Author of the publication

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).

, , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 54 (2): 997-1010 (February 2024)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , and . CoRR, (2022)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , and . CoRR, (2023)The Threat of Offensive AI to Organizations., , , , , , , , , and . CoRR, (2021)LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study., , , , and . CoRR, (2024)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)Morest: Model-based RESTful API Testing with Execution Feedback., , , , , , , , and . ICSE, page 1406-1417. ACM, (2022)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , , and . CoRR, (2022)ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics., , , , and . CoRR, (2023)