Calculated based on number of publications stored in Pure and citations from Scopus
20012025

Research activity per year

Filter
Conference article published in proceeding or book

Search results

  • 2024

    All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts

    Sun, T., He, N., Xiao, J., Yue, Y., Luo, X. & Wang, H., Aug 2024, The 33rd USENIX Security Symposium.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers

    Wu, S., Li, Z., Yan, L., Chen, W., Jiang, M., Wang, C., Luo, X. & Zhou, H., Apr 2024, 46th International Conference on Software Engineering.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps

    Cheng, Y., Tang, R., Zuo, C., Zhang, X., Lei, X., Luo, X. & Zhao, Q., Apr 2024, Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. p. 1–13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack

    Zhou, H., Wu, S., Qian, C., Luo, X., Cai, H. & Zhang, C., Feb 2024, The 31st Network and Distributed System Security Symposium.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

    Zhou, X., Xiao, X., Li, Q., Zhang, B., Hu, G., Luo, X. & Zhang, T., Jul 2024, The 19th ACM ASIA Conference on Computer and Communications Security.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum

    Wong, T., Zhang, C., Ni, Y., Luo, M., Chen, H., Yu, Y., Li, W., Luo, X. & Wang, H., May 2024, IEEE International Conference on Computer Communications.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces

    Xie, Y., Feng, J., Huang, W., Zhang, Y., Sun, X., Chen, X. & Luo, X., May 2024, Proceedings of the ACM on Web Conference 2024. Association for Computing Machinery, p. 1203–1214

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization

    Li, J., Lin, Z., Ma, X., Li, J., Qu, J., Luo, X. & Guan, X., May 2024, IEEE International Conference on Computer Communications.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM

    Chen, W., Wang, H., Cui, H., Luo, X., Zheng, S. & Liu, X., 24 Jun 2024, International Conference on Languages, Compilers, and Tools for Embedded Systems.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

    Ai, X., Zhou, J., Zhu, Y., Li, G., Michalak, T. P., Luo, X. & Zhou, K., May 2024, 40th IEEE International Conference on Data Engineering (ICDE). IEEE, p. 1-15

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • LLMIF: Augmented Large Language Model for Fuzzing IoT Devices

    Wang, J., Yu, L. & Luo, X., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 196-196

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation

    He, Z., Li, Z., Qiao, A., Luo, X., Zhang, X., Chen, T., Song, S., Liu, D. & Niu, W., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 128-128

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking

    Zhu, X., Ye, G., Luo, X. & Wei, X., 24 Mar 2024, Proceedings of the AAAI Conference on Artificial Intelligence. Washington: AAAI press, Vol. 38.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Revisiting Automotive Attack Surfaces: a Practitioners' Perspective

    Jing, P., Cai, Z., Yu, L., Du, Y., Zhang, W., Qian, C., Luo, X., Nie, S. & Wu, S., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 83-83

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Towards Smart Contract Fuzzing on GPUs

    Chen, W., Luo, X., Cai, H. & Wang, H., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 195-195

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense

    Qiao, L., Wu, B., Li, H., Gao, C., YUAN, W. & Luo, X., May 2024, IEEE International Conference on Computer Communications.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation

    Leung, A. C. Y., Li, Z. Z., Liu, Y. W. D., Lui, W. C., Luo, X. & Im, S. W. T., Jan 2024, Proceedings of the 26th Australasian Computing Education Conference. ACM Press, p. 154–163

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces

    Luo, X., Liao, S., Aldeen, M., Yan, J., Cheng, L., Luo, X., Cai, H. & Hu, H., May 2024, Proceedings of the ACM on Web Conference 2024. p. 1081–1091

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Unveiling the Paradox of NFT Prosperity

    Huang, J., Xia, P., Li, J., Ma, K., Tyson, G., Luo, X., Wu, L., Zhou, Y., Cai, W. & Wang, H., May 2024, Proceedings of the ACM on Web Conference 2024. p. 167–177

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses

    Nong, Y., Fang, R., Yi, G., Zhao, K., Luo, X., Chen, F. & Cai, H., 2024, 2024 IEEE/ACM 46th International Conference on Software Engineering. p. 1837-1849

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2023

    1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing

    Yang, S., He, Y., Chen, K., Ma, Z., Luo, X., Xie, Y., Chen, J. & Zhang, C., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 867–879

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features

    Zhang, Y., Hu, Y., Li, H., Shi, W., Ning, Z., Luo, X. & Zhang, F., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 917–928

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting

    Qu, J., Ma, X., Li, J., Luo, X., Xue, L., Zhang, J., Li, Z., Li, F. & Guan, X., Aug 2023, 32nd USENIX Security Symposium 2023.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

    Dong, F., Liu, S., Jiang, P., Li, D., Wang, H., Huang, L., Xiao, X., Chen, J., Luo, X., Guo, Y. & Chen, X., Nov 2023, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. p. 2396–2410

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation

    Zhang, C., Li, Y., Zhou, H., Zhang, X., Zheng, Y., Zhan, X., Xie, X., Luo, X., Li, X., Liu, Y. & Mahbub Habib, S., Aug 2023, 32nd USENIX Security Symposium 2023. p. 2867-2884

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs

    Wu, T., Xiao, X., Li, Q., Liu, Q., Hu, G., Luo, X. & Jiang, Y., Oct 2023, 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information

