A survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future generation computer systems 107, 841-853, 2020 | 2007 | 2020 |
Under-Optimized Smart Contracts Devour Your Money T Chen, X Li, X Luo, X Zhang The 24th IEEE International Conference on Software Analysis, Evolution, and …, 2017 | 447 | 2017 |
Understanding Ethereum via Graph Analysis T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhang The 37th IEEE International Conference on Computer Communications (INFOCOM), 2018 | 388 | 2018 |
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang The 13th International Conference on Information Security Practice and …, 2017 | 147 | 2017 |
Towards saving money in using smart contracts. T Chen, Z Li, H Zhou, J Chen, X Luo, X Li, X Zhang The 40th IEEE/ACM International Conference on Software Engineering (ICSE), 2018 | 113 | 2018 |
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts T Chen, Y Feng, Z Li, H Zhou, X Luo, X Li, X Xiao, J Chen, X Zhang IEEE Transactions on Emerging Topics in Computing, 2021 | 92 | 2021 |
A Survey of DeFi Security: Challenges and Opportunities W Li, J Bu, X Li, H Peng, Y Niu, Y Zhang Journal of King Saud University - Computer and Information Sciences, 2022 | 37 | 2022 |
Security Analysis of DeFi: Vulnerabilities, Attacks and Advances W Li, J Bu, X Li, X Chen IEEE International Conference on Blockchain, 2022, 2022 | 27 | 2022 |
STAN: Towards Describing Bytecodes of Smart Contract X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu The 20th IEEE International Conference on Software Quality, Reliability and …, 2020 | 21 | 2020 |
CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum X Li, T Chen, X Luo, C Wang The 36th ACM/SIGAPP Symposium on Applied Computing, 2021 | 16 | 2021 |
Characterizing Erasable Accounts in Ethereum X Li, T Chen, X Luo, J Yu The 23rd Information Security Conference (ISC), 2020 | 13 | 2020 |
AuthROS: Secure Data Sharing Among Robot Operating Systems Based on Ethereum S Zhang, W Li, X Li, B Liu The 22nd IEEE International Conference on Software Quality, Reliability, and …, 2022 | 12 | 2022 |
Survey of Android vulnerability detection Y Zhang, Z Fang, K Wang, Z Wang, H Yue, Q Liu, Y He, X Li, G Yang Journal of Computer Research and Development 52 (10), 2167-2177, 2015 | 11* | 2015 |
An overview of AI and blockchain integration for privacy-preserving Z Li, D Kong, Y Niu, H Peng, X Li, W Li arXiv preprint arXiv:2305.03928, 2023 | 6 | 2023 |
Automated Smart Contract Summarization via LLMs Y Mao, X Li, Z Li, W Li arXiv preprint arXiv:2402.04863, 2024 | 5 | 2024 |
Hybrid Analysis of Smart Contracts and Malicious Behaviors in Ethereum X Li The Hong Kong Polytechnic University, 2021 | 5 | 2021 |
An android vulnerability detection system J Zhang, Y Yao, X Li, J Xie, G Wu The 11th International Conference on Network and System Security (NSS), 169-183, 2017 | 4 | 2017 |
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack X Li, Q Liu, Y Zhang Journal of University of Chinese Academy of Sciences 32 (3), 384-390, 2015 | 4* | 2015 |
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack X Li, Q Liu, Y Zhang Journal of University of Chinese Academy of Sciences 32 (3), 384-390, 2015 | 3 | 2015 |
System-level attacks against android by exploiting asynchronous programming T Chen, X Li, X Luo, X Zhang Software Quality Journal 26, 1037-1062, 2018 | 2 | 2018 |