Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demystifying DeFi MEV Activities in Flashbots Bundle., , , , , , , , and . CCS, page 165-179. ACM, (2023)Large Language Models for Blockchain Security: A Systematic Literature Review., , and . CoRR, (2024)TokenCat: Detect Flaw of Authentication on ERC20 Tokens., , , , , and . ICC, page 4999-5004. IEEE, (2022)Application Research of Business Rules Engine Management System Based on Drools., , and . CSIA (1), volume 1146 of Advances in Intelligent Systems and Computing, page 238-242. Springer, (2020)SODA: A Generic Online Detection Framework for Smart Contracts., , , , , , , , , and 3 other author(s). NDSS, The Internet Society, (2020)SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network., , , , , , , and . ICSE, page 170:1-170:13. ACM, (2024)Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation., , , , , , , , and . CoRR, (2024)SigRec: Automatic Recovery of Function Signatures in Smart Contracts., , , , , , , , , and 2 other author(s). IACR Cryptol. ePrint Arch., (2023)Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts., , , , , , , , , and 2 other author(s). ICDCS, page 1065-1066. IEEE, (2023)