    Li, H., Cheng, Z., Wu, B., Yuan, L., Gao, C., YUAN, W. & Luo, X., Aug 2023, 32nd USENIX Security Symposium 2023.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts

    Zheng, P., Luo, X. & Zheng, Z., 17 May 2023, Proceedings of the 45th International Conference on Software Engineering (ICSE). p. 1-12

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • CydiOS: A Model-Based Testing Framework for iOS Apps

    Wu, S., Li, J., Zhou, H., Fang, Y., Zhao, K., Wang, H., Qian, C. & Luo, X., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 1-13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing

    Yuan, M., Zhao, B., Li, P., Liang, J., Han, X., Luo, X. & Zhang, C., Aug 2023, 32nd USENIX Security Symposium, USENIX Security 2023. p. 2849-2866

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • DeepInfer: Deep Type Inference from Smart Contract Bytecode

    Zhao, K., Li, Z., Li, J., Ye, H., Luo, X. & Chen, T., Nov 2023, Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 745–757

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • Demystifying DeFi MEV Activities in Flashbots Bundle

    Li, Z., Li, J., He, Z., Luo, X., Wang, T., Ni, X., Yang, W., Chen, X. & Chen, T., Nov 2023, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 165–179

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps

    Zhao, K., Zhan, X., Yu, L., Zhou, S., Zhou, H., Luo, X., Wang, H. & Liu, Y., May 2023, Proceedings of the 45th International Conference on Software Engineering (ICSE). p. 1-13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • DISTDET: A Cost-Effective Distributed Cyber Threat Detection System

    Dong, F., Wang, L., Nie, X., Shao, F., Wang, H., Li, D., Luo, X. & Xiao, X., Aug 2023, 32nd USENIX Security Symposium 2023. p. 6575-6592

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    6 Citations (Scopus)
  • Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing

    Su, J., Dai, H.-N., Zhao, L., Zheng, Z. & Luo, X., 5 Jan 2023, Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). Association for Computing Machinery (ACM), p. 1-12 2006 p. 36

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning

    Ni, T., Li, J., Zhang, X., Zuo, C., Wang, W., Xu, W., Luo, X. & Zhao, Q., Oct 2023, Proceedings of the 29th Annual International Conference on Mobile Computing and Networking. p. 1–15

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem

    Wu, Z., Liu, J., Wu, J., Zheng, Z., Luo, X. & Chen, T., 30 Apr 2023, Proceedings of the 32nd World Wide Web Conference (WWW). Association for Computing Machinery (ACM), p. 1918-1927 4293 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • MalWhiteout: Reducing Label Errors in Android Malware Detection

    Wang, L., Wang, H., Luo, X. & Sui, Y., 5 Jan 2023, Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). Association for Computing Machinery (ACM), p. 1-13 2006 p. 69

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches

    Zhou, H., Hong, S., Liu, Y., Luo, X., Li, W. & Gu, G., May 2023, Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, p. 3178-3192

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
    1 Citation (Scopus)
  • On the Security Risks of Knowledge Graph Reasoning

    Xi, Z., Du, T., Li, C., Pang, R., Ji, S., Luo, X., Xiao, X., Ma, F. & Wang, T., Aug 2023, 32nd USENIX Security Symposium 2023. p. 3259-3276

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Panda: Security Analysis of Algorand Smart Contracts

    Sun, Z., Luo, X. & Zhang, Y., Aug 2023, 32nd USENIX Security Symposium 2023. p. 1811-1828

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum

    Lin, Z., Xiao, X., Hu, G., Zhang, B., Liu, Q. & Luo, X., 23 Oct 2023, 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems

    Li, W., Ruan, J., Yi, G., Cheng, L., Luo, X. & Cai, H., Aug 2023, 32nd USENIX Security Symposium 2023. p. 1379-1396

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    10 Citations (Scopus)
  • Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts

    Chen, T., Li, Z., Luo, X., Wang, X., Wan, T., He, Z., Fang, K., Zhang, Y., Zhu, H., Li, H., Cheng, Y. & Zhang, X., Jul 2023, 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Poster: Uncovering Vulnerabilities in Wasm Smart Contracts

    Chen, W., Sun, Z., Wang, H., Luo, X., Cai, H. & Wu, L., Jul 2023, 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing

    Li, W., Yang, H., Luo, X., Cheng, L. & Cai, H., Nov 2023, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. p. 1645–1659

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics

    Ye, H., Martinez, M., Luo, X., Zhang, T. & Monperrus, M., 5 Jan 2023, Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). Association for Computing Machinery (ACM), p. 1-13 2006 p. 92

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • SHELTER: Extending Arm CCA with Isolation in User Space

    Zhang, Y., Hu, Y., Ning, Z., Zhang, F., Luo, X., Huang, H., Yan, S. & He, Z., Aug 2023, 32nd USENIX Security Symposium 2023. p. 6257-6274

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • State-Aware Unsafe Driving Action Detection and Defense

    Li, T., Hu, R., Xue, L. & Luo, X., Jul 2023, 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification

    Zhang, H., Yu, L., Xiao, X., Li, Q., Mercaldo, F., Luo, X. & Liu, Q., 30 Apr 2023, Proceedings of the 32nd World Wide Web Conference (WWW). Association for Computing Machinery (ACM), p. 2066-2075 4293 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    6 Citations (Scopus)