关注
Xiaoqi Li
Xiaoqi Li
Associate Professor, Hainan University
在 ieee.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on the security of blockchain systems
X Li, P Jiang, T Chen, X Luo, Q Wen
Future generation computer systems 107, 841-853, 2020
20072020
Under-Optimized Smart Contracts Devour Your Money
T Chen, X Li, X Luo, X Zhang
The 24th IEEE International Conference on Software Analysis, Evolution, and …, 2017
4472017
Understanding Ethereum via Graph Analysis
T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhang
The 37th IEEE International Conference on Computer Communications (INFOCOM), 2018
3882018
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang
The 13th International Conference on Information Security Practice and …, 2017
1472017
Towards saving money in using smart contracts.
T Chen, Z Li, H Zhou, J Chen, X Luo, X Li, X Zhang
The 40th IEEE/ACM International Conference on Software Engineering (ICSE), 2018
1132018
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts
T Chen, Y Feng, Z Li, H Zhou, X Luo, X Li, X Xiao, J Chen, X Zhang
IEEE Transactions on Emerging Topics in Computing, 2021
922021
A Survey of DeFi Security: Challenges and Opportunities
W Li, J Bu, X Li, H Peng, Y Niu, Y Zhang
Journal of King Saud University - Computer and Information Sciences, 2022
372022
Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
W Li, J Bu, X Li, X Chen
IEEE International Conference on Blockchain, 2022, 2022
272022
STAN: Towards Describing Bytecodes of Smart Contract
X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu
The 20th IEEE International Conference on Software Quality, Reliability and …, 2020
212020
CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum
X Li, T Chen, X Luo, C Wang
The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
162021
Characterizing Erasable Accounts in Ethereum
X Li, T Chen, X Luo, J Yu
The 23rd Information Security Conference (ISC), 2020
132020
AuthROS: Secure Data Sharing Among Robot Operating Systems Based on Ethereum
S Zhang, W Li, X Li, B Liu
The 22nd IEEE International Conference on Software Quality, Reliability, and …, 2022
122022
Survey of Android vulnerability detection
Y Zhang, Z Fang, K Wang, Z Wang, H Yue, Q Liu, Y He, X Li, G Yang
Journal of Computer Research and Development 52 (10), 2167-2177, 2015
11*2015
An overview of AI and blockchain integration for privacy-preserving
Z Li, D Kong, Y Niu, H Peng, X Li, W Li
arXiv preprint arXiv:2305.03928, 2023
62023
Automated Smart Contract Summarization via LLMs
Y Mao, X Li, Z Li, W Li
arXiv preprint arXiv:2402.04863, 2024
52024
Hybrid Analysis of Smart Contracts and Malicious Behaviors in Ethereum
X Li
The Hong Kong Polytechnic University, 2021
52021
An android vulnerability detection system
J Zhang, Y Yao, X Li, J Xie, G Wu
The 11th International Conference on Network and System Security (NSS), 169-183, 2017
42017
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack
X Li, Q Liu, Y Zhang
Journal of University of Chinese Academy of Sciences 32 (3), 384-390, 2015
4*2015
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack
X Li, Q Liu, Y Zhang
Journal of University of Chinese Academy of Sciences 32 (3), 384-390, 2015
32015
System-level attacks against android by exploiting asynchronous programming
T Chen, X Li, X Luo, X Zhang
Software Quality Journal 26, 1037-1062, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20