متابعة
Yebo Feng
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols
J Xu, K Paruch, S Cousaert, Y Feng
ACM Computing Surveys, 2022
2722022
Application-layer DDoS defense with reinforcement learning
Y Feng, J Li, T Nguyen
2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020
332020
Reap the harvest on blockchain: A survey of yield farming protocols
J Xu, Y Feng
IEEE Transactions on Network and Service Management 20 (1), 858-869, 2022
302022
Towards learning-based, content-agnostic detection of social bot traffic
Y Feng, J Li, L Jiao, X Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2149-2163, 2020
262020
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation
C Wang, J Zhang, Y Feng, T Li, W Sun, Y Liu, X Peng
arXiv preprint arXiv:2401.06391, 2024
212024
BotFlowMon: Learning-based, content-agnostic identification of social bot traffic flows
Y Feng, J Li, L Jiao, X Wu
2019 IEEE Conference on Communications and Network Security (CNS), 169-177, 2019
202019
Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets
Y Erinle, Y Kethepalli, Y Feng, J Xu
arXiv preprint arXiv:2307.12874, 2023
16*2023
Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic
Y Feng, J Li, D Sisodia
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
112022
Poster: Content-agnostic identification of cryptojacking in network traffic
Y Feng, D Sisodia, J Li
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
112020
Toward explainable and adaptable detection and classification of distributed denial-of-service attacks
Y Feng, J Li
Deployable Machine Learning for Security Defense: First International …, 2020
72020
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
T Han, S Huang, Z Ding, W Sun, Y Feng, C Fang, J Li, H Qian, C Wu, ...
arXiv preprint arXiv:2403.03846, 2024
62024
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
Y Feng, J Li, D Sisodia, P Reiher
IEEE Transactions on Dependable and Secure Computing, 2023
62023
Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)
J Xu, D Perez, Y Feng, B Livshits
arXiv preprint arXiv:2302.09551, 2023
62023
University blockchain research initiative (UBRI): Boosting blockchain education and research
Y Feng, J Xu, L Weymouth
IEEE Potentials 41 (6), 19-25, 2022
62022
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks
S Arora, Y Li, Y Feng, J Xu
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
52024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing
X Sun, J Chen, K He, Z He, R Du, Y Feng, Q Zhao, C Wu
arXiv preprint arXiv:2404.15000, 2024
52024
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones
X Sun, J Chen, C Wu, K He, H Xu, Y Feng, R Du, X Chen
arXiv preprint arXiv:2404.01106, 2024
52024
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures
J Mirkovic, Y Feng, J Li
arXiv preprint arXiv:2203.00742, 2022
52022
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
T Li, S Yin, R Yu, Y Feng, L Jiao, Y Shen, J Ma
IEEE Journal on Selected Areas in Communications 40 (11), 3191-3206, 2022
42022
Dynashard: Secure and adaptive blockchain sharding protocol with hybrid consensus and dynamic shard management
A Liu, J Chen, K He, R Du, J Xu, C Wu, Y Feng, T Li, J Ma
IEEE Internet of Things Journal, 2024
32024
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20