Author of the publication

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).

, , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the (In)Security of Secure ROS2., , , , and . CCS, page 739-753. ACM, (2022)MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation., , , , , , , , and . FORGE, page 12-23. ACM, (2024)Efficient Password Guessing Based on a Password Segmentation Approach., , and . GLOBECOM, page 1-6. IEEE, (2019)Novel denial-of-service attacks against cloud-based multi-robot systems., , , , and . Inf. Sci., (2021)ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers., , , , , , , , , and . ASE, page 510-521. IEEE, (2023)Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection., , , , , , , , , and . CoRR, (2024)The Threat of Offensive AI to Organizations., , , , , , , , , and . CoRR, (2021)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)Morest: Model-based RESTful API Testing with Execution Feedback., , , , , , , , and . ICSE, page 1406-1417. ACM, (2022)Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation., , , , , , and . CoRR, (2024)