Follow
Xiao Yi
Xiao Yi
Verified email at ie.cuhk.edu.hk - Homepage
Title
Cited by
Cited by
Year
Big-data analysis of multi-source logs for anomaly detection on network-based system
Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan
2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017
352017
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns
X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
7*2022
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
X Yi, Y Fang, D Wu, L Jiang
The Network and Distributed System Security Symposium (NDSS), 2023
62023
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
Y Fang, D Wu, X Yi, S Wang, Y Chen, M Chen, Y Liu, L Jiang
The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023
52023
Motion-senor behavior analysis for continuous authentication on smartphones
C Shen, Y Li, T Yu, S Yuan, X Yi, X Guan
2016 12th World Congress on Intelligent Control and Automation (WCICA), 2023 …, 2016
52016
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition
X Yang, D Wu, X Yi, JHM Lee, T Lee
arXiv preprint arXiv:2206.13356, 2022
22022
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets
M Chen, D Wu, X Yi, J Xu
arXiv e-prints, arXiv: 2101.06454, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–7