J Xu arXiv e-prints, arXiv: 2101.06454, 2021 | 2 | 2021 |