متابعة
Lei Wu
Lei Wu
بريد إلكتروني تم التحقق منه على zju.edu.cn - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2592013
Honeypot detection in advanced botnet attacks
P Wang, L Wu, R Cunningham, CC Zou
International Journal of Information and Computer Security 4 (1), 30-51, 2010
1602010
A systematic study on peer-to-peer botnets
P Wang, L Wu, B Aslam, CC Zou
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
1442009
Characterizing cryptocurrency exchange scams
P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu
Computers & Security 98, 101993, 2020
1322020
Towards a first step to understand flash loan and its applications in defi ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
1072021
Characterizing code clones in the ethereum smart contract ecosystem
N He, L Wu, H Wang, Y Guo, X Jiang
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
982020
Defiranger: detecting DeFI price manipulation attacks
S Wu, Z Yu, D Wang, Y Zhou, L Wu, H Wang, X Yuan
IEEE Transactions on Dependable and Secure Computing 21 (4), 4147-4161, 2023
932023
Towards understanding and demystifying bitcoin mixing services
L Wu, Y Hu, Y Zhou, H Wang, X Luo, Z Wang, F Zhang, K Ren
Proceedings of the Web Conference 2021, 33-44, 2021
902021
{EOSAFE}: security analysis of {EOSIO} smart contracts
N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang
30th USENIX security symposium (USENIX Security 21), 1271-1288, 2021
812021
Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts
W Chen, X Li, Y Sui, N He, H Wang, L Wu, X Luo
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021
792021
Understanding (mis) behavior on the EOSIO blockchain
Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ...
Proceedings of the ACM on Measurement and Analysis of Computing Systems 4 (2 …, 2020
652020
Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams
P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2020
622020
Harvesting developer credentials in android apps
Y Zhou, L Wu, Z Wang, X Jiang
Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015
612015
Mobile app squatting
Y Hu, H Wang, R He, L Li, G Tyson, I Castro, Y Guo, L Wu, G Xu
Proceedings of The Web Conference 2020, 1727-1738, 2020
462020
Wasai: uncovering vulnerabilities in wasm smart contracts
W Chen, Z Sun, H Wang, X Luo, H Cai, L Wu
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
402022
Characterizing eosio blockchain
Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ...
arXiv preprint arXiv:2002.05369, 2020
382020
Hybrid user-level sandboxing of third-party android apps
Y Zhou, K Patel, L Wu, Z Wang, X Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
372015
MsDroid: Identifying Malicious Snippets for Android Malware Detection
Y He, Y Liu, L Wu, Z Yang, K Ren, Z Qin
IEEE Transactions on Dependable and Secure Computing 20 (3), 2025-2039, 2022
362022
Towards understanding flash loan and its applications in defi ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
arXiv preprint arXiv:2010.12252, 2020
312020
Beyond the virus: A first look at coronavirus-themed mobile malware
L Wang, R He, H Wang, P Xia, Y Li, L Wu, Y Zhou, X Luo, Y Sui, Y Guo, ...
arXiv preprint arXiv:2005.14619, 2020
292020
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20